2,019 research outputs found

    Personal Authentication Using Finger Images

    Get PDF
    As the need for personal authentication increases, biometrics systems have become the ideal answer to the security needs. This paper presents a novel personal authentication system which uses simultaneously acquired finger-vein and finger texture images of the same person. A virtual fingerprint is generated combining these two images. The result of the combination i.e. the virtual fingerprint is then subjected to pre-processing steps including binarization, normalization, enhancement and Region of Interest (ROI) segmentation. Gabor filter is used to extract features. The feature extracted image is matched with the database. This proposed system is designed such that to achieve better performance in terms of matching accuracy, execution time, memory required and security. DOI: 10.17762/ijritcc2321-8169.15017

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Full text link
    This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements

    Future of Human Security Based on Computational Intellegence

    Get PDF
    This paper discusses the contact less palm veinauthentication device that uses blood vessel patterns as a personal identifying factor. The vein information is hard to duplicate since veins are internal to the human Body. This paper presents a review on the palm vein authentication process and its relevance and competence as compared to the contemporary Biometric methods. Th is authentication technology offers a high level of Accuracy. The importance of biometrics in the current field of Security has been illustrated in this paper. We have also outlined opinions about the utility of biometric authentication systems, comparison between different techniques and their advantages and disadvantage. Its significance is studied in this paper with reference to the banks, E-Voting, point of sale outlets and card/document less security system. Fujitsu plans to further expand applications for this technology by downsizing the sensor and improving the certification speed. I.2.m C.2.

    An FPGA Implementation Of Real-Time Finger-Vein Recognition System For Security Levels

    Get PDF
    In this project, we propose a real-time embedded finger-vein recognition system (FVRS) for authentication on mobile devices. The system is implemented on an embedded platform and equipped with a novel finger-vein recognition algorithm. The proposed system consists of four hardware modules: radio frequency identification system, image acquisition module, embedded main board, and human machine communication module. RFID module will start the very initial communication between the user and the device The image acquisition module is used to collect finger-vein images. The Spartan 3AN FPGA is used to execute the finger-vein recognition algorithm and communicate with the peripheral device. The human machine communication module (LED or keyboard) is used to display recognition results and receive inputs from users

    An Analytical Survey on Vein Pattern Recognition

    Get PDF
    Biometric is term of science to identify a person identity using their physiological features. Currently, vein pattern recognition has attracted the attention of the technology and industry all over the world. A vein is network of blood vessels under the skin of an individual. The vascular pattern is different for every person in the same part or region of the body. It is stable till very long age. As the veins are underneath the skin it is very difficult for intruder or forger to copy the feature. This uniqueness and strong immunity from intruders make it more potent biometric system which avails us secure features for individual identity verification. This paper involves the description of vein pattern recognition, its requirement and its importance in biometric system. Different feature extraction algorithms are reviewed as independent component analysis, principal component analysis method. For classification in vein pattern recognition we have reviewed support vector machine and neural network techniques. Parameters are described based on which results are computed like true positive, false positive, true negative, false negative, accuracy and precision

    A New Hand Based Biometric Modality & An Automated Authentication System

    Get PDF
    With increased adoption of smartphones, security has become important like never before. Smartphones store confidential information and carry out sensitive financial transactions. Biometric sensors such as fingerprint scanners are built in to smartphones to cater to security concerns. However, due to limited size of smartphone, miniaturised sensors are used to capture the biometric data from the user. Other hand based biometric modalities like hand veins and finger veins need specialised thermal/IR sensors which add to the overall cost of the system. In this paper, we introduce a new hand based biometric modality called Fistprint.  Fistprints can be captured using digital camera available in any smartphone. In this work, our contributions are: i) we propose a new non-touch and non-invasive hand based biometric modality called fistprint. Fistprint contains many distinctive elements such as fist shape, fist size, fingers shape and size, knuckles, finger nails, palm crease/wrinkle lines etc. ii) Prepare fistprint DB for the first time. We collected fistprint information of twenty individuals - both males and females aged from 23 years to 45 years of age. Four images of each hand fist (total 160 images) were taken for this purpose. iii) Propose Fistprint Automatic Authentication SysTem (FAAST). iv) Implement FAAST system on Samsung Galaxy smartphone running Android and server side on a windows machine and validate the effectiveness of the proposed modality. The experimental results show the effectiveness of fistprint as a biometric with GAR of 97.5 % at 1.0% FAR

    Biometrics for internet‐of‐things security: A review

    Get PDF
    The large number of Internet‐of‐Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric‐based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric‐cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state‐of‐the‐art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward‐looking issues and future research directions

    Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

    Full text link
    Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are well suited for continuous, and sometimes more unobtrusive, operation. One important application domain for biometrics is deauthentication, a means of quickly detecting absence of a previously authenticated user and immediately terminating that user's active secure sessions. Deauthentication is crucial for mitigating so called Lunchtime Attacks, whereby an insider adversary takes over (before any inactivity timeout kicks in) authenticated state of a careless user who walks away from her computer. Motivated primarily by the need for an unobtrusive and continuous biometric to support effective deauthentication, we introduce PoPa, a new hybrid biometric based on a human user's seated posture pattern. PoPa captures a unique combination of physiological and behavioral traits. We describe a low cost fully functioning prototype that involves an office chair instrumented with 16 tiny pressure sensors. We also explore (via user experiments) how PoPa can be used in a typical workplace to provide continuous authentication (and deauthentication) of users. We experimentally assess viability of PoPa in terms of uniqueness by collecting and evaluating posture patterns of a cohort of users. Results show that PoPa exhibits very low false positive, and even lower false negative, rates. In particular, users can be identified with, on average, 91.0% accuracy. Finally, we compare pros and cons of PoPa with those of several prominent biometric based deauthentication techniques

    Identification and Security Implications of Biometrics

    Get PDF
    The usage of biometrics has become more frequent over the past couple of decades, notably due to technological advancements. Evolving technology in the field of biometrics has also led to increased accuracy of associated software, which have provided the opportunity to use a multitude of different human characteristics for identification and/or verification purposes. The current study assessed the usage of biometrics in casinos, hospitals, and law enforcement agencies using a survey methodology. Results indicated that privacy concerns related to the use of biometrics may not be as prevalent as indicated in the literature. Additionally, results indicated that the utilization of biometrics has led to increased accuracy in identification and verification processes, led to enhanced security, and would be highly recommended to other institutions. Information obtained from the literature notes the racial bias in facial recognition technologies due to algorithmic development based solely upon features of Caucasian individuals. Efforts need to be made to create facial recognition algorithms that are more racially and ethnically diverse
    • 

    corecore