An Overview of Biometric Image Processing
|
|
- Evelyn Warren
- 5 years ago
- Views:
Transcription
1 An Overview of Biometric Image Processing
2 CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional systems to verify a person s identity are based on knowledge (secret code) or possession (ID card). However, codes can be forgotten or overheard, and ID cards can be lost or stolen, giving impostors the possibility to extend the identity test. These existing issues have received increasing identity in recent years about the use of features inseparable from a person s body which significantly decreases the possibility of a hoax. The need for security in a wide scope of applications, such as replacement of the Personal Identification Number (PIN) in banking and retail business, security of transactions across computer networks, high-secure wireless access, tele-voting, and admittance to restricted areas can be practiced with the help of biometric based authentication. This chapter discusses about the overview of digital image processing, about biometric system and the importance of biometric technology in real-time applications. 2.1 Digital Image Processing The process of obtaining and analyzing visual data from digital data processor is called Digital Image Processing and Scene Analysis. Digital Image Processing [10] is a rapidly developing subject area with growing applications in science and technology. Image Processing has the likelihood of acquiring the ultimate machine that could execute the optical functions of all existing organisms. Many theoretical and technological discoveries are required before it could make such a machine that is there is an abundance of Image Processing applications that can help humanity with the availability and anticipated technology in the near future. Imaging began in the 19th century with photography and continued with television, X-rays and electronic scanning during the 20th century. Image Processing arose as a field of study in the 1950s with pictures of the solid ground from high-flying spy airplanes and then with pictures of the earth s surface taken from orbiting satellites. 8
3 Processing of an image includes improvement in its appearance and efficient representation. This discipline consists of not just feature extraction, analysis and recognition of images, but also coding, filtering, enhancement and restoration. The entire process of image processing and analysis starts from receiving of visual information to the giving out of the description about the scene. It can be divided into three main stages [16] as given below: Discretization and Representation: Translating visual information into a discrete form suitable for computer processing, approximating visual information to save storage space as well as time requirements in subsequent processing. Processing: Improving image quality by filtering, etc., reducing data to save storage space and channel capacity during transmission. Analysis: Extracting image features; quantifying shapes, registration and recognition. 2.2 Outline of Biometric Technology The emerging field of biometric technology addresses the automated identification of individuals, depending on their physiological and behavioral traits. The broad category of human authentication schemes, denoted as biometrics encompasses many techniques from Computer Vision and Pattern Recognition. The personal attributes that are used in a biometric identification system can be physiological or behavioral. The physiological biometric identification system includes fingerprints, palm print, facial features, iris, retinal scans, and hand and finger geometry. The behavioral biometric identification system considers the character idiosyncratic of the individual, such as gait, voice print, sign and key stroking. Depending on the complexity or the security level of the application, one will opt to use one or more of these personal characteristics [11]. Biometric systems have been actively emerging in many applications of diverse industries for the past few years and it is continuing to roll out to provide higher security features to access control system. Many cases of single modal biometric systems have been built up and deployed, for example, fingerprint, face, speaker, palm print and hand geometry verification systems. These systems are capable of providing a low to middle range of security features. For higher security features, the blend of two or more single- 9
4 modal biometrics (also known as multimodal biometrics) is also proposed. Biometrics are the most secured and convenient method to satisfy the need for identifying the individuals in the society. For automatic identification of an individual, physiological or behavioral characteristics of a person are used [11]. 2.3 Prerequisites of a Good Biometric Many different traits of human physiology, behavior or chemistry can be used for biometric authentication. The choice of an individual biometric for use in a specific application involves weighing of various components. Jain et al [12] acknowledged seven such factors to be employed when evaluating the suitability of any trait for use in biometric authentication. Universality means that each person using a system should hold the quality. Uniqueness means that the quality should be sufficiently unique for individuals in the relevant population, such that they can be notable from each other. Permanence associates the manner in which a quality varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of acquisition or measurement of the trait. Additionally, acquired data must be in a form that permits subsequent processing and extraction of the related feature sets. Performance relates to the speed, robustness and accuracy of technology used. Acceptability relates to how good the individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and measured. Circumvention relates to the efforts with which a trait might be imitated using an artifact or substitute. 2.4 Need for Biometrics In the current times, most of the transactions either finance or other secure messages are automated and many of them networked, so security has gone forth a most 10
5 important subject. Security is commonly in the form of belongings like ID cards, keys or secret knowledge like password. This type of security is not guaranteed as for example, ID cards may be lost, and passwords may be forgotten or compromised. A sturdy need was therefore felt for more robust authentication methods and far-reaching research ensued in this area. This led to the concept of using human body parts or human mannerism itself as security and authentication measure, and eventually to the emergence of biometrics as a subject by itself. Nowadays it is widely recognized that any positive recognition of a person must take into account of his biometric identification. 2.5 Biometric System as Pattern Recognition A biometric system is basically a pattern recognition system that works by acquiring biometric data from an individual, drawing out a feature set of the acquired data and then comparing this feature set against the template set in the database. Depending on the context of application, a biometric system could function either in identification mode or verification mode. The block diagram depicts the two fundamental modes of a biometric system [13] as exposed in figure 2.1 Figure 2.1 Block Diagram of the General Biometric Detection System [14] 11
6 First block, known as sensor acts as an interface between system and the real world and acquires necessary data. Vision based picture acquisition system is convenient choice for it, but can be changed as per application. Second block performs pre-processing, i.e. removes artifacts from the sensor and enhances the input picture. In the next block, essential characteristics are extracted. This is a critical stage where the right features are required to be extracted in an optimal way. Image features or vector of the numbers with specific properties is used for the formation of the template. A template is a combinational set of related features extracted from the source. Elements of biometric measurements those are not required for comparison algorithms are banished in templates for reducing size of file and for protecting the individuality of the claimer. 2.6 Modes of Biometric System Verification or Authentication Mode The system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps are involved in the verification of a person [13]. Step 1: Reference models for all the users are generated and stored in the model database. Step 2: With samples that are matched with reference models to generate the genuine and impostor scores and the threshold is calculated. Step 3: In this testing, the process was performed which may use a username, smart card or ID number (e.g. PIN) to indicate which template should be used for comparison Identification Mode The system performs a one-to-many comparison against a biometric data base in an attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within the previously set threshold. The identification mode may be used either for 'positive recognition or for 'negative recognition' of the person. The latter recognition will only be achieved through biometrics since other methods of personal recognition such as PINs, passwords or keys are ineffective [11]. 12
7 During the enrollment phase, the template is simply stored somewhere (on a card or within a database or both). During the matching phase, the template obtained is passed to a matcher that compares it with other available templates, approximating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the input with the template. This will subsequently be an output for any specified use or purpose (e.g. Entrance in a restricted area). Selection of biometrics in any practical application depends upon the characteristic measurements and user requirements [13]. Selecting a biometric based on the user requirement takes into account of the availability of sensor devices, computational time, reliability, sensor area, cost and power consumption. 2.7 Phases of Biometric System A biometric system is designed using the following three main phases [15] as shown in Figure 2.2. Figure 2.2 Modules of a Biometric System [16] 13
8 2.7.1 Biometric Image Capturing Phase In this phase, the raw biometric is captured by a sensing device such as a fingerprint scanner or video camera. An example of such a device is a fingerprint sensor that captures images like the ridge and valley structure of a user s finger Feature Extraction Phase The second phase of processing is to extract the distinguishing characteristics of the raw biometric sample and convert it into a processed biometric identifier record, in which the acquired biometric data are processed to extract the salient or discriminatory features Matcher Phase This phase works during the authentication process in which the features extracted during recognition are compared against the stored templates to generate matching scores. The matcher module also encapsulates a decision-making model, where the identity of a claimed user is confirmed (verification) or a user s identity is established (identification) based on the matching score Template Database Phase This phase is used by the biometric system to store the biometric templates of the registered users. To store the biometric features or templates of enrolled users, the enrollment module holds the responsibility for enrolling individuals in the biometric system database. During the phase of enrollment, the biometric characteristic of an individual is scanned first by a biometric reader to produce a digital representation of the characteristic. The data that is captured during the enrollment process may or may not be supervised by a human depending on the application. A quality check is generally performed to ensure that the acquired sample can be reliably processed by succeeding stages. In order to help the process of matching, the input digital representation is further treated by a feature extractor to generate a compact but expressive representation, called a template. Based on the application, the template can be stored in the central database of the biometric system or be recorded on a smart card issued to the individual person. Usually, several templates of an individual are stored to account for variations observed in the biometric trait and the templates in the database may be updated over time. 14
9 2.8 Uses of Biometrics The uses of Biometric system are listed below Firstly, biometric systems can be used as physical access granting systems. Secondly, biometric systems can be used to establish entitlement to services and rights. Thirdly, biometric systems can be used for the recording and association of facts. 2.9 Types of Biometrics The Biometrics system falls into two categories, they are physical biometrics and behavioral biometrics, which are explained in this section Physical Biometrics Physiological traits are related to the shape of the body. Examples include, but are not limited to fingerprints, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent [17]. Physical biometrics evaluates certain unique physical characteristics of a person s body. Types of physical biometric devices are: Fingerprint Scanners Hand Geometry Scanners Iris Scanners Retinal Scanners Facial Scanners Fingerprint Scanners Fingerprint scanners are devices that scan an individual s fingerprint and compare it to a pre-existing fingerprint template [16]. This is most commonly used biometric device. The advantages of fingerprint scanners are inexpensive and it has the ability to enroll multiple fingerprints. The disadvantage of fingerprint scanners is it s vulnerable to dirt and its association with criminality. 15
10 Figure 2.3 Fingerprint Scanner Hand Geometry Scanners Hand Geometry scanners are devices which measure an individual s hand based on their hand s size and shape [18]. The advantage of hand geometry scanners is its simple to use and it works quickly and easily. The disadvantages are its limited accuracy and the machine is large and bulky. Figure 2.4 Hand Geometry Scanners Iris Scanners Iris scanners analyze the pattern of color surrounding one s pupils [17]. The advantage of Iris scanners is its simple cameras and doesn t require close contact and results are accurate. The disadvantages are its being expensive and not easy to use. 16
11 Figure 2.5 Iris Scanners Retinal Scanners Retinal scanners analyze patterns of blood vessels in the back of one s eye [19]. The advantage of retinal scanners is its very accurate and the patterns don t change often. The disadvantages are its difficult to use, expensive, large in size and require close contact. Figure 2.6 Retinal Scanners Facial Scanners Facial recognition starts by using a digital video camera to record a person s face as they enter a certain area. This type of biometrics does not require anyone to physically touch a machine, just stand within a designated space. Facial Scanners analyze one s facial characteristics. The advantage of facial scanners, it uses normal cameras and does not require cooperation of others. The disadvantages are it needs adequate lighting and faces change over time. 17
12 Figure 2.7 Facial Scanners Behavioral Biometrics Behavioral biometrics is related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics. Behavioral biometric devices analyze particular behavioral characteristics of an individual. Types of behavioral biometric devices [20] are, Signature verification scanners Voice authentication scanners Keystroke scanners Signature Verification Signature Verification Devices analyze a person s signature based on shape of signature, speed and pressure. The key advantage of this particular system of behavioral biometrics is that it was based on an already accepted form of identification. Incorporation of a security system based on Dynamic Signature Verification would require a certain amount of investment in equipment and software to analyze the inputs, but no real cost to train people on how to input signals. The disadvantages are high error rates. The process is ideal for security purposes because it allows a frequently used writing (the signature) that is unique to each user based upon the amount of time and effort that they specifically put into their writing. 18
13 Figure 2.8 Signature Verification Scanners Voice Authentication Voice authentication devices analyze an individual s voice and transform their words into text, which is often referred to as voice to print technology. The voiceprint is a biometric voice identifier and not a recording or a sound file; so an imposter could not record one s words and replay them into the system and get access granted. A voiceprint allows the user to gain access to information or give authorization without being physically present; this way the user can give authorization by way of a simple phone call. The advantage is it s easy to use. Its disadvantage is background noise and voice changes. Figure 2.9 Voice Authentication Scanners Keystroke Scanners Keystroke scanners are software programs that evaluate a person s typing patterns based on flight time and dwell time. One of the most likely possible uses for keystroke dynamics in the business and information world today would be for user identification purposes. Once proper calibrated, the template will be easily able to 19
14 distinguish whether the acceptable user is typing or not by comparing the flight and dwell times to those set in the template. The advantage is it s easy to use between software versus physical device. The disadvantage is its accuracy is very limited. Figure 2.10 Keystroke Biometric Authentication Scanners 2.10 Performance Evaluation Referable to the variations existing within any biometric signal, a biometric authentication or recognition system cannot render an absolute answer about the individual's identity; rather it provides the individual's identity information with a certain confidence level. This is adverse to traditional authentication systems (for instance, a password system) where the match has to be exact and an absolute yes or no response is given. The biometric signal variations of an individual are usually referred to as intra-class variations (Figure 2.11); whereas variations between different individuals are called inter-class variations. 20
15 Figure 2.11 : Intra-class variation. Figure 2.11 shows the examples of intra-class variation. There are eight different fingerprint impressions of the same finger. Note that huge differences of image contrasts, locations, rotations, sizes, and qualities, exist among them. A biometric matcher takes two biometric signals, and returns a similarity measurement result. If the result becomes closer to 1, the matcher recognizes more confidently that both biometric signals come from the same individual; when it becomes closer to 0, the matcher recognizes that both biometric signals come from the same individual with lesser confidence. Generally, the identity of a submitted biometric signal is either a genuine type or an impostor type; hence, there are two statistical distributions of similarity scores, which are called genuine distribution and impostor distribution (Figure 2.12). Each type of input identity has one of the two possible results, accept or reject, from a biometric matcher. Consequently, there are four possible outcomes: 1. A genuine individual is accepted; 2. A genuine individual is rejected; 3. An impostor individual is accepted; 4. An impostor individual is rejected. 21
16 The first and fourth outcomes are correct while the second and third outcomes represent the error situations. The second outcome is referred to as false reject and the corresponding error rate is called False Reject Rate (FRR); the third outcome is referred to as false accept and the corresponding error rate is called False Accept Rate (FAR). They are the most widely used measurements in today's commercial environment. Given a genuine distribution, p g, and impostor distribution, p i, the FAR and FRR at threshold th is given by 1 FFFFFF(TT) = pp ii (xx)dddd tth FFFFFF(TT) = tth 0 pp gg (xx)dddd Strict tradeoff exists between FAR and FRR in every biometric system [21]. From equation 2.1 and 2.2, both FAR and FRR are actually functions of threshold th. When th decreases, the system would have more tolerance to intra-class variations and noise, however the FAR will increase. Similarly, if the value of th is lower, the system would be more secure and the FRR decreases. The following figure 2.12 shows the example of genuine and imposter distributions. The red line is the imposter and the blue line is the genuine. Figure 2.12: Example of Genuine and Impostor Distributions 22
17 Depending on the nature of an application, the biometric system may be chosen to operate at low FAR configuration (for example, the login process in ATMs), or to operate at low FRR configuration (for example, the access control system for a library). A system designer may have no prior knowledge about the nature of the application in which the biometric system is to be applied, thus it is helpful to report the system performance at all possible operating points (thresholds). Other useful performance measurements are: Equal Error Rate (EER): the error rate where FAR equals to FRR. ZeroFNMR: the lowest FAR at which no false reject occurs. ZeroFMR: the lowest FRR at which no false accept occurs. Failure To Capture Rate: the rate at which the biometric acquisition device fails to automatically capture the biometric signals. A high failure to capture rate makes the biometric system hard to use. Failure To Enroll Rate: the rate at which users are not able to enroll in the system. This error mainly occurs when the biometric signal is rejected due to its poor quality. Failure to Match Rate: occurs when the biometric system fails to convert the input biometric signal into a machine readable/understandable biometric template. Unlike FRR, a failure to match the error occurs at a stage prior to the decision making stage in a biometric system Merits and Demerits of Biometric System The merits of the biometric system are as follows, It is significantly more difficult to copy, share, and distribute biometrics with as much ease as passwords and tokens. Biometrics cannot be lost or forgotten and online biometrics-based recognition systems require the person to be recognized to be present at the point of recognition. 23
18 It is difficult to forge biometrics and extremely unlikely for a user to repudiate, for example, having accessed a computer network. Further, all the users of the system have a relatively equal security level and one account is no easier to break than any other (e.g., through social engineering methods). Biometrics introduce incredible convenience for the users (as users are no longer required to remember multiple, long and complex, frequently changing passwords) while maintaining a sufficiently high degree of security. Biometric systems that operate using any single biometric characteristic have few issues to be monitored are as follows: Noise in sensed data: The sensed data might be noisy or distorted Intra-class variations: The biometric data acquired from an individual during authentication may be very different from the data that was used to generate the template during enrollment, thereby affecting the matching process. Distinctiveness: While a biometric trait is expected to vary significantly across individuals, there may be large inter-class similarities in the feature sets used to represent these traits. Non-universality: While every user is expected to possess the biometric trait being acquired, in reality it is possible for a subset of the users to not possess a particular biometric. Spoof attacks: An impostor may attempt to spoof the biometric trait of a legitimate enrolled user in order to circumvent the system. This type of attack is especially relevant when behavioral traits such as signature and voice are used Summary The successful installation of biometric systems in various civilian applications does not imply those biometrics are a fully solved problem. It is clear that there is plenty of scope for improvement in biometrics. Researchers are not only addressing issues related to reducing error rates, but they are also looking at ways to enhance the usability of biometric systems. Biometric systems that operate using any single biometric characteristic have some 24
19 limitations which will lead to poor identification results. This chapter provides the general idea of biometric system functionalities and its applications. The proposed research work concentrates on fingerprint based image processing. The next chapter discusses about an elaborate study on fingerprint recognition system. 25
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationBIOMETRIC TECHNOLOGY: A REVIEW
International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationSecure and Private Identification through Biometric Systems
Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant
More informationBiometric Cryptosystems: for User Authentication
Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,
More informationFINGERPRINT BIOMETRICS
FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...
More informationStuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication
Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals
More informationIdentification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:
Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationA Review of Emerging Biometric Authentication Technologies
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationBIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES
BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationChapter 3: User Authentication
Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationAuthentication Objectives People Authentication I
Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationBiometrics: The Password You ll Never Forget
1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within
More informationImplementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition
RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication
More informationMultimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters
Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationA Novel Approach to Improve the Biometric Security using Liveness Detection
Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationComputer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationComputer Security 4/15/18
Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)
More informationCHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM
107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationAdvanced Touchless Biometric Identification using SIFT Features
Advanced Touchless Biometric Identification using SIFT Features H.Abubacker Siddique PG Scholar, Department of CSE National College of Engineering Tirunelveli, Tamilnadu, India. ahamedabdul786@gmail.com
More informationCarmen Alonso Montes 23rd-27th November 2015
Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object
More informationIn this unit we are continuing our discussion of IT security measures.
1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems
More informationThe Future of Authentication
The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationIJITKM Volume 7 Number 1 December 2013 pp (ISSN )
Biometric Recognition Challenges Dr. Chander Kant, Archana Toky Assistant Professor, Deptt. of computer Science & Appl. K.U. Kurukshetra Faculty, Deptt. Of Computer Science, Govt. College for women, Hisar
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationTechnical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication
Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...
More informationChapter 6. Multibiometrics
148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationLecture 9 User Authentication
Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationFrom the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems
From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es
More informationFingerprint Mosaicking &
72 1. New matching methods for comparing the ridge feature maps of two images. 2. Development of fusion architectures to improve performance of the hybrid matcher. 3. Constructing the ridge feature maps
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationOn-line Signature Verification on a Mobile Platform
On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion
More informationUsing Biometric Authentication to Elevate Enterprise Security
Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of
More informationInternational Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking
International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris
More informationSECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY
SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,
More informationMultimodal Biometric System in Secure e- Transaction in Smart Phone
Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,
More informationComputer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1
Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords
More informationHighly Secure Authentication Scheme: A Review
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:
More informationGaithashing: a two-factor authentication scheme based on gait features
Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationPerformance Analysis of Fingerprint Identification Using Different Levels of DTCWT
2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationWhat is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.
P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.
More informationAuthentication by Mouse Movements. By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004
Authentication by Mouse Movements By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004 Topics Introduction Design and Implementation Active authentication Passive
More informationCHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS
5 CHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS 2.1 DIGITAL IMAGE PROCESSING The process of receiving and analyzing visual information by digital computer is called
More informationCSC 474 Network Security. Authentication. Identification
Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication
More informationAn Algorithm for Feature Level Fusion in Multimodal Biometric System
An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure
More informationPALM VEIN TECHNOLOGY
Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)
More informationThumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password
Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,
More informationPolar Harmonic Transform for Fingerprint Recognition
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationCIS 6930/4930 Computer and Network Security. Topic 6. Authentication
CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FINGER PRINT BASED ELECTRONIC VOTING MACHINE PROF. K. M. PIMPLE 1, MISS. PALLAVI
More informationBiometrics Hybrid System Based Verification
Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationPOLYBIO Multibiometrics Database: Contents, description and interfacing platform
POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,
More informationFinger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation
Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,
More informationLecture 11: Human Authentication CS /12/2018
Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted
More information