881 research outputs found

    Computers and Electronics in Agriculture / Towards the applicability of biometric wood log traceability using digital log end images

    Get PDF
    Log traceability in the timber based industries is a basic requirement to fulfil economical, social and legal requirements. This work introduces biometric log recognition using digital log end images and explores the robustness to a set of log end cross-section (CS) variations. In order to investigate longitudinal and surface CS variations three tree logs were sliced and captured in different sessions. A texture feature-based technique well known from fingerprint recognition is adopted to compute and match biometric templates of CS images captured from log ends. In the experimental evaluation insights and constraints on the general applicability and robustness of log end biometrics to identify logs in an industrial application are presented. Results for different identification performance scenarios indicate that the matching procedure which is based on annual ring pattern and shape information is very robust to log length cutting using different cutting tools. The findings of this study are a further step towards the development of a biometric log recognition system.(VLID)223160

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Gender Estimation from Fingerprints Using DWT and Entropy

    Get PDF
    Gender estimation from fingerprints have wide range of applications, especially in the field of forensics where identifying the gender of a criminal can reduce the list of suspects significantly. Although there have been quite a few research papers in the field of gender estimation from fingerprints most of those experiments used a lot of features but were only able to achieve poor classification results. That being the motivation behind the study we successfully proposed two different approaches for gender estimation from fingerprints and achieved high classification accuracy.;In this study we have developed two different approaches for gender estimation from fingerprints. The dataset used consists of 498 fingerprints of which 260 are male and 238 are female fingerprints. The first approach is based on wavelet analysis and uses features obtained from a six level discrete wavelet transform (DWT). Classification is performed using a decision stump classifier implemented in weka and was able to achieve a classification accuracy of 95.38% using the DWT approach. The second approach uses wavelet packet analysis and extracted the Shannon entropy and log-energy entropy from the coefficients of wavelet packet transform and provided a classification accuracy of 96.59% on the same dataset using decision stump classifier implemented in weka

    Face Liveness Detection under Processed Image Attacks

    Get PDF
    Face recognition is a mature and reliable technology for identifying people. Due to high-definition cameras and supporting devices, it is considered the fastest and the least intrusive biometric recognition modality. Nevertheless, effective spoofing attempts on face recognition systems were found to be possible. As a result, various anti-spoofing algorithms were developed to counteract these attacks. They are commonly referred in the literature a liveness detection tests. In this research we highlight the effectiveness of some simple, direct spoofing attacks, and test one of the current robust liveness detection algorithms, i.e. the logistic regression based face liveness detection from a single image, proposed by the Tan et al. in 2010, against malicious attacks using processed imposter images. In particular, we study experimentally the effect of common image processing operations such as sharpening and smoothing, as well as corruption with salt and pepper noise, on the face liveness detection algorithm, and we find that it is especially vulnerable against spoofing attempts using processed imposter images. We design and present a new facial database, the Durham Face Database, which is the first, to the best of our knowledge, to have client, imposter as well as processed imposter images. Finally, we evaluate our claim on the effectiveness of proposed imposter image attacks using transfer learning on Convolutional Neural Networks. We verify that such attacks are more difficult to detect even when using high-end, expensive machine learning techniques

    Green strength optimization of injection molding proces for novel recycle binder system using Taguchi method

    Get PDF
    Metal injection molding is a worldwide technology that world use as a predominant method in manufacturing. Optimizing the injection molding process is critical in obtaining a good shape retention of green components and improving manufacturing processes itself. This research focuses on the injection molding optimization which correlated to a single response of green strength which implementing orthogonal array of Taguchi L9 (34). It involved the effect of four molding factors: injection temperature, mold temperature, injection pressure and injection speed, towards green strength. The significant levels and contribution to the variables of green strength are determined using the analysis of variance. Manual screening test is conducted in regards of identifying the appropriate level of each factors. The study demonstrated that injection temperature was the most influential factor contributes to the best green strength, followed by mold temperature, injection speed and injection pressure. The optimum condition for attaining optimal green strength was definitely by conducting injection molding at; 160 ºC of injection temperature, 40 ºC of mold temperature, 50 % of injection pressure and 50 % of injection speed. The confirmation experiment result is 15.5127 dB and it was exceeding minimum requirement of the optimum performance. This research reveals that the proposed approach can excellently solve the problem with minimal number of trials, without sacrificing the ability of evaluating the appropriate condition to achieve related response, which is green strength

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Enhanced iris recognition: Algorithms for segmentation, matching and synthesis

    Get PDF
    This thesis addresses the issues of segmentation, matching, fusion and synthesis in the context of irises and makes a four-fold contribution. The first contribution of this thesis is a post matching algorithm that observes the structure of the differences in feature templates to enhance recognition accuracy. The significance of the scheme is its robustness to inaccuracies in the iris segmentation process. Experimental results on the CASIA database indicate the efficacy of the proposed technique. The second contribution of this thesis is a novel iris segmentation scheme that employs Geodesic Active Contours to extract the iris from the surrounding structures. The proposed scheme elicits the iris texture in an iterative fashion depending upon both the local and global conditions of the image. The performance of an iris recognition algorithm on both the WVU non-ideal and CASIA iris database is observed to improve upon application of the proposed segmentation algorithm. The third contribution of this thesis is the fusion of multiple instances of the same iris and multiple iris units of the eye, i.e., the left and right iris at the match score level. Using simple sum rule, it is demonstrated that both multi-instance and multi-unit fusion of iris can lead to a significant improvement in matching accuracy. The final contribution is a technique to create a large database of digital renditions of iris images that can be used to evaluate the performance of iris recognition algorithms. This scheme is implemented in two stages. In the first stage, a Markov Random Field model is used to generate a background texture representing the global iris appearance. In the next stage a variety of iris features, viz., radial and concentric furrows, collarette and crypts, are generated and embedded in the texture field. Experimental results confirm the validity of the synthetic irises generated using this technique
    corecore