3,198 research outputs found
Biometric Systems
Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study
Advanced Biometrics with Deep Learning
Biometrics, such as fingerprint, iris, face, hand print, hand vein, speech and gait recognition, etc., as a means of identity management have become commonplace nowadays for various applications. Biometric systems follow a typical pipeline, that is composed of separate preprocessing, feature extraction and classification. Deep learning as a data-driven representation learning approach has been shown to be a promising alternative to conventional data-agnostic and handcrafted pre-processing and feature extraction for biometric systems. Furthermore, deep learning offers an end-to-end learning paradigm to unify preprocessing, feature extraction, and recognition, based solely on biometric data. This Special Issue has collected 12 high-quality, state-of-the-art research papers that deal with challenging issues in advanced biometric systems based on deep learning. The 12 papers can be divided into 4 categories according to biometric modality; namely, face biometrics, medical electronic signals (EEG and ECG), voice print, and others
Biometric Systems
Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications
Face Liveness Detection under Processed Image Attacks
Face recognition is a mature and reliable technology for identifying people. Due
to high-definition cameras and supporting devices, it is considered the fastest and
the least intrusive biometric recognition modality. Nevertheless, effective spoofing
attempts on face recognition systems were found to be possible. As a result, various anti-spoofing algorithms were developed to counteract these attacks. They are
commonly referred in the literature a liveness detection tests. In this research we highlight the effectiveness of some simple, direct spoofing attacks, and test one of
the current robust liveness detection algorithms, i.e. the logistic regression based face liveness detection from a single image, proposed by the Tan et al. in 2010, against malicious attacks using processed imposter images. In particular, we study experimentally the effect of common image processing operations such as sharpening and smoothing, as well as corruption with salt and pepper noise, on the face liveness detection algorithm, and we find that it is especially vulnerable against spoofing attempts using processed imposter images. We design and present a new facial database, the Durham Face Database, which is the first, to the best of our knowledge, to have client, imposter as well as processed imposter images. Finally, we evaluate our claim on the effectiveness of proposed imposter image attacks using transfer learning on Convolutional Neural Networks. We verify that such attacks are more difficult to detect even when using high-end, expensive machine learning techniques
Handbook of Vascular Biometrics
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers
Pattern mining approaches used in sensor-based biometric recognition: a review
Sensing technologies place significant interest in the use of biometrics for the recognition and assessment of individuals. Pattern mining techniques have established a critical step in the progress of sensor-based biometric systems that are capable of perceiving, recognizing and computing sensor data, being a technology that searches for the high-level information about pattern recognition from low-level sensor readings in order to construct an artificial substitute for human recognition. The design of a successful sensor-based biometric recognition system needs to pay attention to the different issues involved in processing variable data being - acquisition of biometric data from a sensor, data pre-processing, feature extraction, recognition and/or classification, clustering and validation. A significant number of approaches from image processing, pattern identification and machine learning have been used to process sensor data. This paper aims to deliver a state-of-the-art summary and present strategies for utilizing the broadly utilized pattern mining methods in order to identify the challenges as well as future research directions of sensor-based biometric systems
Signal processing and machine learning techniques for human verification based on finger textures
PhD ThesisIn recent years, Finger Textures (FTs) have attracted considerable
attention as potential biometric characteristics. They can provide
robust recognition performance as they have various human-speci c
features, such as wrinkles and apparent lines distributed along the
inner surface of all ngers. The main topic of this thesis is verifying
people according to their unique FT patterns by exploiting signal
processing and machine learning techniques.
A Robust Finger Segmentation (RFS) method is rst proposed to
isolate nger images from a hand area. It is able to detect the ngers
as objects from a hand image. An e cient adaptive nger
segmentation method is also suggested to address the problem of
alignment variations in the hand image called the Adaptive and Robust
Finger Segmentation (ARFS) method.
A new Multi-scale Sobel Angles Local Binary Pattern (MSALBP)
feature extraction method is proposed which combines the Sobel
direction angles with the Multi-Scale Local Binary Pattern (MSLBP).
Moreover, an enhanced method called the Enhanced Local Line Binary
Pattern (ELLBP) is designed to e ciently analyse the FT patterns. As
a result, a powerful human veri cation scheme based on nger Feature
Level Fusion with a Probabilistic Neural Network (FLFPNN) is
proposed. A multi-object fusion method, termed the Finger
Contribution Fusion Neural Network (FCFNN), combines the
contribution scores of the nger objects.
The veri cation performances are examined in the case of missing FT
areas. Consequently, to overcome nger regions which are poorly
imaged a method is suggested to salvage missing FT elements by
exploiting the information embedded within the trained Probabilistic
Neural Network (PNN). Finally, a novel method to produce a Receiver
Operating Characteristic (ROC) curve from a PNN is suggested.
Furthermore, additional development to this method is applied to
generate the ROC graph from the FCFNN.
Three databases are employed for evaluation: The Hong Kong
Polytechnic University Contact-free 3D/2D (PolyU3D2D), Indian
Institute of Technology (IIT) Delhi and Spectral 460nm (S460) from
the CASIA Multi-Spectral (CASIAMS) databases. Comparative
simulation studies con rm the e ciency of the proposed methods for
human veri cation.
The main advantage of both segmentation approaches, the RFS and
ARFS, is that they can collect all the FT features. The best results
have been benchmarked for the ELLBP feature extraction with the
FCFNN, where the best Equal Error Rate (EER) values for the three
databases PolyU3D2D, IIT Delhi and CASIAMS (S460) have been
achieved 0.11%, 1.35% and 0%, respectively. The proposed salvage
approach for the missing feature elements has the capability to enhance
the veri cation performance for the FLFPNN. Moreover, ROC graphs
have been successively established from the PNN and FCFNN.the ministry of higher
education and scientific research in Iraq (MOHESR); the Technical
college of Mosul; the Iraqi Cultural Attach e; the active people in the
MOHESR, who strongly supported Iraqi students
An overview of touchless 2D fingerprint recognition
Touchless fingerprint recognition represents a rapidly growing field of research which has been studied for more than a decade. Through a touchless acquisition process, many issues of touch-based systems are circumvented, e.g., the presence of latent fingerprints or distortions caused by pressing fingers on a sensor surface. However, touchless fingerprint recognition systems reveal new challenges. In particular, a reliable detection and focusing of a presented finger as well as an appropriate preprocessing of the acquired finger image represent the most crucial tasks. Also, further issues, e.g., interoperability between touchless and touch-based fingerprints or presentation attack detection, are currently investigated by different research groups. Many works have been proposed so far to put touchless fingerprint recognition into practice. Published approaches range from self identification scenarios with commodity devices, e.g., smartphones, to high performance on-the-move deployments paving the way for new fingerprint recognition application scenarios.This work summarizes the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process. Additionally, technical considerations and trade-offs of the presented methods are discussed along with open issues and challenges. An overview of available research resources completes the work
- …