Biometric Research Papers - Academia.edu (original) (raw)

This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or... more

This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or two-factor authentication system more preferable. By using the probability of system failure, this study generalizes all possible combination of authentication systems into four different cases. This generalization allows us to compare different systems and to determine the key factors managers need to consider when adopting a new authentication system. The key factors are (1) additional implementation costs, (2) customer switching which is determined by the market share and customers' preferences, and (3) expected losses when the new system fails. This study also suggests that if the provider chooses an expensive new system, the provider needs to have a larger market share to justify the spending. Also, regulators can encourage the adoption of a more secure authentication system by changing the penalty a firm faces when the system fails. Finally, it could also be preferable to have both one-factor and two-factor authentication systems depending on the customers' characteristics.

Traditional user authentication or identification systems are interested in something that you possess (like a key, an identification card, etc.) or something you already know (like a password, or a PIN). With biometrics, this interest... more

Traditional user authentication or identification systems are interested in something that you possess (like a key, an identification card, etc.) or something you already know (like a password, or a PIN). With biometrics, this interest has been shifted towards a different approach :something that are part of you (fingerprints or face) or something you make (e.g., handwritten signature or voice). Identification system works in such a way that the system obtains one sample and compares with each record in the database. This method is a comparison named “one-to-many. Behaviours and rhythms of the typing characters are used as a biometric authentication system named as Keystroke Dynamics. Unlike most identification systems that require specific hardware, keystroke dynamics requires only a keyboard. In the proposed approach, short fixed text is used like in the login approaches. The d-variate Gaussian, kNN and decision tree algorithms are tested on CMU keystroke database.

— A palm print refers to an image acquired of the palm region of the hand. Palm print image enhancement is required for better feature extraction. To extract fine features enhancement is required. Fine features increase the accuracy of... more

— A palm print refers to an image acquired of the palm region of the hand. Palm print image enhancement is required for better feature extraction. To extract fine features enhancement is required. Fine features increase the accuracy of palm print recognition system. The main purpose of this review paper is to study and compare various palm print recognition techniques in terms of performance, accuracy, overheads and Peak Signal to Noise Ratio (PSNR).

This paper explains the liveness detection of the biometric system using the Face-Iris Images and deep learning classification. We have proposed novel hybrid algorithms for Face-Iris Liveness Recognition which can be used in cyber... more

This paper explains the liveness detection of the biometric system using the Face-Iris Images and deep learning classification. We have proposed novel hybrid algorithms for Face-Iris Liveness Recognition which can be used in cyber security authentication.In proposed model the individual identification is obtained from the extracted features that captured from face-Iris Images. Iris recognition is one of the most important biometric traits in which the iris image will be processed by some type of reliable, robust, and fast algorithm to capture the unique features embedded in iris. The camera system in which is used to capture the iris image will register depicts changes and variations in size of Iris as exposed to the light during the checkup and individual identification. This information will be used to verify the liveness of the iris image and distinguish the real lived iris image from the faked iris image. The recognition system based on the iris images are costly and required high resolution optical sensors and camera system beside the presence of the individual at the time of authentication and verification. The face image may change in certain degree such as appearance but shape and structure of face skeleton , location of eyes, mouth, and nose are remain unchanged. Due to this remarkable characteristic and ability to generate the face image features with near perfect identifiers and lack of requirement for physical contact with recognition system has made the facial recognition system remarkable. Our proposed face-iris feature extraction has been used to detect the fake face or iris from the real one and genuine live iris from the printed iris information by using the cosmetic lens. Our proposed model is based on the iris and face images in which high resolution camera and sensors are required at site to distinguish liveness Iris from fake one along with the high resolution algorithms that use combinations of DWT and SVD. The findings and results have shown the superiority our method,DWT-SVD, compared with hybrid of DCT, HT, MT with SVD, respectively. Our algorithm could be used to identify the fake Iris and face and greatly improve the cyber security. The extracted features can be obtained from videos or face images which have been captured from the scene even without individual physical contract. Our proposed model has been used for authentication and identification of the individuals based on the extracted features obtained from a new hybrid algorithm using both SVD and DWT.In proposed algorithm the face-iris features have been extracted and they are saved in the face-iris feature vectors for recognition. The Euclidian Distance vector has been used to classify the feature vectors extracted from live and fake face-iris images. The result and comparison of the proposed face-Iris recognition based on DWT-SVD with other technique has shown. Our method not only has higher speed of operation compared with other techniques but its rate of recognition is also good s as shown in the tabulated results.Experimental results also have shown that the hybrid methods of MT-SVD and HT-SVD have a better recognition results compared with DWT-SVD but their complex computation and extra time requirements for real time systems make them less important that DWT-SVD.

Face image is an efficient biometric trait to recognize human beings without expecting any cooperation from a person. In this paper, we propose HVDLP: Horizontal Vertical Diagonal Local Pattern based face recognition using Discrete... more

Face image is an efficient biometric trait to recognize human beings without expecting any cooperation from a person. In this paper, we propose HVDLP: Horizontal Vertical Diagonal Local Pattern based face recognition using Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The face images of different sizes are converted into uniform size of 108×990and color images are converted to gray scale images in pre-processing. The Discrete Wavelet Transform (DWT) is applied on pre-processed images and LL band is obtained with the size of 54×45. The Novel concept of HVDLP is introduced in the proposed method to enhance the performance. The HVDLP is applied on 9×9 sub matrix of LL band to consider HVDLP coefficients. The local Binary Pattern (LBP) is applied on HVDLP of LL band. The final features are generated by using Guided filters on HVDLP and LBP matrices. The Euclidean Distance (ED) is used to compare final features of face database and test images to compute the performance parameters.

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student’s attendance is recorded using biometric scanner which is... more

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student’s attendance is recorded using biometric scanner which is fingerprint based and then the data is secured safely over a cloud storage. The system averts the proxy attendance, time will also be saved, thereby the reliability of student’s attendance information is also maximized. The student’s data are loaded securely over the cloud and can be easily fetched according to the need. This research paper throws a light on simple, easier and portable method for students’ attendance in which internet of things is used.

Abstract: The premise of this paper is to analyze the various biometric techniques. This paper provides an overview of different biometric technique with some advantages and disadvantages. The comparison criteria presented in this paper... more

Abstract: The premise of this paper is to analyze the various biometric techniques. This paper provides an overview of different biometric technique with some advantages and disadvantages. The comparison criteria presented in this paper is limited to acceptance, cost, accuracy, performance and cost. Author will try to find out which technique is more reliable and secure.

Fingerprint recognition is a widely used biometric identification mechanism. In case of correlation based fingerprint recognition detection of a consistent registration point is a crucial issue; this point can be a core point of a... more

Fingerprint recognition is a widely used biometric identification mechanism. In case of correlation based fingerprint recognition detection of a consistent registration point is a crucial issue; this point can be a core point of a fingerprint. Many techniques have been proposed but success rate is highly dependent on input used and accurate core point detection is still an open issue. Proposed paper discusses an algorithm which is based on multiple features derived from the fingerprints which are collectively used for consistent core point detection. . Though all fingerprints don't possess core point still this algorithm is useful to detect high curvature regions and gives high accuracy as it combines advantages form individual features. Proposed paper demonstrates the use of second derivative of Gaussian filters (SDG) together with pyramid technique for fingerprint image enhancement. For preprocessing of core point it uses segmentation (mean and variance) method to extract best...

The reason for studying the human iris is identification of a person. Albert Bertillon was the first person to notice this problem in the year 1880. He was a French physicist, who identified criminals by their irises. In the year 1987,... more

The reason for studying the human iris is identification of a person. Albert Bertillon was the first person to notice this problem in the year 1880. He was a French physicist, who identified criminals by their irises.
In the year 1987, this problem was studied by Leonard Flom and Aran Safir. According to their patent [4], the iris is stable throughout the human life. All the features are quite stable in number and position except rare anomalies. It has been discovered that every iris is unique and no two people can have identical irises.

The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man’s mundane as well as specialized activities has rendered it a part & parcel of... more

The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man’s mundane as well as specialized activities has rendered it a part & parcel of his life. With the advancement of technology the professional and personal information is now stored digitally in the memory of IC chips. Such vital information cannot be guarded against frauds through lock & key. In order to ensure denial of access to classified data by unauthorized persons, passwords & secret codes were implemented. But the security tools like smart cards, magnetic stripe cards & physical keys can be lost, stolen or duplicated. Passwords can be forgotten, shared or unintentionally observed by a third party. Instead of guaranteeing a foolproof security system these tools become a nuisance for the users. The most rapidly emerging technology for security system is the BIOMETRIC TECHNOLOGY. Biometric user authentication techniques can be used to protect PCs & Networks from unauthorized access by authenticating users based on a physical feature such as fingerprints, retina, iris, hand or face. Biometrics is a means of using parts of human body as a kind of permanent password. Biometrics turns your face, hand or eye into your badge of identity. We attempt to find the best solution in different situations & compare the pros & cons.

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student's attendance is recorded using biometric scanner which is... more

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student's attendance is recorded using biometric scanner which is fingerprint based and then the data is secured safely over a cloud storage. The system averts the proxy attendance, time will also be saved, thereby the reliability of student's attendance information is also maximized. The student's data are loaded securely over the cloud and can be easily fetched according to the need. This research paper throws a light on simple, easier and portable method for students' attendance in which internet of things is used.

In the previous few years' robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a... more

In the previous few years' robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a question on the present security and demands something new in the system which can provide the second level of security. So for that in this paper, there is added some extra security to the current ATM Systems. We use the fingerprint system and One Time Password (OTP) which is sent to the user registration mobile number through GSM Module system. After that, the user will be able to complete the transaction securely. The working of this ATM machine is when the customer places his finger on the fingerprint module when access it automatically generates different 4-digit code as a message every time to the mobile of the authorized customer through GSM modem which is connected to the microcontroller [1]. The code received by the customer should be entered by pressing the keys on the keypad provided. This proposal will go a long way to resolve the problem of bank account safety and transaction.

The field of Biometrics is an ever-expanding research area formed of different perceptions and theories from identity to verification. This can be fascinating with numerous aspects usually leading to authentication and security. Biometric... more

The field of Biometrics is an ever-expanding research area formed of different perceptions and theories from identity to verification. This can be fascinating with numerous aspects usually leading to authentication and security. Biometric identification involves capturing a physical element of an individual, which can be later used for verification by running multiple checks against stored data. It uses different methods to pattern match an individual and has always proven difficult to replicate. This is because each individual has a unique set of characteristics and no matching traits even in the case of identical twins. This research report presents an overview of various authorization and authentication techniques currently making use of biometrics technology. Moreover, a brief overview of biometric history is discussed to give an insight where it all began and how the use of technology has advanced its development. There is a variety of biometric authentication technologies used in today’s society, which are explored. One aspect to consider when deliberating about the use of biometric systems and how each application method has evolved is; at what point does the matter of security become an invasion of privacy?

With the rapid growth in technology there is a need to increase security measures to take security system at next level. Cyber security is of developing concern to every single person, as information technology has become all too common.... more

With the rapid growth in technology there is a need to increase security measures to take security system at next level. Cyber security is of developing concern to every single person, as information technology has become all too common. The confidential and critical data of the user is there on the system and is highly susceptible to strike. Therefore it is important to validation the devices or to control the sustainable access of the system to permitted users only. Previous understanding-based and badge-based validation mechanisms are slowly ineffectual and therefore assailant find multiple technique to overcome these methods. Biometric validation is a significant step forward in an independent person authentication. Biometric characteristics are closely connected to a single person and a strong tool for permitting user entrance. Biometrics is the modern technology of measuring and analyzing human body biological data to improve system safety by supplying precise and useful prototype and procedures for the authentication and recognition of individuals, and its applications are commonly utilized in government sectors, defense as well as industry. This paper examines the dif erent biometric characteristics commonly utilized in a biometric system and the dif erent type of biometric system.

As there is a rapid increase in technology development increase in identity theft, consumer fraud, threat to personal data also increasing day by day. The methods developed earlier to secure personal information from theft were not... more

As there is a rapid increase in technology development increase in identity theft, consumer fraud, threat to personal data also increasing day by day. The methods developed earlier to secure personal information from theft were not efficient and safe. Biometrics were introduced when there was a need of technology to secure personal information more efficiently. The old fashioned traditional approaches such as Personal Identification Number(PIN), passwords, keys, login id can be forgotten, stolen or lost. In biometric authentication system, a user does not need to remember any passwords or carry any keys. Like humans recognize each other by physical appearance and behavioural characteristics biometric systems makes use of physical characteristics like fingerprints, facial recognition, iris recognition to distinguish between a genuine user and an impostor. Initially biometric identification methods were developed to enhance security in government and corporate sectors, but nowadays it has made its way to almost all the private sectors like Banking. Finance, Home safety and security, Healthcare, Commercial safety and security etc. Since biometrics samples and templates of a biometric system which has single biometric feature to recognize a user can be replaced and duplicated, a new idea of fusion of multiple biometric identification technology has been introduced called multi modal biometric recognition systems which makes use of two or more biometric characteristics of an individual to identify as a genuine user or not.

Now a day, peoples have multiple bank accounts so money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this... more

Now a day, peoples have multiple bank accounts so money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this shortcoming of money transactions, we proposes the idea of using fingerprints of customers as login multiple banking password in place of traditional pin number. Here, if the fingerprint is recognized, then it display the multiple banking screen. Then we can choose the bank which we need for transaction. The remaining feature are same as i.e., a reference fingerprint of the nominee or a close family member of the customer can be used if the customer is not available in case of emergencies. This proposed business model helps the society, mainly the rural people, by enhancing the security using Fingerprint recognition in Digital image processing. As the fingerprint of every person is unique and unchangeable, this biometric feature is used over the others

Biometrics is a system in which we used to recognize human on the basis of its physical or behavioral characteristics. Today all over the world every country wants security of data, physical access, etc. Face recognition is widely... more

Biometrics is a system in which we used to recognize human on the basis of its physical or behavioral characteristics. Today all over the world every country wants security of data, physical
access, etc. Face recognition is widely accepted technique in human being same things are used in computer vision by using the image processing. In this paper we have used Principle Component Analysis (PCA) and Linear Discriminant Analysis (LDA) for extraction of features. Techniques has been applied for identification of a person on various databases such as ORL, Indian & KVKR and distance is calculated by using Euclidian Distance between training images and testing images. In this experiment total 1266 images used apart from that 25 subject from KVKR Face database this database is developed under UGC-SAP Phase I (our own major contribution) having 10 pose of each subject, 40 subjects from ORL having 10 images each, and from IIT Indian database 56 subjects, 11 images per subjects. After apply PCA on ORL Database the highest RR 97.50% for experiment 1:8 images, on KVKR-Face Database we got 92.00% RR for 1:9 and on IIT-Indian database 62.50% RR for 1:9. After applied LDA on ORL database we got the result 80.00% is highest RR, also applied on KVKR-Face database we got excellent result 100% RR and on IIT-Indian database 64.29% RR.

We propose a solution to handle this problem. We are extending upon the paper where Contextual Generative Adversarial Networks are used to generate a band of aged images from one single image. The images of different age groups will be... more

We propose a solution to handle this problem. We are extending upon the paper where Contextual Generative Adversarial Networks are used to generate a band of aged images from one single image. The images of different age groups will be generated from one single picture but with the same context. We are using the resulting images for face validation as a photo verification system. Our algorithm will use the band of generated images of different age groups and will match it with the current face of the person. If the match score goes beyond a limit, the photo identity will be validated, or else a warning will be triggered. This system will play an important role in places where there’s a need for higher security and better ways of validation.

Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. Among the types of... more

Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. Among the types of biometric being used currently, iris is the most accurate and it remains stable throughout a person’s life. However the major challenge on iris and other biometric for authentication is the intra user variability in the acquired identifiers. Iris of the same person captured at different time may differ due to the signal noise of the iris camera. Traditional cryptography method is unable to encrypt and store biometric template, then perform the matching directly. Minor changes in the bits of the feature set extracted from the iris may lead to a huge difference in the results of the encrypted feature. In our approach, an iris biometric template is secured using iris biometric and passwords. Error Correction Code, ECC is introduced to reduce the variability and noise of the iris data. Experimental results show that this approach can assure a higher security with a low false rejection or false acceptance rate. The successful iris recognition rate using this approach is up to 97%.

The self-quotient image is a biologically inspired representation which has been proposed as an illumination invariant feature for automatic face recognition. Owing to the lack of strong domain specific assumptions underlying this... more

The self-quotient image is a biologically inspired representation which has been proposed as an illumination invariant feature for automatic face recognition. Owing to the lack of strong domain specific assumptions underlying this representation, it can be readily extracted from raw images irrespective of the persons's pose, facial expression etc. What makes the self-quotient image additionally attractive is that it can be computed quickly and in a closed form using simple low-level image operations. However, it is generally accepted that the self-quotient is insufficiently robust to large illumination changes which is why it is mainly used in applications in which low precision is an acceptable compromise for high recall (e.g. retrieval systems). Yet, in this paper we demonstrate that the performance of this representation in challenging illuminations has been greatly underestimated. We show that its error rate can be reduced by over an order of magnitude, without any changes to the representation itself. Rather, we focus on the manner in which the dissimilarity between two self-quotient images is computed. By modelling the dominant sources of noise affecting the representation, we propose and evaluate a series of different dissimilarity measures, the best of which reduces the initial error rate of 63.0% down to only 5.7% on the notoriously challenging YaleB data set.

Digital face images and fingerprint images are included in all newly issued EU passports. Face images stored within electronic passports (ePass) have to conform to ISO/IEC 19794-5 which defines a number of quality requirements for facial... more

Digital face images and fingerprint images are included in all newly issued EU passports. Face images stored within electronic passports (ePass) have to conform to ISO/IEC 19794-5 which defines a number of quality requirements for facial image data. A software application (QS Software) is used to verify photographic image properties (pose, head/image size, height-to-page ratio, etc.) as well as setup properties (color depth, contrast, brightness, etc.). To ensure reliability and reproducibility of automated facial image processing systems it is necessary to assess the quality of existing software packages. To this end a database of facial image data would be of significant value as a testing base.
The goal for project series FIReBIRD (Facial Image REcognition Benchmark Including Realistic Disturbances) is to establish a database of facial images that can be used worldwide for compliance and performance testing and quality verification based on ISO standards. FIReBIRD will beconducted in close cooperation of Fraunhofer IGD and the German Federal Office for Information Security (BSI) and will be carried out in parallel and in international cooperation with the U.S. National Institute of Standards and Technology (NIST) and the British National Physical Laboratory (NPL). After successful completion of a conceptual framework the international database will be built. This facial image database will consist of distinct data sets used by two separate user groups for two different purposes: public test data that is available for algorithm developers and non-public test data for system evaluation accessible only to authorized organizations such as BSI/Fraunhofer IGD, NPL and NIST.

This study aims to identify and explore the challenges in the implementation of Resolution No. 4/2016 of the ICPO-INTERPOL concerning sharing and exchanging biometric data among the members of ICPO-INTERPOL in order to counter terrorist... more

This study aims to identify and explore the challenges in the implementation of Resolution No. 4/2016 of the ICPO-INTERPOL concerning sharing and exchanging biometric data among the members of ICPO-INTERPOL in order to counter terrorist foreign fighters (FTFs). This research also aims to elaborate and describe the mechanism of collecting, recording, storing, and exchanging biometric data conducted by the Indonesian government. The mechanism of collecting, recording, and storing biometric data works through 3 main doors, namely: 1) in the process of making electronic Resident's ID Cards (e-ID Cards);

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student's attendance is recorded using biometric scanner which is... more

The efficacy in the procedure of getting students attendance can be maximized when the IOT Based Biometric attendance system i.e. smart attendance system is used. The student's attendance is recorded using biometric scanner which is fingerprint based and then the data is secured safely over a cloud storage. The system averts the proxy attendance, time will also be saved, thereby the reliability of student's attendance information is also maximized. The student's data are loaded securely over the cloud and can be easily fetched according to the need. This research paper throws a light on simple, easier and portable method for students' attendance in which internet of things is used.

In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal... more

In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal performance as is required of an ideal biometric template security scheme. This status of affairs motivated us to contrivance an approach that derives biometric encryption keys from biometric fingerprint templates. The technique we proposed involves a two-step enrollment and authentication of fingerprints while encrypting fingerprint templates with encryption keys derived from other biometric fingerprint templates before archiving them to a database. The system was implemented using Java, developed on Netbeans 8. 0 IDE, MySQL RDBMS was used for back-end database and utilized Source AFIS java library framework for fingerprint verification and identification. Test results were carried out to determine the system's efficacy.

Abstract Using Cryptography and Steganography at the same time, we try to provide Biometric as well as Password security to voter accounts. The scheme uses images as cover objects for Steganography and as keys for Cryptography. The key... more

Abstract Using Cryptography and Steganography at the same time, we try to provide Biometric as well as Password security to voter accounts. The scheme uses images as cover objects for Steganography and as keys for Cryptography. The key image is a Biometric measure, such as a fingerprint image. Proper use of Cryptography greatly reduces the risks in these systems as the hackers have to find both secret key and the template. The basic idea is to merge the secret key with the cover image on the basis of key image. The result ...