20 research outputs found

    A comparison of 2D and 3D Delaunay triangulations for fingerprint authentication

    Get PDF
    The two-dimensional (2D) Delaunay triangulation-based structure, i.e., Delaunay triangle, has been widely used in fingerprint authentication. However, we also notice the existence of three-dimensional (3D) Delaunay triangulation, which has not been extensively explored. Inspired by this, in this paper, the features of both 2D and 3D Delaunay triangulation-based structures are investigated and the findings show that a 3D Delaunay structure, e.g., Delaunay tetrahedron, can provide more feature types and a larger number of elements than a 2D Delaunay structure, which was expected to provide a higher discriminative capability. However, higher discrimination does not necessarily lead to better performance, especially in biometric applications, when biometric uncertainty is unavoidable. Experimental results show that the biometric uncertainty such as missing or spurious minutiae causes more negative influence on the 3D Delaunay triangulation than that on the 2D Delaunay triangulation in three out of four experimental data sets

    Biometrics based privacy-preserving authentication and mobile template protection

    Get PDF
    Smart mobile devices are playing a more and more important role in our daily life. Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data. However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. Moreover, the attacks via record multiplicity (ARM) present a threat to the existing cancelable biometrics, which is still a challenging open issue. To address these problems, in this paper, we propose a new cancelable fingerprint template which can not only mitigate the negative effect of nonlinear distortion by combining multiple feature sets, but also defeat the ARM attack through a proposed feature decorrelation algorithm. Our work is a new contribution to the design of cancelable biometrics with a concrete method against the ARM attack. Experimental results on public databases and security analysis show the validity of the proposed cancelable template

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Indexing techniques for fingerprint and iris databases

    Get PDF
    This thesis addresses the problem of biometric indexing in the context of fingerprint and iris databases. In large scale authentication system, the goal is to determine the identity of a subject from a large set of identities. Indexing is a technique to reduce the number of candidate identities to be considered by the identification algorithm. The fingerprint indexing technique (for closed set identification) proposed in this thesis is based on a combination of minutiae and ridge features. Experiments conducted on the FVC2002 and FVC2004 databases indicate that the inclusion of ridge features aids in enhancing indexing performance. The thesis also proposes three techniques for iris indexing (for closed set identification). The first technique is based on iriscodes. The second technique utilizes local binary patterns in the iris texture. The third technique analyzes the iris texture based on a pixel-level difference histogram. The ability to perform indexing at the texture level avoids the computational complexity involved in encoding and is, therefore, more attractive for iris indexing. Experiments on the CASIA 3.0 database suggest the potential of these schemes to index large-scale iris databases

    A new algorithm for minutiae extraction and matching in fingerprint

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%

    Multi-Modal Biometrics: Applications, Strategies and Operations

    Get PDF
    The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest and most appropriate strategy for handling these challenges is the use of naturally endowed biometrics, which are the human physiological and behavioural characteristics. This paper presents an overview of the use of biometrics for human verification and identification. The applications, methodologies, operations, integration, fusion and strategies for multi-modal biometric systems that give more secured and reliable human identity management is also presented

    Fingerabdruckswachstumvorhersage, Bildvorverarbeitung und Multi-level Judgment Aggregation

    Get PDF
    Im ersten Teil dieser Arbeit wird Fingerwachstum untersucht und eine Methode zur Vorhersage von Wachstum wird vorgestellt. Die EffektivitĂ€t dieser Methode wird mittels mehrerer Tests validiert. Vorverarbeitung von Fingerabdrucksbildern wird im zweiten Teil behandelt und neue Methoden zur SchĂ€tzung des Orientierungsfelds und der Ridge-Frequenz sowie zur Bildverbesserung werden vorgestellt: Die Line Sensor Methode zur OrientierungsfeldschĂ€tzung, gebogene Regionen zur Ridge-Frequenz-SchĂ€tzung und gebogene Gabor Filter zur Bildverbesserung. Multi-level Jugdment Aggregation wird eingefĂŒhrt als Design Prinzip zur Kombination mehrerer Methoden auf mehreren Verarbeitungsstufen. Schließlich wird Score Neubewertung vorgestellt, um Informationen aus der Vorverarbeitung mit in die Score Bildung einzubeziehen. Anhand eines Anwendungsbeispiels wird die Wirksamkeit dieses Ansatzes auf den verfĂŒgbaren FVC-Datenbanken gezeigt.Finger growth is studied in the first part of the thesis and a method for growth prediction is presented. The effectiveness of the method is validated in several tests. Fingerprint image preprocessing is discussed in the second part and novel methods for orientation field estimation, ridge frequency estimation and image enhancement are proposed: the line sensor method for orientation estimation provides more robustness to noise than state of the art methods. Curved regions are proposed for improving the ridge frequency estimation and curved Gabor filters for image enhancement. The notion of multi-level judgment aggregation is introduced as a design principle for combining different methods at all levels of fingerprint image processing. Lastly, score revaluation is proposed for incorporating information obtained during preprocessing into the score, and thus amending the quality of the similarity measure at the final stage. A sample application combines all proposed methods of the second part and demonstrates the validity of the approach by achieving massive verification performance improvements in comparison to state of the art software on all available databases of the fingerprint verification competitions (FVC)

    Um novo arcabouço para anålise de qualidade de imagens de impressÔes digitais de alta resolução

    Get PDF
    Orientador: Neucimar JerĂŽnimo LeiteTese (doutorado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: A falta de robustez referente Ă  degradação de qualidade de conjuntos de caracterĂ­sticas extraĂ­das de padrĂ”es de cristas-e-vales, contidos na epiderme dos dedos humanos, Ă© uma das questĂ”es em aberto na anĂĄlise de imagens de impressĂ”es digitais, com implicaçÔes importantes em problemas de segurança, privacidade e fraude de identificação. Neste trabalho, introduzimos uma nova metodologia para analisar a qualidade de conjuntos de caracterĂ­sticas de terceiro nĂ­vel em imagens de impressĂ”es digitais representados, aqui, por poros de transpiração. A abordagem sugerida leva em conta a interdependĂȘncia espacial entre as caracterĂ­sticas consideradas e algumas transformaçÔes bĂĄsicas envolvendo a manipulação de processos pontuais e sua anĂĄlise a partir de ferramentas anisotrĂłpicas. Foram propostos dois novos algoritmos para o cĂĄlculo de Ă­ndices de qualidade que se mostraram eficazes na previsĂŁo da qualidade da correspondĂȘncia entre as impressĂ”es e na definição de pesos de filtragem de caracterĂ­sticas de baixa qualidade a ser empregado num processo de identificação. Para avaliar experimentalmente o desempenho destes algoritmos e suprir a ausĂȘncia de uma base de dados com nĂ­veis de qualidade controlados, criamos uma base de dados com diferentes recursos de configuração e nĂ­veis de qualidade. Neste trabalho, propusemos ainda um mĂ©todo para reconstruir imagens de fase da impressĂŁo digital a partir de um dado conjunto de coordenadas de poros. Para validar esta idĂ©ia sob uma perspectiva de identificação, consideramos conjuntos de minĂșcias presentes nas imagens reconstruĂ­das, inferidas a partir das configuraçÔes de poros, e associamos este resultado ao problema tĂ­pico de casamento de impressĂ”es digitaisAbstract: The lack of robustness against the quality degradation affecting sets of features extracted from patterns of epidermal ridges on our fingers is one of the open issues in fingerprint image analysis, with implications for security, privacy, and identity fraud. In this doctorate work we introduce a new methodology to analyze the quality of sets of level-3 fingerprint features represented by pores. Our approach takes into account the spatial interrelationship between the considered features and some basic transformations involving point process and anisotropic analysis. We propose two new quality index algorithms, which have proved to be effective as a matcher predictor and in the definition of weights filtering out low-quality features from an identification process. To experimentally assess the performance of these algorithms and supply the absence of a feature-based controlled quality database in the biometric community, we created a dataset with features configurations containing different levels of quality. In this work, we also proposed a method for reconstructing phase images from a given set of pores coordinates. To validate this idea from an identification perspective, we considered the set of minutia present in the reconstructed images and inferred from the pores configurations and used this result in fingerprint matchingsDoutoradoCiĂȘncia da ComputaçãoDoutor em CiĂȘncia da Computação01-P-3951/2011147050/2012-0CAPESCNP
    corecore