825 research outputs found

    Handbook of Vascular Biometrics

    Get PDF

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Human Retina Based Identification System Using Gabor Filters and GDA Technique

    Get PDF
    A biometric authentication system provides an automatic person authentication based on some characteristic features possessed by the individual. Among all other biometrics, human retina is a secure and reliable source of person recognition as it is unique, universal, lies at the back of the eyeball and hence it is unforgeable. The process of authentication mainly includes pre-processing, feature extraction and then features matching and classification. Also authentication systems are mainly appointed in verification and identification mode according to the specific application. In this paper, preprocessing and image enhancement stages involve several steps to highlight interesting features in retinal images. The feature extraction stage is accomplished using a bank of Gabor filter with number of orientations and scales. Generalized Discriminant Analysis (GDA) technique has been used to reduce the size of feature vectors and enhance the performance of proposed algorithm. Finally, classification is accomplished using k-nearest neighbor (KNN) classifier to determine the identity of the genuine user or reject the forged one as the proposed method operates in identification mode. The main contribution in this paper is using Generalized Discriminant Analysis (GDA) technique to address ‘curse of dimensionality’ problem. GDA is a novel method used in the area of retina recognition

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    A multimodal retina-iris biometric system using the levenshtein distance for spatial feature comparison

    Get PDF
    The recent developments of information technologies, and the consequent need for access to distributed services and resources, require robust and reliable authentication systems. Biometric systems can guarantee high levels of security and multimodal techniques, which combine two or more biometric traits, warranting constraints that are more stringent during the access phases. This work proposes a novel multimodal biometric system based on iris and retina combination in the spatial domain. The proposed solution follows the alignment and recognition approach commonly adopted in computational linguistics and bioinformatics; in particular, features are extracted separately for iris and retina, and the fusion is obtained relying upon the comparison score via the Levenshtein distance. We evaluated our approach by testing several combinations of publicly available biometric databases, namely one for retina images and three for iris images. To provide comprehensive results, detection error trade-off-based metrics, as well as statistical analyses for assessing the authentication performance, were considered. The best achieved False Acceptation Rate and False Rejection Rate indices were and 3.33%, respectively, for the multimodal retina-iris biometric approach that overall outperformed the unimodal systems. These results draw the potential of the proposed approach as a multimodal authentication framework using multiple static biometric traits

    State of the Art in Biometric Key Binding and Key Generation Schemes

    Get PDF
    Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System

    Get PDF
    Kemunculan baru dimensi internet dan teknologi tanpa wayar telah membawa era baru dalam teknologi biometrik. Selain sistem biometrik dengan peranti statik, sistem biometrik mudah alih boleh dilaksanakan dan pendekatan ini membawa kepada pelaksanaan yang lebih cekap dan efisien. Dalam kajian ini, sistem biometrik mudah alih berasaskan tapak tangan telah dibangunkan. Walau bagaimanapun, untuk melaksanakan sistem biometrik mudah alih, masa pemprosesan dan penyimpanan yang cekap adalah faktor penting yang perlu dipertimbangkan.Dalam kajian ini, beberapa algoritma yang melibatkan pemprosesan ciri tapak tangan dinilai berdasarkan penggunaan masa dan memori yang optimum. Beberapa kaedah pemprosesan ciri termasuk Ruang Dikehendaki (ROI), Analisa Komponen Utama (PCA) dan Analisa Komponen Utama Kernel (KPCA) disiasat. Pendekatan baru dalam pengekstrakan ciri yang digelar Analisa Komponen Utama Kernel Set Dikurangi (RSKPCA) dicadangkan untuk mempercepatkan pemprosesan pengekstrakan ciri. RSKPCA yang dicadangkan menggunakan anggaran Kepadatan set Dikurangkan (RSDE) untuk menentukan matriks gram yang wajar. Hasilnya, RSKPCA hanya mengekstrak maklumat yang paling relevan dan penting dari set data. 2400 imej tapak tangan yang telah dikumpul daripada tiga jenis peranti Android mudah alih. Penilaian eksperimen menunjukkan bahawa RSKPCA yang dicadangkan mempunyai prestasi lebih baik berbanding ROI, PCA dan KPCA dengan Kadar Penerimaan Tulen (GAR) adalah lebih daripada 98% dan masa pemadanan kurang daripada 0.5s. Projek ini telah membuktikan bahawa pengektsrakan ciri menggunakan RSKPCA yang dicadangkan memberikan keputusan yang terbaik untuk sistem biometrik mudah alih berasaskan imej tapak tangan. ________________________________________________________________________________________________________________________ The emerging of internet and wireless dimension has brought a new era in biometrics technology. Instead of operating the biometric system with static biometric device, mobile biometric system can be implemented and this approach leads to more efficient and reliable implementation. In this study mobile biometric system based on palm print modality is developed. However, in order to execute mobile biometric system, efficient processing time and storage are some of the important factors that need to be considered. In this research, algorithms involving palm print feature processing are evaluated so as to obtain optimum time and memory consumption. Several feature processing methods including Region of Interest (ROI), Principal Component Analysis (PCA), and Kernel Principal Component Analysis (KPCA) are investigated. A new approach in feature extraction called Reduced-Set Kernel Principal Component Analysis (RSKPCA) is proposed to speed up the processing in feature extraction. The proposed RSKPCA employs a Reduced Set Density Estimate (RSDE) to define a weighted gram matrix. As a result, the RSKPCA only extracts the most relevant and important information from a dataset. 2400 palm print images which were collected from three types of android mobile are employed. Experimental evaluation shows that the proposed RSKPCA has better performance compared to the ROI, PCA and KPCA with the Genuine Acceptance Rates (GAR) is more than 98% and the matching time is less than 0.5s. In this project, it has been proven that the proposed RSKPCA as feature extraction gives the best result for mobile biometric system based on palm print

    Feature Representation for Online Signature Verification

    Full text link
    Biometrics systems have been used in a wide range of applications and have improved people authentication. Signature verification is one of the most common biometric methods with techniques that employ various specifications of a signature. Recently, deep learning has achieved great success in many fields, such as image, sounds and text processing. In this paper, deep learning method has been used for feature extraction and feature selection.Comment: 10 pages, 10 figures, Submitted to IEEE Transactions on Information Forensics and Securit
    corecore