16 research outputs found

    Deep finger texture learning for verifying people

    Get PDF
    Finger Texture (FT) is currently attracting significant attentions in the area of human recognition. Finger texture covers the area between the lower knuckle of the finger and the upper phalanx before the fingerprint. It involves rich features which can be efficiently used as a biometric characteristic. In this paper, we contribute to this growing area by proposing a new verification approach, i.e., Deep Finger Texture Learning (DFTL). To the best of our knowledge, this is the first time that deep learning is employed for recognizing people by using the FT characteristic. Four databases have been used to evaluate the proposed method: the Hong Kong Polytechnic University Contact-free 3D/2D (PolyU2D), Indian Institute of Technology Delhi (IITD), CASIA Blue spectral (CASIA-BLU) corresponding to spectral 460nm and CASIA White spectral (CASIA-WHT) from the CASIA Multi-Spectral images database. The obtained results have shown superior performance compared with recent literature. The Verification Accuracies (VAs) have attained 100%, 98.65%, 100% and 98% for the four databases of PolyU2D, IITD, CASIA-BLU and CASIA-WHT, respectively

    Personal verification based on multi-spectral finger texture lighting images

    Get PDF
    Finger Texture (FT) images acquired from different spectral lighting sensors reveal various features. This inspires the idea of establishing a recognition model between FT features collected using two different spectral lighting forms to provide high recognition performance. This can be implemented by establishing an efficient feature extraction and effective classifier, which can be applied to different FT patterns. So, an effective feature extraction method called the Surrounded Patterns Code (SPC) is adopted. This method can collect the surrounded patterns around the main FT features. It is believed that these patterns are robust and valuable. The SPC approach proposes using a single texture descriptor for FT images captured under multispectral illuminations, where this reduces the cost of employing different feature extraction methods for different spectral FT images. Furthermore, a novel classifier termed the Re-enforced Probabilistic Neural Network (RPNN) is proposed. It enhances the capability of the standard Probabilistic Neural Network (PNN) and provides better recognition performance. Two types of FT images from the Multi-Spectral CASIA (MSCASIA) database were employed as two types of spectral sensors were used in the acquiring device: the White (WHT) light and spectral 460 nm of Blue (BLU) light. Supporting comparisons were performed, analysed and discussed. The best results were recorded for the SPC by enhancing the Equal Error Rates (EERs) at 4% for spectral BLU and 2% for spectral WHT. These percentages have been reduced to 0% after utilizing the RPNN

    Sensing Data Concealment in NFTs: A Steganographic Model for Confidential Cross-Border Information Exchange

    No full text
    In an era dominated by rapid digitalization of sensed data, the secure exchange of sensitive information poses a critical challenge across various sectors. Established techniques, particularly in emerging technologies like the Internet of Things (IoT), grapple with inherent risks in ensuring data confidentiality, integrity, and vulnerabilities to evolving cyber threats. Blockchain technology, known for its decentralized and tamper-resistant characteristics, stands as a reliable solution for secure data exchange. However, the persistent challenge lies in protecting sensitive information amidst evolving digital landscapes. Among the burgeoning applications of blockchain technology, non-fungible tokens (NFTs) have emerged as digital certificates of ownership, securely recording various types of data on a distributed ledger. Unlike traditional data storage methods, NFTs offer several advantages for secure information exchange. Firstly, their tamperproof nature guarantees the authenticity and integrity of the data. Secondly, NFTs can hold both immutable and mutable data within the same token, simplifying management and access control. Moving beyond their conventional association with art and collectibles, this paper presents a novel approach that utilizes NFTs as dynamic carriers for sensitive information. Our solution leverages the immutable NFT data to serve as a secure data pointer, while the mutable NFT data holds sensitive information protected by steganography. Steganography embeds the data within the NFT, making them invisible to unauthorized eyes, while facilitating portability. This dual approach ensures both data integrity and authorized access, even in the face of evolving digital threats. A performance analysis confirms the approach’s effectiveness, demonstrating its reliability, robustness, and resilience against attacks on hidden data. This paves the way for secure data transmission across diverse industries

    LSS-officials and disabled children and guardians

    No full text
    The purpose of this study was to better understand howLSS-officials within several swedish municipalities understand and handles their discretion in regard to children and guardians who has a certain form of physical or mental disability. If or how those LSS-officials shape the services they are responsible for to help the families as a whole with their parental abilities. We will try to illustrate how the LSS-officials reflects upon the guardians ability to care for their children and how they assess the services they are able to provide in relation to those children and guardians needs. We have used qualitative method and semi-structured interviews in the study. To help analyze our material we have used Michael Lipsky’s theory about street-level bureaucracy as well as Roine Johansson’s criticism and attempt to refine the theory. Our results showed us that the LSS-officials we interviewed have varying discretion in their work with children and guardians with disabilities due to the swedish law that supports services for disability. Moreover we found that the LSS-officialshad trouble understanding how some available services could function in regards to different forms of disability. We also found that they sought different services such as parental guidance for the parents in their homes to improve the work with the children and guardians

    Identification of Dynamic Models by Using Metaheuristic Algorithms

    No full text
    A modified versions of metaheuristic algorithms are presented to compare their performance in identifying the structural dynamic systems. Genetic algorithm, biogeography based optimization algorithm, ant colony optimization algorithm and artificial bee colony algorithm are heuristic algorithms that have robustness and ease of implementation with simple structure. Different algorithms were selected some from evolution algorithms and other from swarm algorithms   to boost the equilibrium of global searches and local searches, to compare the performance and investigate the applicability of proposed algorithms to system identification; three cases are suggested under different conditions concerning data availability, different noise rate and previous familiarity of parameters. Simulation results show these proposed algorithms produce excellent parameter estimation, even with little measurements and a high noise rate.</jats:p

    Robustness and performance of Deep Reinforcement Learning

    No full text
    Deep Reinforcement Learning (DRL) has recently obtained considerable attention. It empowers Reinforcement Learning (RL) with Deep Learning (DL) techniques to address various difficult tasks. In this paper, a novel approach called the \emph{Genetic Algorithm of Neuron Coverage} (GANC) is proposed. It is motivated for improving the robustness and performance of a DRL network. The GANC uses Genetic Algorithm (GA) to maximise the Neuron Coverage (NC) of a DRL network by producing augmented inputs. We apply this method in the self-driving car applications, where it is crucial to accurately provide a correct decision for different road tracking views. We evaluate our method on the SYNTHIA-SEQS-05 databases in four different driving environments. Our outcomes are very promising - the best driving accuracy reached 97.75% - and are superior to the state-of-the-art results
    corecore