Fingerprint Recognition Research Papers - Academia.edu (original) (raw)
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformity noise (PRNU), which is a unique stochastic fingerprint... more
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformity noise (PRNU), which is a unique stochastic fingerprint of imaging sensors. The PRNU is obtained using a maximum-likelihood estimator derived from a simplified model of the sensor output. Both digital forensics tasks are then achieved by detecting the presence of sensor PRNU in specific regions of the image under investigation. The detection is formulated as a hypothesis testing problem. The statistical distribution of the optimal test statistics is obtained using a predictor of the test statistics on small image blocks. The predictor enables more accurate and meaningful estimation of probabilities of false rejection of a correct camera and missed detection of a tampered region. We also include a benchmark implementation of this framework and detailed experimental validation. The robustness of the proposed forensic methods is tested on common image processing, such as JPEG compression, gamma correction, resizing, and denoising.
- by dario maio and +1
- •
- Image Processing, Art, Pattern Recognition, Biometrics
On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual... more
On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracking the quickly evolving state-of-the-art of fingerprint... more
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracking the quickly evolving state-of-the-art of fingerprint recognition systems. Three sensors have been used for data collection, including a solid state sweeping sensor, and two optical sensors of different characteristics. The competition included a new category dedicated to ”light” systems, characterized by limited computational and storage resources. This paper summarizes the main activities of the FVC2004 organization and provides a first overview of the evaluation. Results will be further elaborated and officially presented at the International Conference on Biometric Authentication (Hong Kong) on July 2004.
- by sai sumi
- •
- Forensics, Probability, System Design, Anatomy
- by dario maio and +1
- •
- Information Systems, Information Retrieval, Biometrics, Topology
- by dario maio and +1
- •
- Information Systems, Algorithms, Artificial Intelligence, Biometrics
- by Mo Chen
- •
- Video, Sensors, Motion Pictures, Reliability
Infrared identification (IRID) is a biometric which offers the security of fingerprints with the convenience of facial recognition. Twenty years after being first proposed IRID systems are becoming marketable. During the intervening time,... more
Infrared identification (IRID) is a biometric which offers the security of fingerprints with the convenience of facial recognition. Twenty years after being first proposed IRID systems are becoming marketable. During the intervening time, IR camera technology has improved significantly and price reductions have been dramatic. Further improvements in IR camera sensitivity, array size, and variable optics, as well as further price reductions, are coming, just as interest is growing in biometrics. Several approaches have been developed, tested, and evaluated to extract and analyze features from infrared images of the face and body. IRID has been seen to have significant advantages over other biometrics in certain applications-not only in the traditional biometric security markers, but also in communications and health care