Fingerprint Research Papers - Academia.edu (original) (raw)
Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric... more
Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric based authenticity systems are currently used in governmental, commercial and public sectors. However, these systems can be expensive to put in place and often impose physical constraint to the users. This paper introduces an inexpensive, powerful and easy to use hand geometry based biometric person authentication system using neural networks. The proposed approach followed to construct this system consists of an acquisition device, a pre-processing stage, and a neural network based classifier. One of the novelties of this work comprises on the introduction of hand geometry's related, position independent, feature extraction and identification which can be useful in problems related to image processing and pattern recognition. Another novelty of this research comprises on the use of error correction codes to enhance the level of performance of the neural network model. A dataset made of scanned images of the right hand of fifty different people was created for this study. Identification rates and Detection Cost Function (DCF) values obtained with the system were evaluated. Several strategies for coding the outputs of the neural networks were studied. Experimental results show that, when using Error Correction Output Codes (ECOC), up to 100% identification rates and 0% DCF can M. Faundez-Zanuy 123 202 M. Faundez-Zanuy et al.
The composition of flavonoids in plants is thought to be genetically determined. Thus it is characteristic for plant species. Here, proanthocyanidins are used to identify barley (Hordeum vulgare L.) varieties: six barley varieties and the... more
The composition of flavonoids in plants is thought to be genetically determined. Thus it is characteristic for plant species. Here, proanthocyanidins are used to identify barley (Hordeum vulgare L.) varieties: six barley varieties and the corresponding malts in 61 samples of the growing years 1998-2001 from three locations in Germany are examined. Their absolute polyphenolic composition is quite similar, but the ratios of proanthocyanidins among each othertermed here "relative quantitative fingerprint" (RQF)-are characteristic for the variety independent from growing year, provenience and status (barley/malt). The analytical method presented is highly automated and robust, thus it allows analyzing a high number of samples and to detect small differences between samples unambiguously. Hence the polyphenols can be used as a tool for food tracing, to prove authenticity and to discover frauds of food from plant origin.
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies... more
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off-The-Shelf (COTS) products. Here we discuss fingerprint and face biometric systems, decision and fusion techniques used in these systems. We also discuss their advantage over unimodal biometric systems.
Now day’s security of any area is most important task. At different places security required authentication for that purpose biometric system is commonly used. Biometrics is the most suitable means of identifying and authenticating... more
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various distortions introduced during the acquisition process. An effective approach to account for within-class variations is by... more
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various distortions introduced during the acquisition process. An effective approach to account for within-class variations is by capturing multiple enrollment impressions of a finger. The focus of this work is on effectively combining minutiae information from multiple impressions of the same finger in order to increase coverage area, restore missing minutiae, and eliminate spurious ones. We propose a new, minutiaebased, template synthesis algorithm which merges several enrollment feature sets into a ''super-template". We have performed extensive experiments and comparisons to demonstrate the effectiveness of the proposed approach using a challenging public database (i.e., FVC2000 Db1) which contains small area, low quality fingerprints.
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and... more
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and bifurcations. Most of the minutiae detection methods are based on image binarization while some others extract the minutiae directly from gray-scale images. In this work we compare these two approaches and propose two different methods for fingerprint ridge image enhancement. The first one is carried out using local histogram equalization, Wiener filtering, and image binarization. The second method uses a unique anisotropic filter for direct gray-scale enhancement. The results achieved are compared with those obtained through some other methods. Both methods show some improvement in the minutiae detection process in terms of time required and efficiency.
In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior knowledge of singular points (SPs). It is able to describe the overall ridge... more
In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior knowledge of singular points (SPs). It is able to describe the overall ridge topology seamlessly, including the SP regions, even for noisy fingerprints. Our statistical experiments on a public database show that the proposed FOMFE can significantly improve the accuracy of fingerprint feature extraction and thus that of fingerprint matching. Moreover, the FOMFE has a low-computational cost and can work very efficiently on large fingerprint databases. The FOMFE provides a comprehensive description for orientation features, which has enabled its beneficial use in feature-related applications such as fingerprint indexing. Unlike most indexing schemes using raw orientation data, we exploit FOMFE model coefficients to generate the feature vector. Our indexing experiments show remarkable results using different fingerprint databases.
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniques involved in these fields need to be supported by more... more
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniques involved in these fields need to be supported by more powerful and accurate routines. The aim of the proposed algorithm is to detect elliptical shapes from digital input images. It can be successfully applied in topics as signal detection or red eye removal, where the elliptical shape degree assessment can improve performances. The method has been designed to handle low resolution and partial occlusions. The algorithm is based on the signature contour analysis and exploits some geometrical properties of elliptical points. The proposed method is structured in two parts: firstly, the best ellipse which approximates the object shape is estimated; then, through the analysis and the comparison between the reference ellipse signature and the object signature, the algorithm establishes if the object is elliptical or not. The first part is based on symmetrical properties of the points belonging to the ellipse, while the second part is based on the signature operator which is a functional representation of a contour. A set of real images has been tested and results point out the effectiveness of the algorithm in terms of accuracy and in terms of execution time.
Although some nice properties of the Delaunay triangle-based structure have been exploited in many fingerprint authentication systems and satisfactory outcomes have been reported, most of these systems operate without template protection.... more
Although some nice properties of the Delaunay triangle-based structure have been exploited in many fingerprint authentication systems and satisfactory outcomes have been reported, most of these systems operate without template protection. In addition, the feature sets and similarity measures utilized in these systems are not suitable for existing template protection techniques. Moreover, local structural change caused by nonlinear distortion is often not considered adequately in these systems. In this paper, we propose a Delaunay quadranglebased fingerprint authentication system to deal with nonlinear distortion-induced local structural change that the Delaunay triangle-based structure suffers. Fixed-length and alignment-free feature vectors extracted from Delaunay quadrangles are less sensitive to nonlinear distortion and more discriminative than those from Delaunay triangles and can be applied to existing template protection directly. Furthermore, we propose to construct a unique topology code from each Delaunay quadrangle. Not only can this unique topology code help to carry out accurate local registration under distortion, but it also enhances the security of template data. Experimental results on public databases and security analysis show that the Delaunay quadrangle-based system with topology code can achieve better performance and higher security level than the Delaunay triangle-based system, the Delaunay quadrangle-based system without topology code, and some other similar systems.
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and... more
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and bifurcations. Most of the minutiae detection methods are based on image binarization while some others extract the minutiae directly from gray-scale images. In this work we compare these two approaches and propose two different methods for fingerprint ridge image enhancement. The first one is carried out using local histogram equalization, Wiener filtering, and image binarization. The second method uses a unique anisotropic filter for direct gray-scale enhancement. The results achieved are compared with those obtained through some other methods. Both methods show some improvement in the minutiae detection process in terms of time required and efficiency.
Latent fingerprints are the kind left on objects after direct contact with a person’s finger, often unwittingly at crime scenes. Most current techniques for extracting these types of fingerprint are invasive and involve contaminating the... more
Latent fingerprints are the kind left on objects after direct contact with a person’s finger, often unwittingly at crime scenes. Most current techniques for extracting these types of fingerprint are invasive and involve contaminating the fingerprint with chemicals which often renders the fingerprint unusable for further forensic testing. We propose a novel and robust method for extracting latent fingerprints from surfaces without the addition of contaminants or chemicals to the evidence. We show our technique works on notoriously difficult to image surfaces, using off-the-shelf cameras and statistical analysis. In particular, we extract images of latent fingerprints from surfaces which are transparent, curved and specular such as glass lightbulbs and jars, which are challenging due to the curvature of the surface. Our method produces results comparable to more invasive methods and leaves the fingerprint sample unaffected for further forensic analysis. Our technique uses machine lear...
As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class... more
As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system combines the two modalities at the template level, using multibiometric templates. The fusion of fingerprint and voice data successfully diminishes privacy concerns by hiding the minutiae points from the fingerprint, among the artificial points generated by the features obtained from the spoken utterance of the speaker. Equal error rates are observed to be under 2% for the system where 600 utterances from 30 people have been processed and fused with a database of 400 fingerprints from 200 individuals. Accuracy is increased compared to the previous results for voice verification over the same speaker database.
- by eren camlikaya
- •
- Biometrics, Databases, Man, Fingerprint
A minutiae-based template is a very compact representation of a fingerprint image, and for a long time, it has been assumed that it did not contain enough information to allow the reconstruction of the original fingerprint. This work... more
A minutiae-based template is a very compact representation of a fingerprint image, and for a long time, it has been assumed that it did not contain enough information to allow the reconstruction of the original fingerprint. This work proposes a novel approach to reconstruct fingerprint images from standard templates and investigates to what extent the reconstructed images are similar to the original ones (that is, those the templates were extracted from). The efficacy of the reconstruction technique has been assessed by estimating the success chances of a masquerade attack against nine different fingerprint recognition algorithms. The experimental results show that the reconstructed images are very realistic and that, although it is unlikely that they can fool a human expert, there is a high chance to deceive state-of-the-art commercial fingerprint recognition systems.
- by dario maio and +1
- •
- Information Systems, Algorithms, Artificial Intelligence, Biometrics
The introduction of ninhydrin treatment as a chemical technique for the visualisation of latent fingermarks on porous surfaces revolutionised approaches to forensic fingermark examination. Since then, a range of amino acid sensitive... more
The introduction of ninhydrin treatment as a chemical technique for the visualisation of latent fingermarks on porous surfaces revolutionised approaches to forensic fingermark examination. Since then, a range of amino acid sensitive reagents has been developed and such compounds are in widespread use by law enforcement agencies worldwide. This paper reviews the development and use of these reagents for the detection of latent fingermarks on porous surfaces. A brief overview is provided, including an historical background, forensic significance, and a general approach to the development of latent fingermarks on porous surfaces. This is followed by a discussion of specific amino acid sensitive treatments.
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with passwords, tokens or using their biometrics.... more
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with passwords, tokens or using their biometrics. Unfortunately, the first two suffer a lack of security as they are easy being forgotten and stolen; even biometrics also suffers from some inherent limitation and specific security threats. A more practical approach is to combine two or more factor authenticator to reap benefits in security or convenient or both. This paper proposed a novel two factor authenticator based on iterated inner products between tokenised pseudo-random number and the user specific fingerprint feature, which generated from the integrated wavelet and Fourier-Mellin transform, and hence produce a set of user specific compact code that coined as BioHashing. BioHashing highly tolerant of data capture offsets, with same user fingerprint data resulting in highly correlated bitstrings. Moreover, there is no deterministic way to get the user specific code without having both token with random data and user fingerprint feature. This would protect us for instance against biometric fabrication by changing the user specific credential, is as simple as changing the token containing the random data. The BioHashing has significant functional advantages over solely biometrics i.e. zero equal error rate point and clean separation of the genuine and imposter populations, thereby allowing elimination of false accept rates without suffering from increased occurrence of false reject rates.
Multimodal biometric systems consolidate the evidence presented by multiple biometric sources and typically provide better recognition performance compared to systems based on a single biometric modality. Although information fusion in a... more
Multimodal biometric systems consolidate the evidence presented by multiple biometric sources and typically provide better recognition performance compared to systems based on a single biometric modality. Although information fusion in a multimodal system can be performed at various levels, integration at the matching score level is the most common approach due to the ease in accessing and combining the scores generated by different matchers. Since the matching scores output by the various modalities are heterogeneous, score normalization is needed to transform these scores into a common domain, prior to combining them. In this paper, we have studied the performance of different normalization techniques and fusion rules in the context of a multimodal biometric system based on the face, fingerprint and hand-geometry traits of a user. Experiments conducted on a database of 100 users indicate that the application of min-max, z-score, and tanh normalization schemes followed by a simple sum of scores fusion method results in better recognition performance compared to other methods. However, experiments also reveal that the min-max and z-score normalization techniques are sensitive to outliers in the data, highlighting the need for a robust and efficient normalization procedure like the tanh normalization. It was also observed that multimodal systems utilizing user-specific weights perform better compared to systems that assign the same set of weights to the multiple biometric traits of all users.
Vehicle registration and licensing systems have been in existence for decades. However, there has been over 55% increase in the number of reported stolen vehicles which have not been recovered in the last 3 years. Therefore, there is need... more
Vehicle registration and licensing systems have been in existence for decades. However, there has been over 55% increase in the number of reported stolen vehicles which have not been recovered in the last 3 years. Therefore, there is need to improve on its existing systems by incorporating anti-theft capability of vehicles using fingerprint biometric technology. In developing the Secured Vehicle Registration System (SVRS), data on vehicle registration, renewal and change of ownership procedures were collected from the Motor Licensing Office at Osogbo. Unified Modelling Language (UML) tools was used for the system design, to illustrate the whole system in a clearer way, and implemented using JavaScript, PHP scripting language, HTML, XAMPP SQLServer and the Mantra MFS100 fingerprint scanner. The system performance was evaluated by authenticating registered vehicle owner biometric to calculate the Accuracy, Average Response Time (ART) and Apdex Score. The result of the evaluation using 288 fingerprint templates of 72 vehicle owners shows the False Accept Rate (FAR) of 0.0% and False Reject Rate (FRR) of 2.1%, which is equivalent to a system accuracy of 97.9%. The ART for the fingerprint execution matching is 36.3 microseconds while the overall system satisfaction Apdex score recorded was 0.73, which denotes a satisfying system. The high-speed verification method uses the lowest computational power and execution time to deliver accurate results through making a match or non-match against stored templates. The developed system demonstrated its ability to link vehicle(s) to its respective owner(s) and also function as an automatic identity verification system for vehicle owners using VIN and fingerprint. The system has the ability to be employed for preventing fraudulent change of ownership and also help reduce delay in processing vehicle license.
ARTICLE INFO Detection of the Distorted Fingerprints major causes to non-match in fingerprint at time matching fingerprint sample. This problem causes all the recognition of fingerprint algorithm application. It is complicated in negative... more
ARTICLE INFO Detection of the Distorted Fingerprints major causes to non-match in fingerprint at time matching fingerprint sample. This problem causes all the recognition of fingerprint algorithm application. It is complicated in negative type matching application. That means watch list and duplication application. In such way criminal user porpusly hide his fingerprint identification. In this paper we use the K-means, Canny-edge algorithm to detect and rectify distorted fingerprint image. Distortion and rectification is view as a regression problem where user input skein distorted fingerprint output is distortion field. To solve this problem K-means & Canny-edge fingerprint algorithm is use.
—In order to use fingerprint images to identify people, image segmentation pre-processing is normally needed. In this paper, we show a simple but effective technique to segment fingerprint images in background and foreground, so as to... more
—In order to use fingerprint images to identify people, image segmentation pre-processing is normally needed. In this paper, we show a simple but effective technique to segment fingerprint images in background and foreground, so as to obtain the Region-Of-Interest (ROI) by using standard deviation, median and binarization filters.
- by Igor Lucena and +1
- •
- Biometrics, Roi, Fingerprint
The present study includes researches regarding the composition of different varieties of rosemary essential oil. The essential oils were extracted from the plant material using the hydrodistillation technique. The analyses of the... more
The present study includes researches regarding the composition of different varieties of rosemary essential oil. The essential oils were extracted from the plant material using the hydrodistillation technique. The analyses of the composition of essential oils were carried out by using a GC-MS system. The chemical constituents of the essential oil were separated and identified using the GC-MS NIST libraries.
- by Carmen Socaciu
- •
- GC-MS, Fingerprint
- by Mercedes Rivolta and +1
- •
- Marketing, Public Administration, Privacy, Manufacturing
This paper explains how to use the fingerprint sensor with an Arduino using the Adafruit library for enrollment and provides additional code for fingerprint image download to a PC and setting of system parameters like baud rate, etc. The... more
This paper explains how to use the fingerprint sensor with an Arduino using the Adafruit library for enrollment and provides additional code for fingerprint image download to a PC and setting of system parameters like baud rate, etc. The FPM library, (its link is included in the document) encapsulates all the improvements made so far.
- by Brian Ejike
- •
- Arduino, Fingerprint
Abstrak Perancangan sistem pelacak dan pengendali kendaraan jarak jauh ini dirancang menggunakan teknologi komunikasi Satelit GPS (Global Positioning System) untuk mendapatkan nilai koordinat lokasi (Latitude dan Longitude) dan... more
Abstrak Perancangan sistem pelacak dan pengendali kendaraan jarak jauh ini dirancang menggunakan teknologi komunikasi Satelit GPS (Global Positioning System) untuk mendapatkan nilai koordinat lokasi (Latitude dan Longitude) dan divisualisasikan menggunakan Google Map secara real time sehingga keberadaan kendaraan bisa diketahui secara pasti dan meminimalisir tindak kejahatan pencurian kendaraan. Sistem pengendali jarak jauh yang digunakan untuk mengendalikan kendaraan menggunakan modul NodeMCU V3 yang terhubung pada internet untuk media komunikasi data yang berisi informasi lokasi dan perintah. Data akan ditampilkan pada aplikasi ponsel pengguna sehingga memudahkan untuk monitoring terhadap kendaraan. Sistem ini dilengkapi dengan modul sensor Finger Print sebagai akses untuk menghidupkan mesin kendaraan serta identifikasi bagi pengguna sehingga tingkat keamanan kendaraan tinggi. Pada saat pengguna tidak melakukan identifikasi menggunakan sensor Finger Print sebelum menghidupkan kendaraan maka sistem akan masuk mode darurat dan mengira kendaraan dalam bahaya. Sistem menerapkan prosedur keamanan berupa mematikan mesin kendaraan dan mengirimkan informasi lokasi kendaraan dan sinyal darurat pada pengguna. Sistem ini dibekali dengan baterai tambahan sehingga tetap dapat melakukan komunikasi dengan pengguna walaupun baterai utama pada kendaraan dilepaskan. Dalam mode darurat pengguna dapat menekan tombol Reset pada aplikasi setelah memastikan kendaraan dalam kondisi sehingga sistem dapat kembali ke mode normal. Kata Kunci: GPS, Latitude, Longitude, NodeMCU V3, Finger Print 1. PENDAHULUAN Pada era saat ini aktivitas menggunakan kendaraan semakin meningkat seperti penggunaan kurir pengantar barang, taksi online, ojek online, rental dan sebagainya. Kendaraan merupakan alat transportasi yang sangat penting untuk mempersingkat waktu saat melakukan perjalanan.. Peningkatan kebutuhan kendaraan yang tidak diimbangi dengan kemampuan untuk memenuhi kebutuhannya berpotensi menyebabkan bertambahnya tindak kriminalitas antara lain dalam bentuk pencurian kendaraan khususnya sepeda motor [1]. Sejauh ini untuk keamanan tambahan kebanyakan masih menggunakan keamanan tambahan berupa fisik seperti pengunci cakram, gembok tambahan, rantai dan sebagainya yang pada umumnya sangat mudah bagi pelaku kejahatan untuk dapat menembus keamanan semacam itu. Produsen motor juga telah memasang alarm yang menggunakan suara sebagai indikator sebagai sitem keamanan standar. Alarm ini menghasilkan suara melalui speaker yang terpasang pada kendaraan yang berfungsi untuk memberikan peringatan kepada pemilik kendaraan dan lingkungan sekitar bahwa alarm aktif. Akan tetapi alarm ini baru tersedia di sepeda motor keluaran terbaru terutama sepeda motor otomatis[2]. Untuk meminimalisir tindak kejahatan tersebut maka dibuatlah sebuah alat yang tertanam dalam sistem kendaraan dan dapat memberikan keamanan tamahan berupa fitur pelacakan berbasis GPS dan sensor Finger Print sebagai identifikasi yang akurat. Penelitian yang terkait dengan perancangan dan realisasisi system transmisi data GPS menggunakan teknologi SMS sebagai aplikasi system personal tracking telah dilakukan oleh referensi[3]. Penelitian tersebut mampu melakukan pelacakan secara realtime dengan delay sekitar± 4-5 menit berdasarkan intensitas kekuatan sinyal GPRS dan GPS. 2. TINJAUAN PUSTAKA 2.1. GPS (Global Positioning System) GPS adalah singkatan dari Global Positioning System yang merupakan sistem untuk menentukan posisi dan navigasi secara global dengan menggunakan satelit dan metode Triangulasi. Sistem tersebut merupakan sistem yang pertama kali dikembangkan oleh Departemen Pertahanan Amerika yang awalnya diperuntukan bagi kepentingan militer. GPS mempunyai tiga segmen yaitu: satelit (Space Segment), pengendali (Control Segment), dan penerima/pengguna (User Segment). Satelit GPS yang mengorbit bumi seluruhnya berjumlah 24 buah, 21 buah aktif bekerja dan 3 buah sisanya adalah cadangan. Satelit ini bertugas untuk menerima dan menyimpan data yang ditransmisikan oleh stasiun-stasiun pengendali, menyimpan dan menjaga informasi waktu berketelitian tinggi (jam atom di satelit), dan memancarkan sinyal serta informasi secara terus menerus ke perangkat penerima (receiver) [4]. Sebuah sistem tracking yang umum digunakan adalah dengan menggunakan GPS (Global Positioning System). Terdapat segmen pengendali yang bertugas untuk mengendalikan satelit dari bumi untuk melihat keadaan satelit, penentuan serta prediksi orbit, sinkronisasi waktu antar satelit, dan mengirimkan data ke satelit. Sedangkan segmen penerima bertugas menerima data dari satelit dan memprosesnya untuk menentukan
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the theoretical and practical issues related to performance... more
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the theoretical and practical issues related to performance evaluation by presenting the outcome of the recent Fingerprint Verification Competition (FVC2004). FVC2004 was organized by the authors of this work for the purpose of assessing the state-of-the-art in this challenging pattern recognition application and making available a new common benchmark for an unambiguous comparison of fingerprint-based biometric systems. FVC2004 is an independent, strongly supervised evaluation performed at the evaluators' site on evaluators' hardware. This allowed the test to be completely controlled and the computation times of different algorithms to be fairly compared. The experience and feedback received from previous, similar competitions (FVC2000 and FVC2002) allowed us to improve the organization and methodology of FVC2004 and to capture the attention of a significantly higher number of academic and commercial organizations (67 algorithms were submitted for FVC2004). A new, "Light" competition category was included to estimate the loss of matching performance caused by imposing computational constraints. This paper discusses data collection and testing protocols, and includes a detailed analysis of the results. We introduce a simple but effective method for comparing algorithms at the score level, allowing us to isolate difficult cases (images) and to study error correlations and algorithm "fusion." The huge amount of information obtained, including a structured classification of the submitted algorithms on the basis of their features, makes it possible to better understand how current fingerprint recognition systems work and to delineate useful research directions for the future. He is an associate researcher at the University of Bologna, Italy. His research interests include pattern recognition, image retrieval by similarity, and biometric systems (fingerprint classification and recognition, synthetic fingerprint generation, face recognition, and performance evaluation of biometric systems).
Este trabalho tem como escopo demonstrar através de implementação a utilização do software PacketFence para controlar o acesso de novos dispositivos (Notebook, Desktop) à infraestrutura de rede de computadores utilizando conexões Ethernet... more
Este trabalho tem como escopo demonstrar através de implementação a utilização do software PacketFence para controlar o acesso de novos dispositivos (Notebook, Desktop) à infraestrutura de rede de computadores utilizando conexões Ethernet cabeadas. Para fazer esse controle o PacketFence faz uso de tecnologias open source, entre elas, o Nessus, ferramenta utilizada para fazer varreduras de computadores a procura de vulnerabilidade de softwares que comprometa a segurança dos dados que
estão armazenados no dispositivo, o FreeRadius aplicativo que faz autenticação e autorização de usuário e dispositivo para acesso a rede de computadores, banco de dados MySQL, utilizado para armazenar dados, o Snort, aplicativo que detecta tentativas de intrusão a rede, Servidor web Apache HTTPD para fornecer páginas web e Captive portal. Também serão abordados os protocolos 802.1x, 802.1q, Simple Network Manager Protocol (SNMP) e Dynamic Host Configuration Protocol (DHCP).
Nesse documento o leitor irá encontrar breve descrição das aplicações e protocolos citados e também o detalhamento da instalação, configuração e funcionalidades do PacketFence em redes cabeadas.
- by Diego Lopes
- •
- Firewall, Fingerprint, Portal Captive, NAC
This is a practical lab course meant to compliment the Forensic Methods and Techniques module and the order and activities follow those of the lectures. This course has run for 3 years and is updated, sometimes with new lab activities,... more
This is a practical lab course meant to compliment the Forensic Methods and Techniques module and the order and activities follow those of the lectures. This course has run for 3 years and is updated, sometimes with new lab activities, each year. The syllabus here reflects the first year the course ran.
Traditional biometrics recognition system is vulnerable to privacy invasion when the stored biometric template is compromised. This in turn will suffer from permanently loss as biometric template is not replaceable In this paper, we... more
Traditional biometrics recognition system is vulnerable to privacy invasion when the stored biometric template is compromised. This in turn will suffer from permanently loss as biometric template is not replaceable In this paper, we propose a key extraction scheme which locks a secure transformed fingerprint bitstring via a novel dynamic quantization mechanism. During authentication stage, the key is extracted from the secure mixture when a genuine fingerprint is presented. A number of keys can be assigned to different applications and could be revoked if the key was compromised. The proposed method retrieve key reliably from a genuine fingerprint up to 99.5% success rate. We perform several security and experimental analyses and the results suggest that the scheme is feasible in practice.
This research paper used the Kali-Linux operating system, to create a platform remotely which allows to control the device Android and Windows operating system using the malicious payload through penetration tools like Metasploit... more
This research paper used the Kali-Linux operating system, to create a platform remotely which allows to control the device Android and Windows operating system using the malicious payload through penetration tools like Metasploit framework, to have a security test and to check the loopholes of devices. The main purpose was to study the Metasploit payloads, analyze and control the target device. It can be utilized in legal aspects, it will be very helpful to the police officials, law enforcement agencies, investigators where it helps to have access to the devices and locations of the criminals and suspects, without having physical contact with their devices. This research will reveal the process of generating a malicious payload, and performing a security test, collect data from the target devices and it also revealed the different ways adopted by the cyber-criminals, black-hat hackers to gain access of their target devices like injecting the payload into an original application, MP4 file, SMS, PDF file and Image (JPEG) file. The research paper intends to examine the methods used by hackers to exploit the devices.
- by AFROZULLA KHAN and +1
- •
- Forensic Science, Expert evidence, Cyber Forensics, Fingerprint
The university system in the Kingdom of Saudi Arabia is concerned with student attendance for lectures, and it is the responsibility of lecturers to monitor student attendance for each lecture. By the end of the semester, students get an... more
The university system in the Kingdom of Saudi Arabia is concerned with student attendance for lectures, and it is the responsibility of lecturers to monitor student attendance for each lecture. By the end of the semester, students get an attendance register indicating which lectures the student has attended and it reports the calculated percentage for each student's attendance in each course. Universities have regulated the mechanisms and the acceptable percentages of student absence. The process for a lecturer to manually check student attendance consumes a lot of time and effort, either during the lecture or when in the process of emptying absenteeism and inserting it into the university's electronic system. Therefore, Saudi universities compete to find modern methods of checking student attendance that will avoid the disadvantages of manually taking attendance. For this reason, they have produced electronic attendance systems, for example, using a student's fingerprint, an eye recognition system, or a mobile phone system to read a QR code designed for the same purpose. All of these systems have the disadvantage that they consume a lot of time, as all students have to line up at the fingerprint reader or the eye detector for identification. Therefore, the problem of the consumption of lecture time is still present, even with these modern systems. Therefore, the aim of this research is to propose a smart mobile application that is able to check the attendance of students without having to consume lecture time or require any effort from the lecturer. The system automatically recognizes the attendance of students through their university ID cards. Each lecturer would use his/ her own mobile phone to use the proposed system to check the attendance of students instead of using manual method to register the attendance of students and the students' ID cards that are detected by coming within range of the lecturer reader would represent present students, and missing student ID cards represent absent students
The general research aims of this group are directed toward the development and application of techniques for digital signal processing and digital filtering. There has been a clear trend over the past several years toward increased use... more
The general research aims of this group are directed toward the development and application of techniques for digital signal processing and digital filtering. There has been a clear trend over the past several years toward increased use of digital rather than analog processing of signals, largely because of the inherent flexibility and reliability of digital processing. With the continuing development of integrated circuit technology, faster digital hardware with reduced cost and size is constantly becoming available. Digital signal-processing techniques have found application in a wide variety of areas including speech and picture processing, radar and sonar signal processing, and seismic data analysis. A summary of some of our present research projects and plans follows.
Bulletin UASVM, Agriculture 65(2)/2008 pISSN 1843-5246; eISSN 1843-5386 ... GC-MS ANALYSIS OF ROSEMARY ESSENTIAL OIL ... Sonia A. Socaci, Maria Tofană, Carmen Socaciu ... University of Agricultural Sciences and Veterinary Medicine,... more
Bulletin UASVM, Agriculture 65(2)/2008 pISSN 1843-5246; eISSN 1843-5386 ... GC-MS ANALYSIS OF ROSEMARY ESSENTIAL OIL ... Sonia A. Socaci, Maria Tofană, Carmen Socaciu ... University of Agricultural Sciences and Veterinary Medicine, Faculty of Agriculture, 3-5 Mănăştur ...
A system that is used for time-clocking, creating an all-inclusive electronic record of the process involved in how employees logs in and out of work on working days are referred to as a clocking system. The system has an additional... more
A system that is used for time-clocking, creating an all-inclusive electronic record of the process involved in how employees logs in and out of work on working days are referred to as a clocking system. The system has an additional feature of calculating an accurate payroll system, which in turn, can lead to a precise amount the company spent on labour. In essence, an employee clocking system is a process of monitoring the attendance, presence and truancy of employees in a work environment. In this project, the University of Energy and Natural Resources was used as a case study. The existing method of recording the presence of staff to work is by a manual process where employees record their attendance on a paper. The challenge of the current employee attendance system is the difficulty in tracing old records, safekeeping, lack of confidentiality and the chances of other employees logging in for their truant colleagues. This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces. The results of the experiment we conducted indicate a high accuracy in our system with TAR value of 99.7%. This accuracy rate is much better than the results other researchers obtained. The excellent accuracy implies that employees will have difficulty to check-in or out for their truant colleagues. The high accuracy results will help improved security of attendance, improved employee performance, ensures fast and easy retrieval of data, easy monitoring of staff, and prevent impersonation in the attendance logs.
In the previous few years' robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a... more
In the previous few years' robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a question on the present security and demands something new in the system which can provide the second level of security. So for that in this paper, there is added some extra security to the current ATM Systems. We use the fingerprint system and One Time Password (OTP) which is sent to the user registration mobile number through GSM Module system. After that, the user will be able to complete the transaction securely. The working of this ATM machine is when the customer places his finger on the fingerprint module when access it automatically generates different 4-digit code as a message every time to the mobile of the authorized customer through GSM modem which is connected to the microcontroller [1]. The code received by the customer should be entered by pressing the keys on the keypad provided. This proposal will go a long way to resolve the problem of bank account safety and transaction.
- by Ijariit Journal and +1
- •
- Biometric, Fingerprint, ATM
Abstrak-Banyak kejadian tindakan pencurian terjadi saat penghuni rumah sedang tidur atau pada saat sibuk melakukan aktifitas di luar yang menyebabkan kurangnya perhatian. Berdasarkan data yang diperoleh dari Badan Pusat Statistik tentang... more
Abstrak-Banyak kejadian tindakan pencurian terjadi saat penghuni rumah sedang tidur atau pada saat sibuk melakukan aktifitas di luar yang menyebabkan kurangnya perhatian. Berdasarkan data yang diperoleh dari Badan Pusat Statistik tentang Statistik Kriminal 2018 pada tahun 2017 di Indonesia sebanyak 26.298 kali. Dengan berkembangnya teknologi saat ini, Sistem pengaman pintu menggunakan sidk jari (Finngerprint) dapat mengindetifikasi penghuni rumah dan sebuah modul GSM yang dapat mengirimkan informasi kepada pemilik rumah berupa pesan text, dirancang untuk memberikan solusi pada rumah yang ditinggalkan oleh pemiliknya. Metode yang digunakan dalam perancangan ini adalah menggunakan metode prototype, yaitu metode yang mengembangkan sebuah sistem awal yang akan dibuat. hasil pengujian yang telah dilakukan menunjukkan akses untuk membuka pintu menggunakan sidik jari (Fingerpritn) dari luar dapat berjalan dengan baik. Limit Switch dan Modul GSM dapat bekerja dengan baik sesuai program yang telah di perintahkan, dan pemilik rumah dapat dengan mudah mendapatkan informasi ketika seseorang menjebol pintu secara paksa.
Fingerprint merupakan salah satu bentuk biometrika yang merupakan sebuah teknologi baru yang memiliki fungsi utama untuk mengenali manusia melalui sidik jari, mata, wajah, atau bagian tubuh yang lain. Fingerprint berasal dari bahasa... more
Fingerprint merupakan salah satu bentuk biometrika yang merupakan sebuah teknologi baru yang memiliki fungsi utama untuk mengenali manusia melalui sidik jari, mata, wajah, atau bagian tubuh yang lain. Fingerprint berasal dari bahasa Inggris yang berarti sidik jari. Sidik jari adalah gurat-gurat yang terdapat di kulit ujung jari. Sidik jari berfungsi untuk memberi gaya gesek lebih besar agar jari dapat memegang benda lebih erat. Suatu proses, cara, atau perbuatan untuk meningkatkan suatu usaha atau kegiatan berdisiplin. Menurut W.J.S Poerwadarminta, kedisiplinan berasal dari kata disiplin yang mendapat konfiks ke – an yang mempunyai arti latihan batin dan watak dengan maksud supaya segala perbuatannya selalu mentaati tata tertib untuk Peningkatan kedisiplinan guru dan pegawai dalam melakukan kegiatan belajar mengajar dengan tepat waktu yang di kontrol melalui fingerprint. Kaitannya dengan fungsi manajemen merupakan fungsi pengawasan atau controlling.
- by Suparni ,S.E
- •
- Fingerprint
Dokumen ini akan berisi mengenai Spesifikasi Kebutuhan Perangkat Lunak (SKPL) atau Software Requirement Specification (SRS) untuk Sistem Absensi Fingerprint yang terintegrasi dengan SMS Gateaway dengan studi kasus di SMP Negeri 1... more
Dokumen ini akan berisi mengenai Spesifikasi Kebutuhan Perangkat Lunak (SKPL) atau Software Requirement Specification (SRS) untuk Sistem Absensi Fingerprint yang terintegrasi dengan SMS Gateaway dengan studi kasus di SMP Negeri 1 Jatinunggal.
- by Muhammad Thoyiban and +1
- •
- Fingerprint, SRS, Sms Gateway, contoh SKPL
Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (pores and ridge contours). Although latent print examiners... more
Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (pores and ridge contours). Although latent print examiners frequently take advantage of Level 3 features to assist in identification, Automated Fingerprint Identification Systems (AFIS) currently rely only on Level 1 and Level 2 features. In fact, the Federal Bureau of Investigation's (FBI) standard of fingerprint resolution for AFIS is 500 pixels per inch (ppi), which is inadequate for capturing Level 3 features, such as pores. With the advances in fingerprint sensing technology, many sensors are now equipped with dual resolution (500 ppi/1,000 ppi) scanning capability. However, increasing the scan resolution alone does not necessarily provide any performance improvement in fingerprint matching, unless an extended feature set is utilized. As a result, a systematic study to determine how much performance gain one can achieve by introducing Level 3 features in AFIS is highly desired. We propose a hierarchical matching system that utilizes features at all the three levels extracted from 1,000 ppi fingerprint scans. Level 3 features, including pores and ridge contours, are automatically extracted using Gabor filters and wavelet transform and are locally matched using the Iterative Closest Point (ICP) algorithm. Our experiments show that Level 3 features carry significant discriminatory information. There is a relative reduction of 20 percent in the equal error rate (EER) of the matching system when Level 3 features are employed in combination with Level 1 and 2 features. This significant performance gain is consistently observed across various quality fingerprint images.
The project work is concerned with the implementation of biometric fingerprint authentication system which is an automated method of verifying a match between two human fingerprints for validating identity. The modern computer security is... more
The project work is concerned with the implementation of biometric fingerprint authentication system which is an automated method of verifying a match between two human fingerprints for validating identity. The modern computer security is a battle between high security and low friction. Developers want users to use unique, complicated passwords for their apps to increase security. Employee Automation System is designed to ensure that the organization is equipped with the right level of human resource tracking for each separate department of the organization. The main feature of Employee Automation System is time tracking for employees. The system is implemented based on biometric fingerprint features that identifies certain or specific employee. The system can be accessible from remote network. The developed system also includes the employee fingerprint verification, employee attendance, employee tracking, employee leave, and salary payment and promotion modules. The operational activities of the system are accessed or controlled by three users, like Admin, Operator and Employee. The admin can access all the features, whereas the operator panel is designed to run the software in office time and takes fingerprint attendance. The employee panel is accessible by employee that shows profile information, last fingerprint attendance access, leaving/absent status of that month. The system is designed with client-server model and software methodology.
ATMs (Automatic Teller Machine) are becoming widely used in today's world because they are easy to use and offer convenience. However, today's ATM technology comes with some security risks such as the theft and misuse of cards, the... more
ATMs (Automatic Teller Machine) are becoming widely used in today's world because they are easy to use and offer convenience. However, today's ATM technology comes with some security risks such as the theft and misuse of cards, the possibility of losing a card, and forgetting PIN numbers. A growing number of frauds committed against automatic teller machines over the last decade motivated us to use biometrics to ensure the accuracy and security of personal identification. In this paper, we describe a biometric fingerprint and face recognition system that can replace ATM cards and PINs. The transaction is successful when fingerprint, OTP, and face match. If the fingerprint does not match, the customer is guided to enter the aadhaar number. Similarly, if face matching fails, the customer is given an option to answer the question. Here aadhaar number and correct answer to the question must be entered correctly to proceed. Aadhaar number entry and question & answer options are mainly provided for those who are unable to access the system because of damage to their physical attributes (finger and face).
With the rapid growth in technology there is a need to increase security measures to take security system at next level. Cyber security is of developing concern to every single person, as information technology has become all too common.... more
With the rapid growth in technology there is a need to increase security measures to take security system at next level. Cyber security is of developing concern to every single person, as information technology has become all too common. The confidential and critical data of the user is there on the system and is highly susceptible to strike. Therefore it is important to validation the devices or to control the sustainable access of the system to permitted users only. Previous understanding-based and badge-based validation mechanisms are slowly ineffectual and therefore assailant find multiple technique to overcome these methods. Biometric validation is a significant step forward in an independent person authentication. Biometric characteristics are closely connected to a single person and a strong tool for permitting user entrance. Biometrics is the modern technology of measuring and analyzing human body biological data to improve system safety by supplying precise and useful prototype and procedures for the authentication and recognition of individuals, and its applications are commonly utilized in government sectors, defense as well as industry. This paper examines the dif erent biometric characteristics commonly utilized in a biometric system and the dif erent type of biometric system.
Fingerprints are being extensively used for person identification in a number of commercial, civil, and forensic applications. Most of the current fingerprint verification systems utilize features that are based on minutiae points and... more
Fingerprints are being extensively used for person identification in a number of commercial, civil, and forensic applications. Most of the current fingerprint verification systems utilize features that are based on minutiae points and ridge patterns. While minutiae based fingerprint verification systems have shown fairly high accuracies, further improvements in their performance are needed for acceptable performance, especially in applications involving very large scale databases. In an effort to extend the existing technology for fingerprint verification, we propose a new representation and matching scheme for fingerprint using Scale Invariant Feature Transformation (SIFT). We extract characteristic SIFT feature points in scale space and perform matching based on the texture information around the feature points using the SIFT operator. A systematic strategy of applying SIFT to fingerprint images is proposed. Using a public domain fingerprint database (FVC 2002), we demonstrate that the proposed approach complements the minutiae based fingerprint representation. Further, the combination of SIFT and conventional minutiae based system achieves significantly better performance than either of the individual schemes.