1 Introduction to Automated Biometrics Automating face biometrics has been extensively studied in machine vision (see Chellappa [2] for a survey). Des

Size: px
Start display at page:

Download "1 Introduction to Automated Biometrics Automating face biometrics has been extensively studied in machine vision (see Chellappa [2] for a survey). Des"

Transcription

1 Ear Biometrics for Machine Vision M. Burge and W. Burger Johannes Kepler University Department of Systems Science Computer Vision Laboratory A-4040 Linz, Austria Abstract: A new class of biometrics based upon ear features is introduced for use in the development of passive identication systems. The viability of the proposed biometric is shown both theoretically in terms of uniqueness and measurability over time and in practice through the implementation of a proof of concept system. Identication by ear biometrics is promising because it is passive like face recognition, but instead of the dicult to extract face biometrics it uses robust and simply extracted biometrics like those in ngerprinting. The goal of automated personal identication that is both positive and reliable has attracted increased interest in automated biometrics. Automated biometrics can be divided into two broad classes, physiological which are based upon measurements of external physical traits, and behavioral which usually measure learned behaviors carried out by the subject. Behavioral methods include signature, voice, and keystroke biometrics, all of which vary over time and are dependent upon environmental factors. Machine vision research has concentrated on physiological, e.g. face, hand, eye and ngerprint biometrics. Section one introduces the eld of automated biometrics and contrasts the success of machine vision research on invasive methods like ngerprint identication against its apparent weakness on passive methods like facial biometrics. The viability of a new biometric based on ears and suitable for passive identication is argued in section two which examines the uniqueness and comparability over time of the ear. The short history of the ear in manual biometrics and the features developed by the forensic scientist Iannarelli are given in section three. Section four mathematically denes identication and recognition while sketching our ear biometric identication system with emphasis on methods for ear localization. Finally two application scenarios are given followed in the last section by our current research directions.

2 1 Introduction to Automated Biometrics Automating face biometrics has been extensively studied in machine vision (see Chellappa [2] for a survey). Despite extensive research many problems in face recognition remain largely unsolved due to the inherent diculty of face biometrics. A wide variety of imaging problems, e.g. lighting, shadows, scale, and translation plague the attempt for unconstrained face identication [7]. In addition to the many imaging problems, it is inherently dicult to collect consistent features from the face as it is arguably the most changing part of the body due to e.g. facial expressions, cosmetics, facial hair and hair styling. The combination of the typical imaging problems of feature extraction in an unconstrained environment, and the changeability of the face, explains the diculty of automating face biometrics. Despite the attractiveness of face biometrics, e.g. they are easily veriable by non-experts, of biometrics, e.g. ngerprint-based, provide the basis for most commercial implementations. Unlike facial biometrics, ngerprint-based biometrics have been shown to be highly amenable to automation by machine vision techniques [1]. The automation of ngerprint biometrics began in 1971 [8] and has culminated in a number of commercial machine vision based systems. In terms of traditional image processing problems ngerprint imaging is done within a controlled environment, usually a specially designed scanner, which eliminates the problem of localization and artifacts from shadowing and lighting variations. Physical changes, a bane of facial biometrics, is a miniscule problem as the nger, baring surgery, remains comparatively constant over time. Machine vision techniques [5] have been applied successfully and have provided highly accurate and robust commercial systems which are in use worldwide. Fingerprints are not the only successful example of the application of machine vision techniques to automated biometrics, but both the three dimensional shape of the hand and retinal patterns have also been used. All of the biometrics which have been successfully automated using machine vision techniques are inherently invasive. They require the subject to participate actively in both enrolling into the system and in subsequent identications. The willing participation of the subject in the controlled environment of the machine vision systems is intrinsic in the success of the identication. One class of passive physiological biometrics are those based upon iris scans. Unlike retinal scans, which require close contact with the scanner, iris-based recognition has been reported from distances of 40 cm in controlled situations [8]. The unique collection of striations, pits, and other observable features of the iris along with the ease of segmenting the iris from the white tissue of the eye which serves as its background, make iris based biometrics attractive. The decided disadvantage is the small size of the iris which makes image acquisition from any distance greater then 40 cm problematic. To summarize the two classes of passive physiological biometrics which have been researched in machine vision up to now, face and iris-based techniques both have a number of drawbacks which

3 make their usage in commercial applications limited. Facial biometrics fail due to the changes in features caused by expressions, cosmetics, hair styles, and the growth of facial hair as well as the diculty of reliably extracting them in an unconstrained environment exhibiting imaging problems such as lighting and shadowing. Iris features on the other hand remain relatively consistent over time and are easy to extract, but acquisition of the image at the necessary resolution from a distance is dicult. Therefore, we propose a new class of biometrics for machine vision based upon ears which have both reliable and robust features and are localizable and segmentable from a distance for passive identication. 2 Viability of Ear Biometrics In proposing the ear as the basis for a new class of biometrics, we need to show that it is viable, i.e. unique to each individual, and comparable over time. In the same way that no one can prove that ngerprints are unique, we can not show that each of us has a unique ear. Instead, we will assert that this is probable and give supporting evidence by examining two studies [4]. The rst study compared over 10,000 ears drawn from a randomly selected sample in California, and the second study examined fraternal and identical twins, in which physiological features are similar. The evidence from these studies supports the hypothesis that the ear is a unique physiological features, since in both studies all examined ears were found to be unique though identical twins were found to have similar, but not identical, ear structures especially in the concha and lobe areas. Having shown uniqueness it remains to ascertain if the ear provides biometrics which are comparable over time. It is obvious that the structure of the ear does not change radically over time. The medical literature reports [4] that ear growth after the rst four months of birth is highly linear, i.e. proportional. It turns out that even though ear growth is proportional, gravity can cause the ear to undergo stretching in the vertical direction. The eect of this stretching is most pronounced in the lobe of the ear, and measurements show that the change is non-linear. The rate of stretching is approximately ve times greater then normal during the period from four months to the age of eight, after which it is constant until around 70 when it again increases. We have shown that biometrics based upon the ear are viable in that ear anatomy is probably unique in each individual and that features based upon measurements of that anatomy are comparable over time. Given that they are viable, identication by ear biometrics is promising because it is passive like face recognition, but instead of the dicult to extract face biometrics it can use robust and simply extracted biometrics like those in ngerprinting.

4 1b a c d Figure 1: A) The external anatomy of the ear. 1 Helix Rim, 2 Lobule, 3 Antihelix, 4 Concha, 5 Tragus, 6 Antitragus, 7 Crus of Helix, 8 Triangular Fossa, 9 Incisure Intertragica. B) The locations of the anthropometric measurements of the external ear as used in the \Iannarelli System". 3 Iannarelli's Ear Biometrics An anthropometric technique of identication based upon ear biometrics was developed by A. Iannarelli [4] in The \Iannarelli System" is based upon the 12 measurements illustrated (Figure 1, left). The locations shown are measured from specially aligned and size-normalized photographs of the right ear. Each photograph is aligned during development so that the lower tip of a standardized vertical guide on the development easel touches the upper esh line of the cocha area whilst the upper tip touches the outline of the anti-tragus (Figure 1, right). Since each ear is aligned and scaled during development, the resulting photographs are normalized in size and orientation, enabling the extraction of comparable measurements directly from the photographs. The distance between each of the numbered areas in Figure 1 (right) is measured in units of 3 mm and assigned an integer distance value. These twelve measurements, along with information on sex and race, are then used for identication. The system as stated provides for too small of a classication space as within each sex and race category a subject is classied into a single point in a 12 dimensional integer space where each unit on an axis represents a 3 mm

5 Figure 2: A) Segmented outer ear, B) Segmented inner ear measurement dierence. Assuming an average standard deviation in the population of four units, 12 mm, then the 12 measurements provide for a space with less than 17 million distinct points. Though simple remedies (e.g. the addition of more measurements or using a smaller metric) for increasing the size of the space are obvious, the method is additionally not suited for machine vision because of the dicultly of localizing the anatomical point which serves as the origin of the measurement system. All measurements are relative to this origin which if not exactly localized, results in all subsequent measurements being incorrect. In the next section we present a simple proof of concept implementation which avoids the problem of localizing anatomical points and the frailty of basing all subsequent feature measurements on a single such point. 4 Automating Ear Biometrics The goal in identication is to verify that the biometric extracted from the subject suciently matches the previous acquired biometric for that subject. Let s be the subject at the time of 0 identication and s the subject at time of enrollment, further let b s = f(s) represent a function which extracts some biometric from a subject s as a vector b s, and let d( b s ; b s 0) compute some previously dened distance metric between the two biometrics b s and b s 0. Identication then is

6 Figure 3: A) Original ear image, B) Edge map, C) Gradient the task of determining if d( b s ; b s 0) < t, where t is the given acceptance threshold. Since the subject and environment changes over time, a certain tolerance in the matching criterion must be permitted. This tolerance can be dened in terms of the false reject rate (FRR) and the false acceptance rate (FAR) exhibited by the system. A system is usually designed to be tunable to minimize either the FAR or the FRR, i.e. in the given formulation by lowering or raising t respectively, depending upon the type of security which is required. The problem of recognition is harder then that of identication since the system must determine if the subject's identity can be veried against any previously enrolled subject. If the system's enrolled identities are the set 1, I = n b0 ; b 1 ; ; o b n then recognizing some subject s 0 is equivalent to nding the least member of the set fiji 2 I ^ d(f(s 0 ); i) < tg. We have developed a simple machine vision system as a proof of concept of the viability of ear biometrics for passive identication. The system implements f(s 0 ) by rst localizing and segmenting the ear of a subject s 0 from a greyscale CCD camera acquired image using deformable contours [6] on a Gaussian pyramid representation of the image gradient (Figure 2). Once segmented, the vector b s consisting of a number of scale, rotation, and translation invariant areabased features [3] is computed and the distance d(f(s 0 ); b s ) between the stored biometric vector for s is computed and if it less then the established acceptance threshold t then identication is veried. We divide the identication system down into three general phases: localization and segmen- 1 The denition of I illustrates the point that normally the biometric b s extracted by the function f (s) from a subject s is stored by the system and not some direct representation e.g. an image, of s.

7 tation, feature extraction, and feature comparison, and will concentrate on the rst stage as a wide variety of methods developed for other machine vision based biometrics are applicable to the last two phases. We examine two ways of localizing the ear in an image. In the rst method the distinctive outline of the ear formed by the Helix rim and lobule (Figure 1) are searched for using a generalized Hough transform (GHT). Learned templates for both parts are combined into a master template and the search method attempts to optimize maxima in each template while minimizing the resulting dierences between the two templates. The result is two curves which loosely bound the ear around the top and bottom Figure 3 part B shows the computed edge map on which the edges corresponding to the marked curves Shown as think lines in Figure 3 part A show up clearly. In the second method deformable templates of the inner and outer ear based on active contour models are searched for. We are currently evaluating the two methods as well as examining a method based on Fourier descriptors. Ear biometrics can be used as a supplementary source of evidence in identication and recognition systems, e.g. a system designed for face recognition already includes all the necessary hardware for capturing and computing ear biometrics. A typical example is supplementary identication at an automated teller machine (ATM). Most ATMs contain a camera mounted so that it records the face of the user during the transaction. These cameras could be supplemented with a simple optical mirror setup to allow simultaneously recording of the face and the ear of the user. While a user identies themselves to the ATM by inserting the bank card and keying in their personal identication number (PIN), the camera simultaneously records the face and ear of the user and uses ear biometrics to supplementary verify the identication of the user. A second scenario where passive ear biometrics are ideal is with dierent levels of security levels and are accessible to dierent groups of people. Commonly this situation is solved through the use of active badges. These badges, usually small identication cards containing passive transmitters, are automatically queried at each point of access, e.g. a door or elevator. Access to a restricted area e.g. unlocking of the door, is automatically allowed or disallowed according to the identity supplied by the badge. A well known drawback of such a system is that someone can illegitimately obtain and use the active badge of another to gain access to restricted areas, for this reason cameras are often installed to monitor the access points. The cameras record access and in the case that illegitimate access to an area is later discovered the taped video record can be examined to visually determine the perpetrator - but only after the fact. A prohibitively expensive solution, which defeats the purpose of automation, is to have a human analyze each request for access by comparing the identication reported by the active badge and the visual provided by the camera to some known visual of the subject. Ear biometrics can be used in such a scenario to allow more secure automated access. In the proposed solution, as the subject approaches the access point the active badge is queried and the identication is ascertained, at the same time an image of the subject's ear is acquired

8 and biometrics are used to verify the identication provided by the active badge. In the case that the the two identications do not match, the video of the access point including the subject is displayed at the central security counsel along with an image retrieved from the security database of the subject who should be in possession of that badge. The two images can then be visually compared by the security personnel and appropriate action taken. 5 Conclusion A simple proof of concept system for passive identication from ear biometrics was presented. The system lends support to the theoretical evidence that ear biometrics are a viable and promising new passive approach to automated human identication. One of the primary arguments against the usage of ear biometrics is that ears are often occluded, e.g. by hair or hats, rendering them unusable. In selected populations e.g. those with short hair as in the defense industry, ear biometrics are applicable and especially useful when used to supplement existing automated methods. We are currently working on the problem of ear localization as well as building both a statistical model of the ear and a larger database of ear images for retrieval and comparison experiments. References [1] G.T. Candela and R. Chellappa. Comparative performance of classication methods for ngerprints. In NISTIR, [2] R. Chellappa, C.L. Wilson, and S. Sirohey. Human and machine recognition of faces: A survey. PIEEE, 83(5):705{740, May [3] M.K. Hu. Visual pattern recognition by moment invariants. IEEE Trans. Information Theory, 8:179{187, [4] Alfred Iannarelli. Ear Identication. Forensic Identication Series. Paramont Publishing Company, Fremont, California, [5] K. Karu and A.K. Jain. Fingerprint classication. PR, 29(3):389{404, March [6] K.F. Lai and R.T. Chin. Deformable contours: Modeling and extraction. PAMI, 17(11):1084{1090, November [7] Steve Lawrence, C. Lee Giles, A.C. Tsoi, and A.D. Back. Face recognition: A convolutional neural network approach. IEEE Transactions on Neural Networks, 8(1):98{113, [8] B. Miller. Vital signs of identity. IEEE Spectrum, 83:22{30, February 1994.

Advanced Ear Biometrics for Human Recognition

Advanced Ear Biometrics for Human Recognition International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 11, November, 2016 Available at http://www.ijcsonline.com/ Sandhiya B Asst.Professor, IT Department, Easwari Engineering College,

More information

Shape Model-Based 3D Ear Detection from Side Face Range Images

Shape Model-Based 3D Ear Detection from Side Face Range Images Shape Model-Based 3D Ear Detection from Side Face Range Images Hui Chen and Bir Bhanu Center for Research in Intelligent Systems University of California, Riverside, California 92521, USA fhchen, bhanug@vislab.ucr.edu

More information

Ear Biometrics Based on Geometrical Method of Feature Extraction

Ear Biometrics Based on Geometrical Method of Feature Extraction Ear Biometrics Based on Geometrical Method of Feature Extraction Micha Chora Institute of Telecommunication, University of Technology and Agriculture, ul. Prof. Kaliskiego 7, 85-796, Bydgoszcz, Poland.

More information

Ear recognition based on Edge Potential Function

Ear recognition based on Edge Potential Function Ear recognition based on Edge Potential Function F. Battisti a,m.carli a, F.G.B. De Natale b,a.neri a a Applied Electronics Department, Universitá degli Studi Roma TRE, Roma, Italy; b University of Trento,

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Figure 1: An Area Voronoi Diagram of a typical GIS Scene generated from the ISPRS Working group III/3 Avenches data set. 2 ARRANGEMENTS 2.1 Voronoi Di

Figure 1: An Area Voronoi Diagram of a typical GIS Scene generated from the ISPRS Working group III/3 Avenches data set. 2 ARRANGEMENTS 2.1 Voronoi Di Qualitative Spatial Relations using Arrangements for Complex Images M. Burge and W. Burger Johannes Kepler University, Department of Systems Science Computer Vision Laboratory, A-4040 Linz, Austria burge@cast.uni-linz.ac.at

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Object classes. recall (%)

Object classes. recall (%) Using Genetic Algorithms to Improve the Accuracy of Object Detection Victor Ciesielski and Mengjie Zhang Department of Computer Science, Royal Melbourne Institute of Technology GPO Box 2476V, Melbourne

More information

Fingerprint Verification applying Invariant Moments

Fingerprint Verification applying Invariant Moments Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National

More information

Multimodal Belief Fusion for Face and Ear Biometrics

Multimodal Belief Fusion for Face and Ear Biometrics Intelligent Information Management, 2009, 1, 166-171 doi:10.4236/iim.2009.13024 Published Online December 2009 (http://www.scirp.org/journal/iim) Multimodal Belief Fusion for Face and Ear Biometrics Dakshina

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Biometric Cryptosystems: for User Authentication

Biometric Cryptosystems: for User Authentication Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,

More information

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at

More information

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

A Novel Identification System Using Fusion of Score of Iris as a Biometrics A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant

More information

Tutorial 3. Jun Xu, Teaching Asistant csjunxu/ February 16, COMP4134 Biometrics Authentication

Tutorial 3. Jun Xu, Teaching Asistant   csjunxu/ February 16, COMP4134 Biometrics Authentication Tutorial 3 Jun Xu, Teaching Asistant http://www4.comp.polyu.edu.hk/ csjunxu/ COMP4134 Biometrics Authentication February 16, 2017 Table of Contents Problems Problem 1: Answer the questions Problem 2: Pattern

More information

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily

More information

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem

More information

Department of Electrical Engineering, Keio University Hiyoshi Kouhoku-ku Yokohama 223, Japan

Department of Electrical Engineering, Keio University Hiyoshi Kouhoku-ku Yokohama 223, Japan Shape Modeling from Multiple View Images Using GAs Satoshi KIRIHARA and Hideo SAITO Department of Electrical Engineering, Keio University 3-14-1 Hiyoshi Kouhoku-ku Yokohama 223, Japan TEL +81-45-563-1141

More information

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu

More information

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Empirical Evaluation of Advanced Ear Biometrics

Empirical Evaluation of Advanced Ear Biometrics Empirical Evaluation of Advanced Ear Biometrics Ping Yan Kevin W. Bowyer Department of Computer Science and Engineering University of Notre Dame, IN 46556 Abstract We present results of the largest experimental

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

Carmen Alonso Montes 23rd-27th November 2015

Carmen Alonso Montes 23rd-27th November 2015 Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Practice Exam Sample Solutions

Practice Exam Sample Solutions CS 675 Computer Vision Instructor: Marc Pomplun Practice Exam Sample Solutions Note that in the actual exam, no calculators, no books, and no notes allowed. Question 1: out of points Question 2: out of

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Local qualitative shape from stereo. without detailed correspondence. Extended Abstract. Shimon Edelman. Internet:

Local qualitative shape from stereo. without detailed correspondence. Extended Abstract. Shimon Edelman. Internet: Local qualitative shape from stereo without detailed correspondence Extended Abstract Shimon Edelman Center for Biological Information Processing MIT E25-201, Cambridge MA 02139 Internet: edelman@ai.mit.edu

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

PATTERN RECOGNITION USING NEURAL NETWORKS

PATTERN RECOGNITION USING NEURAL NETWORKS PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Lecture 11: Human Authentication CS /12/2018

Lecture 11: Human Authentication CS /12/2018 Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted

More information

Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction

Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,

More information

fa fb duplicate I fc duplicate II

fa fb duplicate I fc duplicate II This is technical report NISTIR 6281, October 1998. The FERET Verication Testing Protocol for Face Recognition Algorithms Syed A. Rizvi a 1, P. Jonathon Phillips b and Hyeonjoon Moon c a Department of

More information

Features Points. Andrea Torsello DAIS Università Ca Foscari via Torino 155, Mestre (VE)

Features Points. Andrea Torsello DAIS Università Ca Foscari via Torino 155, Mestre (VE) Features Points Andrea Torsello DAIS Università Ca Foscari via Torino 155, 30172 Mestre (VE) Finding Corners Edge detectors perform poorly at corners. Corners provide repeatable points for matching, so

More information

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT 2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2016, Vol. 2, Issue 5, 224-233 ReviewArticle ISSN 2454-695X WJERT SJIF Impact Factor: 3.419 EAR BASED BIOMETRIC AUTHENTICATION SYSTEM 1 Ranjita Chowdhury, Dalia Ghosh, 1 Puja Agarwal and 2* Prof.

More information

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian Hebei Engineering and

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

Selection of Location, Frequency and Orientation Parameters of 2D Gabor Wavelets for Face Recognition

Selection of Location, Frequency and Orientation Parameters of 2D Gabor Wavelets for Face Recognition Selection of Location, Frequency and Orientation Parameters of 2D Gabor Wavelets for Face Recognition Berk Gökberk, M.O. İrfanoğlu, Lale Akarun, and Ethem Alpaydın Boğaziçi University, Department of Computer

More information

Keywords Palmprint recognition, patterns, features

Keywords Palmprint recognition, patterns, features Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm

More information

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and Wes Miller 5/11/2011 Comp Sci 534 Expression Detection in Video Abstract Expression detection is useful as a non-invasive method of lie detection and behavior prediction, as many facial expressions are

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

Feature Extraction and Image Processing, 2 nd Edition. Contents. Preface

Feature Extraction and Image Processing, 2 nd Edition. Contents. Preface , 2 nd Edition Preface ix 1 Introduction 1 1.1 Overview 1 1.2 Human and Computer Vision 1 1.3 The Human Vision System 3 1.3.1 The Eye 4 1.3.2 The Neural System 7 1.3.3 Processing 7 1.4 Computer Vision

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Ear Biometrics- An Alternative Biometric R. Parimala 1 and C. Jayakumar 2 1 Research Scholar, Bharathiar University, Coimbatore, India

Ear Biometrics- An Alternative Biometric R. Parimala 1 and C. Jayakumar 2 1 Research Scholar, Bharathiar University, Coimbatore, India Ear Biometrics- An Alternative Biometric R. Parimala 1 and C. Jayakumar 2 1 Research Scholar, Bharathiar University, Coimbatore, India 2 Professor, CSE Department, RMK Engineering College, Kavaraipettai,India

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

Combining Gabor Features: Summing vs.voting in Human Face Recognition * Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Image-Based Competitive Printed Circuit Board Analysis

Image-Based Competitive Printed Circuit Board Analysis Image-Based Competitive Printed Circuit Board Analysis Simon Basilico Department of Electrical Engineering Stanford University Stanford, CA basilico@stanford.edu Ford Rylander Department of Electrical

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

Biometrics: The Password You ll Never Forget

Biometrics: The Password You ll Never Forget 1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within

More information

FSN-PalmSecureID-for ATM Machines

FSN-PalmSecureID-for ATM Machines T he application of biometric solutions in ATMs and electronic point-of-sale solutions provide a high- security environment. By using a smartcard, on which the client's unique palm vein pattern is stored,

More information

A Survey on Ear Biometrics Revolution

A Survey on Ear Biometrics Revolution ISSN : 2348-6090 A Survey on Ear Biometrics Revolution 1 Babli Singh, 2 Avadhesh Kumar, 3 Pradeep Tomar 1 PG Scholar, Computer Science and Engineering Galgotias University, Greater Noida, U.P, India 2

More information

AUTHENTICATION SYSTEM USING IRIS RECOGNITION

AUTHENTICATION SYSTEM USING IRIS RECOGNITION AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Topics for thesis. Automatic Speech-based Emotion Recognition

Topics for thesis. Automatic Speech-based Emotion Recognition Topics for thesis Bachelor: Automatic Speech-based Emotion Recognition Emotion recognition is an important part of Human-Computer Interaction (HCI). It has various applications in industrial and commercial

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

FINGERPRINT BIOMETRICS

FINGERPRINT BIOMETRICS FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...

More information

The identification of mammalian species through the classification of hair patterns using image pattern recognition

The identification of mammalian species through the classification of hair patterns using image pattern recognition The identification of mammalian species through the classification of hair patterns using image pattern recognition Thamsanqa Moyo Shaun Bangay Grahamstown, South Africa Grahamstown, South Africa g02m1612@campus.ru.ac.za

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

Haresh D. Chande #, Zankhana H. Shah *

Haresh D. Chande #, Zankhana H. Shah * Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information

More information

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System _ Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System K.Ramaraj 1, T.Ummal Sariba Begum 2 Research scholar, Assistant Professor in Computer Science, Thanthai Hans

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

Su et al. Shape Descriptors - III

Su et al. Shape Descriptors - III Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Bitangent 3. Bitangent 1. dist = max Region A. Region B. Bitangent 2. Bitangent 4

Bitangent 3. Bitangent 1. dist = max Region A. Region B. Bitangent 2. Bitangent 4 Ecient pictograph detection Dietrich Buesching TU Muenchen, Fakultaet fuer Informatik FG Bildverstehen 81667 Munich, Germany email: bueschin@informatik.tu-muenchen.de 1 Introduction Pictographs are ubiquitous

More information

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

An Improved Iris Segmentation Technique Using Circular Hough Transform

An Improved Iris Segmentation Technique Using Circular Hough Transform An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,

More information

Face Recognition System Using PCA

Face Recognition System Using PCA Face Recognition System Using PCA M.V.N.R. Pavan Kumar 1, Shaikh Arshad A. 2, Katwate Dhananjay P. 3,Jamdar Rohit N. 4 Department of Electronics and Telecommunication Engineering 1,2,3,4, LNBCIET, Satara-415020

More information

CHAPTER 1 Introduction 1. CHAPTER 2 Images, Sampling and Frequency Domain Processing 37

CHAPTER 1 Introduction 1. CHAPTER 2 Images, Sampling and Frequency Domain Processing 37 Extended Contents List Preface... xi About the authors... xvii CHAPTER 1 Introduction 1 1.1 Overview... 1 1.2 Human and Computer Vision... 2 1.3 The Human Vision System... 4 1.3.1 The Eye... 5 1.3.2 The

More information

LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES. Karin Sobottka Ioannis Pitas

LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES. Karin Sobottka Ioannis Pitas LOCALIZATION OF FACIAL REGIONS AND FEATURES IN COLOR IMAGES Karin Sobottka Ioannis Pitas Department of Informatics, University of Thessaloniki 540 06, Greece e-mail:fsobottka, pitasg@zeus.csd.auth.gr Index

More information

Computer and Machine Vision

Computer and Machine Vision Computer and Machine Vision Lecture Week 11 Part-2 Segmentation, Camera Calibration and Feature Alignment March 28, 2014 Sam Siewert Outline of Week 11 Exam #1 Results Overview and Solutions Wrap up of

More information

Recognition. Clark F. Olson. Cornell University. work on separate feature sets can be performed in

Recognition. Clark F. Olson. Cornell University. work on separate feature sets can be performed in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 907-912, 1996. Connectionist Networks for Feature Indexing and Object Recognition Clark F. Olson Department of Computer

More information

A Study of Medical Image Analysis System

A Study of Medical Image Analysis System Indian Journal of Science and Technology, Vol 8(25), DOI: 10.17485/ijst/2015/v8i25/80492, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Medical Image Analysis System Kim Tae-Eun

More information

IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION

IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION Sangini Shah, Ankita Mandowara, Mitesh Patel Computer Engineering Department Silver Oak College Of Engineering and Technology, Ahmedabad Abstract:

More information

Advanced Video Content Analysis and Video Compression (5LSH0), Module 4

Advanced Video Content Analysis and Video Compression (5LSH0), Module 4 Advanced Video Content Analysis and Video Compression (5LSH0), Module 4 Visual feature extraction Part I: Color and texture analysis Sveta Zinger Video Coding and Architectures Research group, TU/e ( s.zinger@tue.nl

More information

Biometric Recognition Systems Employing Novel Shape-based Features

Biometric Recognition Systems Employing Novel Shape-based Features University of Miami Scholarly Repository Open Access Dissertations Electronic Theses and Dissertations 2010-11-19 Biometric Recognition Systems Employing Novel Shape-based Features Jindan Zhou University

More information

Use of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests

Use of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Use of Mean Square Error Measure in Biometric Analysis of

More information

Fingerprint Classification Using Orientation Field Flow Curves

Fingerprint Classification Using Orientation Field Flow Curves Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification

More information

A Survey on Ear Recognition

A Survey on Ear Recognition A Survey on Ear Recognition Spyridon Antakis University of Twente Department of Mathematics & Computer Science Enschede, The Netherlands, P.O. Box 217, 7500 AE Email: {s.antakis}@student.tue.nl February

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,

More information

Pathology Hinting as the Combination of Automatic Segmentation with a Statistical Shape Model

Pathology Hinting as the Combination of Automatic Segmentation with a Statistical Shape Model Pathology Hinting as the Combination of Automatic Segmentation with a Statistical Shape Model Pascal A. Dufour 12,HannanAbdillahi 3, Lala Ceklic 3,Ute Wolf-Schnurrbusch 23,JensKowal 12 1 ARTORG Center

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information