1 Introduction to Automated Biometrics Automating face biometrics has been extensively studied in machine vision (see Chellappa [2] for a survey). Des
|
|
- Jeremy Wheeler
- 6 years ago
- Views:
Transcription
1 Ear Biometrics for Machine Vision M. Burge and W. Burger Johannes Kepler University Department of Systems Science Computer Vision Laboratory A-4040 Linz, Austria Abstract: A new class of biometrics based upon ear features is introduced for use in the development of passive identication systems. The viability of the proposed biometric is shown both theoretically in terms of uniqueness and measurability over time and in practice through the implementation of a proof of concept system. Identication by ear biometrics is promising because it is passive like face recognition, but instead of the dicult to extract face biometrics it uses robust and simply extracted biometrics like those in ngerprinting. The goal of automated personal identication that is both positive and reliable has attracted increased interest in automated biometrics. Automated biometrics can be divided into two broad classes, physiological which are based upon measurements of external physical traits, and behavioral which usually measure learned behaviors carried out by the subject. Behavioral methods include signature, voice, and keystroke biometrics, all of which vary over time and are dependent upon environmental factors. Machine vision research has concentrated on physiological, e.g. face, hand, eye and ngerprint biometrics. Section one introduces the eld of automated biometrics and contrasts the success of machine vision research on invasive methods like ngerprint identication against its apparent weakness on passive methods like facial biometrics. The viability of a new biometric based on ears and suitable for passive identication is argued in section two which examines the uniqueness and comparability over time of the ear. The short history of the ear in manual biometrics and the features developed by the forensic scientist Iannarelli are given in section three. Section four mathematically denes identication and recognition while sketching our ear biometric identication system with emphasis on methods for ear localization. Finally two application scenarios are given followed in the last section by our current research directions.
2 1 Introduction to Automated Biometrics Automating face biometrics has been extensively studied in machine vision (see Chellappa [2] for a survey). Despite extensive research many problems in face recognition remain largely unsolved due to the inherent diculty of face biometrics. A wide variety of imaging problems, e.g. lighting, shadows, scale, and translation plague the attempt for unconstrained face identication [7]. In addition to the many imaging problems, it is inherently dicult to collect consistent features from the face as it is arguably the most changing part of the body due to e.g. facial expressions, cosmetics, facial hair and hair styling. The combination of the typical imaging problems of feature extraction in an unconstrained environment, and the changeability of the face, explains the diculty of automating face biometrics. Despite the attractiveness of face biometrics, e.g. they are easily veriable by non-experts, of biometrics, e.g. ngerprint-based, provide the basis for most commercial implementations. Unlike facial biometrics, ngerprint-based biometrics have been shown to be highly amenable to automation by machine vision techniques [1]. The automation of ngerprint biometrics began in 1971 [8] and has culminated in a number of commercial machine vision based systems. In terms of traditional image processing problems ngerprint imaging is done within a controlled environment, usually a specially designed scanner, which eliminates the problem of localization and artifacts from shadowing and lighting variations. Physical changes, a bane of facial biometrics, is a miniscule problem as the nger, baring surgery, remains comparatively constant over time. Machine vision techniques [5] have been applied successfully and have provided highly accurate and robust commercial systems which are in use worldwide. Fingerprints are not the only successful example of the application of machine vision techniques to automated biometrics, but both the three dimensional shape of the hand and retinal patterns have also been used. All of the biometrics which have been successfully automated using machine vision techniques are inherently invasive. They require the subject to participate actively in both enrolling into the system and in subsequent identications. The willing participation of the subject in the controlled environment of the machine vision systems is intrinsic in the success of the identication. One class of passive physiological biometrics are those based upon iris scans. Unlike retinal scans, which require close contact with the scanner, iris-based recognition has been reported from distances of 40 cm in controlled situations [8]. The unique collection of striations, pits, and other observable features of the iris along with the ease of segmenting the iris from the white tissue of the eye which serves as its background, make iris based biometrics attractive. The decided disadvantage is the small size of the iris which makes image acquisition from any distance greater then 40 cm problematic. To summarize the two classes of passive physiological biometrics which have been researched in machine vision up to now, face and iris-based techniques both have a number of drawbacks which
3 make their usage in commercial applications limited. Facial biometrics fail due to the changes in features caused by expressions, cosmetics, hair styles, and the growth of facial hair as well as the diculty of reliably extracting them in an unconstrained environment exhibiting imaging problems such as lighting and shadowing. Iris features on the other hand remain relatively consistent over time and are easy to extract, but acquisition of the image at the necessary resolution from a distance is dicult. Therefore, we propose a new class of biometrics for machine vision based upon ears which have both reliable and robust features and are localizable and segmentable from a distance for passive identication. 2 Viability of Ear Biometrics In proposing the ear as the basis for a new class of biometrics, we need to show that it is viable, i.e. unique to each individual, and comparable over time. In the same way that no one can prove that ngerprints are unique, we can not show that each of us has a unique ear. Instead, we will assert that this is probable and give supporting evidence by examining two studies [4]. The rst study compared over 10,000 ears drawn from a randomly selected sample in California, and the second study examined fraternal and identical twins, in which physiological features are similar. The evidence from these studies supports the hypothesis that the ear is a unique physiological features, since in both studies all examined ears were found to be unique though identical twins were found to have similar, but not identical, ear structures especially in the concha and lobe areas. Having shown uniqueness it remains to ascertain if the ear provides biometrics which are comparable over time. It is obvious that the structure of the ear does not change radically over time. The medical literature reports [4] that ear growth after the rst four months of birth is highly linear, i.e. proportional. It turns out that even though ear growth is proportional, gravity can cause the ear to undergo stretching in the vertical direction. The eect of this stretching is most pronounced in the lobe of the ear, and measurements show that the change is non-linear. The rate of stretching is approximately ve times greater then normal during the period from four months to the age of eight, after which it is constant until around 70 when it again increases. We have shown that biometrics based upon the ear are viable in that ear anatomy is probably unique in each individual and that features based upon measurements of that anatomy are comparable over time. Given that they are viable, identication by ear biometrics is promising because it is passive like face recognition, but instead of the dicult to extract face biometrics it can use robust and simply extracted biometrics like those in ngerprinting.
4 1b a c d Figure 1: A) The external anatomy of the ear. 1 Helix Rim, 2 Lobule, 3 Antihelix, 4 Concha, 5 Tragus, 6 Antitragus, 7 Crus of Helix, 8 Triangular Fossa, 9 Incisure Intertragica. B) The locations of the anthropometric measurements of the external ear as used in the \Iannarelli System". 3 Iannarelli's Ear Biometrics An anthropometric technique of identication based upon ear biometrics was developed by A. Iannarelli [4] in The \Iannarelli System" is based upon the 12 measurements illustrated (Figure 1, left). The locations shown are measured from specially aligned and size-normalized photographs of the right ear. Each photograph is aligned during development so that the lower tip of a standardized vertical guide on the development easel touches the upper esh line of the cocha area whilst the upper tip touches the outline of the anti-tragus (Figure 1, right). Since each ear is aligned and scaled during development, the resulting photographs are normalized in size and orientation, enabling the extraction of comparable measurements directly from the photographs. The distance between each of the numbered areas in Figure 1 (right) is measured in units of 3 mm and assigned an integer distance value. These twelve measurements, along with information on sex and race, are then used for identication. The system as stated provides for too small of a classication space as within each sex and race category a subject is classied into a single point in a 12 dimensional integer space where each unit on an axis represents a 3 mm
5 Figure 2: A) Segmented outer ear, B) Segmented inner ear measurement dierence. Assuming an average standard deviation in the population of four units, 12 mm, then the 12 measurements provide for a space with less than 17 million distinct points. Though simple remedies (e.g. the addition of more measurements or using a smaller metric) for increasing the size of the space are obvious, the method is additionally not suited for machine vision because of the dicultly of localizing the anatomical point which serves as the origin of the measurement system. All measurements are relative to this origin which if not exactly localized, results in all subsequent measurements being incorrect. In the next section we present a simple proof of concept implementation which avoids the problem of localizing anatomical points and the frailty of basing all subsequent feature measurements on a single such point. 4 Automating Ear Biometrics The goal in identication is to verify that the biometric extracted from the subject suciently matches the previous acquired biometric for that subject. Let s be the subject at the time of 0 identication and s the subject at time of enrollment, further let b s = f(s) represent a function which extracts some biometric from a subject s as a vector b s, and let d( b s ; b s 0) compute some previously dened distance metric between the two biometrics b s and b s 0. Identication then is
6 Figure 3: A) Original ear image, B) Edge map, C) Gradient the task of determining if d( b s ; b s 0) < t, where t is the given acceptance threshold. Since the subject and environment changes over time, a certain tolerance in the matching criterion must be permitted. This tolerance can be dened in terms of the false reject rate (FRR) and the false acceptance rate (FAR) exhibited by the system. A system is usually designed to be tunable to minimize either the FAR or the FRR, i.e. in the given formulation by lowering or raising t respectively, depending upon the type of security which is required. The problem of recognition is harder then that of identication since the system must determine if the subject's identity can be veried against any previously enrolled subject. If the system's enrolled identities are the set 1, I = n b0 ; b 1 ; ; o b n then recognizing some subject s 0 is equivalent to nding the least member of the set fiji 2 I ^ d(f(s 0 ); i) < tg. We have developed a simple machine vision system as a proof of concept of the viability of ear biometrics for passive identication. The system implements f(s 0 ) by rst localizing and segmenting the ear of a subject s 0 from a greyscale CCD camera acquired image using deformable contours [6] on a Gaussian pyramid representation of the image gradient (Figure 2). Once segmented, the vector b s consisting of a number of scale, rotation, and translation invariant areabased features [3] is computed and the distance d(f(s 0 ); b s ) between the stored biometric vector for s is computed and if it less then the established acceptance threshold t then identication is veried. We divide the identication system down into three general phases: localization and segmen- 1 The denition of I illustrates the point that normally the biometric b s extracted by the function f (s) from a subject s is stored by the system and not some direct representation e.g. an image, of s.
7 tation, feature extraction, and feature comparison, and will concentrate on the rst stage as a wide variety of methods developed for other machine vision based biometrics are applicable to the last two phases. We examine two ways of localizing the ear in an image. In the rst method the distinctive outline of the ear formed by the Helix rim and lobule (Figure 1) are searched for using a generalized Hough transform (GHT). Learned templates for both parts are combined into a master template and the search method attempts to optimize maxima in each template while minimizing the resulting dierences between the two templates. The result is two curves which loosely bound the ear around the top and bottom Figure 3 part B shows the computed edge map on which the edges corresponding to the marked curves Shown as think lines in Figure 3 part A show up clearly. In the second method deformable templates of the inner and outer ear based on active contour models are searched for. We are currently evaluating the two methods as well as examining a method based on Fourier descriptors. Ear biometrics can be used as a supplementary source of evidence in identication and recognition systems, e.g. a system designed for face recognition already includes all the necessary hardware for capturing and computing ear biometrics. A typical example is supplementary identication at an automated teller machine (ATM). Most ATMs contain a camera mounted so that it records the face of the user during the transaction. These cameras could be supplemented with a simple optical mirror setup to allow simultaneously recording of the face and the ear of the user. While a user identies themselves to the ATM by inserting the bank card and keying in their personal identication number (PIN), the camera simultaneously records the face and ear of the user and uses ear biometrics to supplementary verify the identication of the user. A second scenario where passive ear biometrics are ideal is with dierent levels of security levels and are accessible to dierent groups of people. Commonly this situation is solved through the use of active badges. These badges, usually small identication cards containing passive transmitters, are automatically queried at each point of access, e.g. a door or elevator. Access to a restricted area e.g. unlocking of the door, is automatically allowed or disallowed according to the identity supplied by the badge. A well known drawback of such a system is that someone can illegitimately obtain and use the active badge of another to gain access to restricted areas, for this reason cameras are often installed to monitor the access points. The cameras record access and in the case that illegitimate access to an area is later discovered the taped video record can be examined to visually determine the perpetrator - but only after the fact. A prohibitively expensive solution, which defeats the purpose of automation, is to have a human analyze each request for access by comparing the identication reported by the active badge and the visual provided by the camera to some known visual of the subject. Ear biometrics can be used in such a scenario to allow more secure automated access. In the proposed solution, as the subject approaches the access point the active badge is queried and the identication is ascertained, at the same time an image of the subject's ear is acquired
8 and biometrics are used to verify the identication provided by the active badge. In the case that the the two identications do not match, the video of the access point including the subject is displayed at the central security counsel along with an image retrieved from the security database of the subject who should be in possession of that badge. The two images can then be visually compared by the security personnel and appropriate action taken. 5 Conclusion A simple proof of concept system for passive identication from ear biometrics was presented. The system lends support to the theoretical evidence that ear biometrics are a viable and promising new passive approach to automated human identication. One of the primary arguments against the usage of ear biometrics is that ears are often occluded, e.g. by hair or hats, rendering them unusable. In selected populations e.g. those with short hair as in the defense industry, ear biometrics are applicable and especially useful when used to supplement existing automated methods. We are currently working on the problem of ear localization as well as building both a statistical model of the ear and a larger database of ear images for retrieval and comparison experiments. References [1] G.T. Candela and R. Chellappa. Comparative performance of classication methods for ngerprints. In NISTIR, [2] R. Chellappa, C.L. Wilson, and S. Sirohey. Human and machine recognition of faces: A survey. PIEEE, 83(5):705{740, May [3] M.K. Hu. Visual pattern recognition by moment invariants. IEEE Trans. Information Theory, 8:179{187, [4] Alfred Iannarelli. Ear Identication. Forensic Identication Series. Paramont Publishing Company, Fremont, California, [5] K. Karu and A.K. Jain. Fingerprint classication. PR, 29(3):389{404, March [6] K.F. Lai and R.T. Chin. Deformable contours: Modeling and extraction. PAMI, 17(11):1084{1090, November [7] Steve Lawrence, C. Lee Giles, A.C. Tsoi, and A.D. Back. Face recognition: A convolutional neural network approach. IEEE Transactions on Neural Networks, 8(1):98{113, [8] B. Miller. Vital signs of identity. IEEE Spectrum, 83:22{30, February 1994.
Advanced Ear Biometrics for Human Recognition
International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 11, November, 2016 Available at http://www.ijcsonline.com/ Sandhiya B Asst.Professor, IT Department, Easwari Engineering College,
More informationShape Model-Based 3D Ear Detection from Side Face Range Images
Shape Model-Based 3D Ear Detection from Side Face Range Images Hui Chen and Bir Bhanu Center for Research in Intelligent Systems University of California, Riverside, California 92521, USA fhchen, bhanug@vislab.ucr.edu
More informationEar Biometrics Based on Geometrical Method of Feature Extraction
Ear Biometrics Based on Geometrical Method of Feature Extraction Micha Chora Institute of Telecommunication, University of Technology and Agriculture, ul. Prof. Kaliskiego 7, 85-796, Bydgoszcz, Poland.
More informationEar recognition based on Edge Potential Function
Ear recognition based on Edge Potential Function F. Battisti a,m.carli a, F.G.B. De Natale b,a.neri a a Applied Electronics Department, Universitá degli Studi Roma TRE, Roma, Italy; b University of Trento,
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationFigure 1: An Area Voronoi Diagram of a typical GIS Scene generated from the ISPRS Working group III/3 Avenches data set. 2 ARRANGEMENTS 2.1 Voronoi Di
Qualitative Spatial Relations using Arrangements for Complex Images M. Burge and W. Burger Johannes Kepler University, Department of Systems Science Computer Vision Laboratory, A-4040 Linz, Austria burge@cast.uni-linz.ac.at
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More informationObject classes. recall (%)
Using Genetic Algorithms to Improve the Accuracy of Object Detection Victor Ciesielski and Mengjie Zhang Department of Computer Science, Royal Melbourne Institute of Technology GPO Box 2476V, Melbourne
More informationFingerprint Verification applying Invariant Moments
Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National
More informationMultimodal Belief Fusion for Face and Ear Biometrics
Intelligent Information Management, 2009, 1, 166-171 doi:10.4236/iim.2009.13024 Published Online December 2009 (http://www.scirp.org/journal/iim) Multimodal Belief Fusion for Face and Ear Biometrics Dakshina
More informationStuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication
Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals
More informationBiometric Cryptosystems: for User Authentication
Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,
More informationComputationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms
Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at
More informationA Novel Identification System Using Fusion of Score of Iris as a Biometrics
A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant
More informationTutorial 3. Jun Xu, Teaching Asistant csjunxu/ February 16, COMP4134 Biometrics Authentication
Tutorial 3 Jun Xu, Teaching Asistant http://www4.comp.polyu.edu.hk/ csjunxu/ COMP4134 Biometrics Authentication February 16, 2017 Table of Contents Problems Problem 1: Answer the questions Problem 2: Pattern
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationTutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication
Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem
More informationDepartment of Electrical Engineering, Keio University Hiyoshi Kouhoku-ku Yokohama 223, Japan
Shape Modeling from Multiple View Images Using GAs Satoshi KIRIHARA and Hideo SAITO Department of Electrical Engineering, Keio University 3-14-1 Hiyoshi Kouhoku-ku Yokohama 223, Japan TEL +81-45-563-1141
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationImplementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition
RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationEmpirical Evaluation of Advanced Ear Biometrics
Empirical Evaluation of Advanced Ear Biometrics Ping Yan Kevin W. Bowyer Department of Computer Science and Engineering University of Notre Dame, IN 46556 Abstract We present results of the largest experimental
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationCarmen Alonso Montes 23rd-27th November 2015
Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationPractice Exam Sample Solutions
CS 675 Computer Vision Instructor: Marc Pomplun Practice Exam Sample Solutions Note that in the actual exam, no calculators, no books, and no notes allowed. Question 1: out of points Question 2: out of
More information(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)
Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationLocal qualitative shape from stereo. without detailed correspondence. Extended Abstract. Shimon Edelman. Internet:
Local qualitative shape from stereo without detailed correspondence Extended Abstract Shimon Edelman Center for Biological Information Processing MIT E25-201, Cambridge MA 02139 Internet: edelman@ai.mit.edu
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationPATTERN RECOGNITION USING NEURAL NETWORKS
PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationLecture 11: Human Authentication CS /12/2018
Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted
More informationFace Recognition At-a-Distance Based on Sparse-Stereo Reconstruction
Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,
More informationfa fb duplicate I fc duplicate II
This is technical report NISTIR 6281, October 1998. The FERET Verication Testing Protocol for Face Recognition Algorithms Syed A. Rizvi a 1, P. Jonathon Phillips b and Hyeonjoon Moon c a Department of
More informationFeatures Points. Andrea Torsello DAIS Università Ca Foscari via Torino 155, Mestre (VE)
Features Points Andrea Torsello DAIS Università Ca Foscari via Torino 155, 30172 Mestre (VE) Finding Corners Edge detectors perform poorly at corners. Corners provide repeatable points for matching, so
More informationPerformance Analysis of Fingerprint Identification Using Different Levels of DTCWT
2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different
More informationWorld Journal of Engineering Research and Technology WJERT
wjert, 2016, Vol. 2, Issue 5, 224-233 ReviewArticle ISSN 2454-695X WJERT SJIF Impact Factor: 3.419 EAR BASED BIOMETRIC AUTHENTICATION SYSTEM 1 Ranjita Chowdhury, Dalia Ghosh, 1 Puja Agarwal and 2* Prof.
More informationFace Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian Hebei Engineering and
More informationCPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova
CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationSelection of Location, Frequency and Orientation Parameters of 2D Gabor Wavelets for Face Recognition
Selection of Location, Frequency and Orientation Parameters of 2D Gabor Wavelets for Face Recognition Berk Gökberk, M.O. İrfanoğlu, Lale Akarun, and Ethem Alpaydın Boğaziçi University, Department of Computer
More informationKeywords Palmprint recognition, patterns, features
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm
More informationExpression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and
Wes Miller 5/11/2011 Comp Sci 534 Expression Detection in Video Abstract Expression detection is useful as a non-invasive method of lie detection and behavior prediction, as many facial expressions are
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationFeature Extraction and Image Processing, 2 nd Edition. Contents. Preface
, 2 nd Edition Preface ix 1 Introduction 1 1.1 Overview 1 1.2 Human and Computer Vision 1 1.3 The Human Vision System 3 1.3.1 The Eye 4 1.3.2 The Neural System 7 1.3.3 Processing 7 1.4 Computer Vision
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationEar Biometrics- An Alternative Biometric R. Parimala 1 and C. Jayakumar 2 1 Research Scholar, Bharathiar University, Coimbatore, India
Ear Biometrics- An Alternative Biometric R. Parimala 1 and C. Jayakumar 2 1 Research Scholar, Bharathiar University, Coimbatore, India 2 Professor, CSE Department, RMK Engineering College, Kavaraipettai,India
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationCombining Gabor Features: Summing vs.voting in Human Face Recognition *
Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationImage-Based Competitive Printed Circuit Board Analysis
Image-Based Competitive Printed Circuit Board Analysis Simon Basilico Department of Electrical Engineering Stanford University Stanford, CA basilico@stanford.edu Ford Rylander Department of Electrical
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationBiometrics: The Password You ll Never Forget
1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within
More informationFSN-PalmSecureID-for ATM Machines
T he application of biometric solutions in ATMs and electronic point-of-sale solutions provide a high- security environment. By using a smartcard, on which the client's unique palm vein pattern is stored,
More informationA Survey on Ear Biometrics Revolution
ISSN : 2348-6090 A Survey on Ear Biometrics Revolution 1 Babli Singh, 2 Avadhesh Kumar, 3 Pradeep Tomar 1 PG Scholar, Computer Science and Engineering Galgotias University, Greater Noida, U.P, India 2
More informationAUTHENTICATION SYSTEM USING IRIS RECOGNITION
AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationTopics for thesis. Automatic Speech-based Emotion Recognition
Topics for thesis Bachelor: Automatic Speech-based Emotion Recognition Emotion recognition is an important part of Human-Computer Interaction (HCI). It has various applications in industrial and commercial
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationFINGERPRINT BIOMETRICS
FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...
More informationThe identification of mammalian species through the classification of hair patterns using image pattern recognition
The identification of mammalian species through the classification of hair patterns using image pattern recognition Thamsanqa Moyo Shaun Bangay Grahamstown, South Africa Grahamstown, South Africa g02m1612@campus.ru.ac.za
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationHaresh D. Chande #, Zankhana H. Shah *
Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information
More informationGraph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System
_ Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System K.Ramaraj 1, T.Ummal Sariba Begum 2 Research scholar, Assistant Professor in Computer Science, Thanthai Hans
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationOnline and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic
More informationSu et al. Shape Descriptors - III
Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationBitangent 3. Bitangent 1. dist = max Region A. Region B. Bitangent 2. Bitangent 4
Ecient pictograph detection Dietrich Buesching TU Muenchen, Fakultaet fuer Informatik FG Bildverstehen 81667 Munich, Germany email: bueschin@informatik.tu-muenchen.de 1 Introduction Pictographs are ubiquitous
More informationStructured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov
Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationInvariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction
Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationAn Improved Iris Segmentation Technique Using Circular Hough Transform
An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,
More informationFace Recognition System Using PCA
Face Recognition System Using PCA M.V.N.R. Pavan Kumar 1, Shaikh Arshad A. 2, Katwate Dhananjay P. 3,Jamdar Rohit N. 4 Department of Electronics and Telecommunication Engineering 1,2,3,4, LNBCIET, Satara-415020
More informationCHAPTER 1 Introduction 1. CHAPTER 2 Images, Sampling and Frequency Domain Processing 37
Extended Contents List Preface... xi About the authors... xvii CHAPTER 1 Introduction 1 1.1 Overview... 1 1.2 Human and Computer Vision... 2 1.3 The Human Vision System... 4 1.3.1 The Eye... 5 1.3.2 The
More informationLOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES. Karin Sobottka Ioannis Pitas
LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES Karin Sobottka Ioannis Pitas Department of Informatics, University of Thessaloniki 540 06, Greece e-mail:fsobottka, pitasg@zeus.csd.auth.gr Index
More informationComputer and Machine Vision
Computer and Machine Vision Lecture Week 11 Part-2 Segmentation, Camera Calibration and Feature Alignment March 28, 2014 Sam Siewert Outline of Week 11 Exam #1 Results Overview and Solutions Wrap up of
More informationRecognition. Clark F. Olson. Cornell University. work on separate feature sets can be performed in
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 907-912, 1996. Connectionist Networks for Feature Indexing and Object Recognition Clark F. Olson Department of Computer
More informationA Study of Medical Image Analysis System
Indian Journal of Science and Technology, Vol 8(25), DOI: 10.17485/ijst/2015/v8i25/80492, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Medical Image Analysis System Kim Tae-Eun
More informationIRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION
IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION Sangini Shah, Ankita Mandowara, Mitesh Patel Computer Engineering Department Silver Oak College Of Engineering and Technology, Ahmedabad Abstract:
More informationAdvanced Video Content Analysis and Video Compression (5LSH0), Module 4
Advanced Video Content Analysis and Video Compression (5LSH0), Module 4 Visual feature extraction Part I: Color and texture analysis Sveta Zinger Video Coding and Architectures Research group, TU/e ( s.zinger@tue.nl
More informationBiometric Recognition Systems Employing Novel Shape-based Features
University of Miami Scholarly Repository Open Access Dissertations Electronic Theses and Dissertations 2010-11-19 Biometric Recognition Systems Employing Novel Shape-based Features Jindan Zhou University
More informationUse of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Use of Mean Square Error Measure in Biometric Analysis of
More informationFingerprint Classification Using Orientation Field Flow Curves
Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification
More informationA Survey on Ear Recognition
A Survey on Ear Recognition Spyridon Antakis University of Twente Department of Mathematics & Computer Science Enschede, The Netherlands, P.O. Box 217, 7500 AE Email: {s.antakis}@student.tue.nl February
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationPathology Hinting as the Combination of Automatic Segmentation with a Statistical Shape Model
Pathology Hinting as the Combination of Automatic Segmentation with a Statistical Shape Model Pascal A. Dufour 12,HannanAbdillahi 3, Lala Ceklic 3,Ute Wolf-Schnurrbusch 23,JensKowal 12 1 ARTORG Center
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More information