An Overview of Biometric Image Processing

Size: px
Start display at page:

Download "An Overview of Biometric Image Processing"

Transcription

1 An Overview of Biometric Image Processing

2 CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional systems to verify a person s identity are based on knowledge (secret code) or possession (ID card). However, codes can be forgotten or overheard, and ID cards can be lost or stolen, giving impostors the possibility to extend the identity test. These existing issues have received increasing identity in recent years about the use of features inseparable from a person s body which significantly decreases the possibility of a hoax. The need for security in a wide scope of applications, such as replacement of the Personal Identification Number (PIN) in banking and retail business, security of transactions across computer networks, high-secure wireless access, tele-voting, and admittance to restricted areas can be practiced with the help of biometric based authentication. This chapter discusses about the overview of digital image processing, about biometric system and the importance of biometric technology in real-time applications. 2.1 Digital Image Processing The process of obtaining and analyzing visual data from digital data processor is called Digital Image Processing and Scene Analysis. Digital Image Processing [10] is a rapidly developing subject area with growing applications in science and technology. Image Processing has the likelihood of acquiring the ultimate machine that could execute the optical functions of all existing organisms. Many theoretical and technological discoveries are required before it could make such a machine that is there is an abundance of Image Processing applications that can help humanity with the availability and anticipated technology in the near future. Imaging began in the 19th century with photography and continued with television, X-rays and electronic scanning during the 20th century. Image Processing arose as a field of study in the 1950s with pictures of the solid ground from high-flying spy airplanes and then with pictures of the earth s surface taken from orbiting satellites. 8

3 Processing of an image includes improvement in its appearance and efficient representation. This discipline consists of not just feature extraction, analysis and recognition of images, but also coding, filtering, enhancement and restoration. The entire process of image processing and analysis starts from receiving of visual information to the giving out of the description about the scene. It can be divided into three main stages [16] as given below: Discretization and Representation: Translating visual information into a discrete form suitable for computer processing, approximating visual information to save storage space as well as time requirements in subsequent processing. Processing: Improving image quality by filtering, etc., reducing data to save storage space and channel capacity during transmission. Analysis: Extracting image features; quantifying shapes, registration and recognition. 2.2 Outline of Biometric Technology The emerging field of biometric technology addresses the automated identification of individuals, depending on their physiological and behavioral traits. The broad category of human authentication schemes, denoted as biometrics encompasses many techniques from Computer Vision and Pattern Recognition. The personal attributes that are used in a biometric identification system can be physiological or behavioral. The physiological biometric identification system includes fingerprints, palm print, facial features, iris, retinal scans, and hand and finger geometry. The behavioral biometric identification system considers the character idiosyncratic of the individual, such as gait, voice print, sign and key stroking. Depending on the complexity or the security level of the application, one will opt to use one or more of these personal characteristics [11]. Biometric systems have been actively emerging in many applications of diverse industries for the past few years and it is continuing to roll out to provide higher security features to access control system. Many cases of single modal biometric systems have been built up and deployed, for example, fingerprint, face, speaker, palm print and hand geometry verification systems. These systems are capable of providing a low to middle range of security features. For higher security features, the blend of two or more single- 9

4 modal biometrics (also known as multimodal biometrics) is also proposed. Biometrics are the most secured and convenient method to satisfy the need for identifying the individuals in the society. For automatic identification of an individual, physiological or behavioral characteristics of a person are used [11]. 2.3 Prerequisites of a Good Biometric Many different traits of human physiology, behavior or chemistry can be used for biometric authentication. The choice of an individual biometric for use in a specific application involves weighing of various components. Jain et al [12] acknowledged seven such factors to be employed when evaluating the suitability of any trait for use in biometric authentication. Universality means that each person using a system should hold the quality. Uniqueness means that the quality should be sufficiently unique for individuals in the relevant population, such that they can be notable from each other. Permanence associates the manner in which a quality varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of acquisition or measurement of the trait. Additionally, acquired data must be in a form that permits subsequent processing and extraction of the related feature sets. Performance relates to the speed, robustness and accuracy of technology used. Acceptability relates to how good the individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and measured. Circumvention relates to the efforts with which a trait might be imitated using an artifact or substitute. 2.4 Need for Biometrics In the current times, most of the transactions either finance or other secure messages are automated and many of them networked, so security has gone forth a most 10

5 important subject. Security is commonly in the form of belongings like ID cards, keys or secret knowledge like password. This type of security is not guaranteed as for example, ID cards may be lost, and passwords may be forgotten or compromised. A sturdy need was therefore felt for more robust authentication methods and far-reaching research ensued in this area. This led to the concept of using human body parts or human mannerism itself as security and authentication measure, and eventually to the emergence of biometrics as a subject by itself. Nowadays it is widely recognized that any positive recognition of a person must take into account of his biometric identification. 2.5 Biometric System as Pattern Recognition A biometric system is basically a pattern recognition system that works by acquiring biometric data from an individual, drawing out a feature set of the acquired data and then comparing this feature set against the template set in the database. Depending on the context of application, a biometric system could function either in identification mode or verification mode. The block diagram depicts the two fundamental modes of a biometric system [13] as exposed in figure 2.1 Figure 2.1 Block Diagram of the General Biometric Detection System [14] 11

6 First block, known as sensor acts as an interface between system and the real world and acquires necessary data. Vision based picture acquisition system is convenient choice for it, but can be changed as per application. Second block performs pre-processing, i.e. removes artifacts from the sensor and enhances the input picture. In the next block, essential characteristics are extracted. This is a critical stage where the right features are required to be extracted in an optimal way. Image features or vector of the numbers with specific properties is used for the formation of the template. A template is a combinational set of related features extracted from the source. Elements of biometric measurements those are not required for comparison algorithms are banished in templates for reducing size of file and for protecting the individuality of the claimer. 2.6 Modes of Biometric System Verification or Authentication Mode The system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps are involved in the verification of a person [13]. Step 1: Reference models for all the users are generated and stored in the model database. Step 2: With samples that are matched with reference models to generate the genuine and impostor scores and the threshold is calculated. Step 3: In this testing, the process was performed which may use a username, smart card or ID number (e.g. PIN) to indicate which template should be used for comparison Identification Mode The system performs a one-to-many comparison against a biometric data base in an attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within the previously set threshold. The identification mode may be used either for 'positive recognition or for 'negative recognition' of the person. The latter recognition will only be achieved through biometrics since other methods of personal recognition such as PINs, passwords or keys are ineffective [11]. 12

7 During the enrollment phase, the template is simply stored somewhere (on a card or within a database or both). During the matching phase, the template obtained is passed to a matcher that compares it with other available templates, approximating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the input with the template. This will subsequently be an output for any specified use or purpose (e.g. Entrance in a restricted area). Selection of biometrics in any practical application depends upon the characteristic measurements and user requirements [13]. Selecting a biometric based on the user requirement takes into account of the availability of sensor devices, computational time, reliability, sensor area, cost and power consumption. 2.7 Phases of Biometric System A biometric system is designed using the following three main phases [15] as shown in Figure 2.2. Figure 2.2 Modules of a Biometric System [16] 13

8 2.7.1 Biometric Image Capturing Phase In this phase, the raw biometric is captured by a sensing device such as a fingerprint scanner or video camera. An example of such a device is a fingerprint sensor that captures images like the ridge and valley structure of a user s finger Feature Extraction Phase The second phase of processing is to extract the distinguishing characteristics of the raw biometric sample and convert it into a processed biometric identifier record, in which the acquired biometric data are processed to extract the salient or discriminatory features Matcher Phase This phase works during the authentication process in which the features extracted during recognition are compared against the stored templates to generate matching scores. The matcher module also encapsulates a decision-making model, where the identity of a claimed user is confirmed (verification) or a user s identity is established (identification) based on the matching score Template Database Phase This phase is used by the biometric system to store the biometric templates of the registered users. To store the biometric features or templates of enrolled users, the enrollment module holds the responsibility for enrolling individuals in the biometric system database. During the phase of enrollment, the biometric characteristic of an individual is scanned first by a biometric reader to produce a digital representation of the characteristic. The data that is captured during the enrollment process may or may not be supervised by a human depending on the application. A quality check is generally performed to ensure that the acquired sample can be reliably processed by succeeding stages. In order to help the process of matching, the input digital representation is further treated by a feature extractor to generate a compact but expressive representation, called a template. Based on the application, the template can be stored in the central database of the biometric system or be recorded on a smart card issued to the individual person. Usually, several templates of an individual are stored to account for variations observed in the biometric trait and the templates in the database may be updated over time. 14

9 2.8 Uses of Biometrics The uses of Biometric system are listed below Firstly, biometric systems can be used as physical access granting systems. Secondly, biometric systems can be used to establish entitlement to services and rights. Thirdly, biometric systems can be used for the recording and association of facts. 2.9 Types of Biometrics The Biometrics system falls into two categories, they are physical biometrics and behavioral biometrics, which are explained in this section Physical Biometrics Physiological traits are related to the shape of the body. Examples include, but are not limited to fingerprints, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent [17]. Physical biometrics evaluates certain unique physical characteristics of a person s body. Types of physical biometric devices are: Fingerprint Scanners Hand Geometry Scanners Iris Scanners Retinal Scanners Facial Scanners Fingerprint Scanners Fingerprint scanners are devices that scan an individual s fingerprint and compare it to a pre-existing fingerprint template [16]. This is most commonly used biometric device. The advantages of fingerprint scanners are inexpensive and it has the ability to enroll multiple fingerprints. The disadvantage of fingerprint scanners is it s vulnerable to dirt and its association with criminality. 15

10 Figure 2.3 Fingerprint Scanner Hand Geometry Scanners Hand Geometry scanners are devices which measure an individual s hand based on their hand s size and shape [18]. The advantage of hand geometry scanners is its simple to use and it works quickly and easily. The disadvantages are its limited accuracy and the machine is large and bulky. Figure 2.4 Hand Geometry Scanners Iris Scanners Iris scanners analyze the pattern of color surrounding one s pupils [17]. The advantage of Iris scanners is its simple cameras and doesn t require close contact and results are accurate. The disadvantages are its being expensive and not easy to use. 16

11 Figure 2.5 Iris Scanners Retinal Scanners Retinal scanners analyze patterns of blood vessels in the back of one s eye [19]. The advantage of retinal scanners is its very accurate and the patterns don t change often. The disadvantages are its difficult to use, expensive, large in size and require close contact. Figure 2.6 Retinal Scanners Facial Scanners Facial recognition starts by using a digital video camera to record a person s face as they enter a certain area. This type of biometrics does not require anyone to physically touch a machine, just stand within a designated space. Facial Scanners analyze one s facial characteristics. The advantage of facial scanners, it uses normal cameras and does not require cooperation of others. The disadvantages are it needs adequate lighting and faces change over time. 17

12 Figure 2.7 Facial Scanners Behavioral Biometrics Behavioral biometrics is related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics. Behavioral biometric devices analyze particular behavioral characteristics of an individual. Types of behavioral biometric devices [20] are, Signature verification scanners Voice authentication scanners Keystroke scanners Signature Verification Signature Verification Devices analyze a person s signature based on shape of signature, speed and pressure. The key advantage of this particular system of behavioral biometrics is that it was based on an already accepted form of identification. Incorporation of a security system based on Dynamic Signature Verification would require a certain amount of investment in equipment and software to analyze the inputs, but no real cost to train people on how to input signals. The disadvantages are high error rates. The process is ideal for security purposes because it allows a frequently used writing (the signature) that is unique to each user based upon the amount of time and effort that they specifically put into their writing. 18

13 Figure 2.8 Signature Verification Scanners Voice Authentication Voice authentication devices analyze an individual s voice and transform their words into text, which is often referred to as voice to print technology. The voiceprint is a biometric voice identifier and not a recording or a sound file; so an imposter could not record one s words and replay them into the system and get access granted. A voiceprint allows the user to gain access to information or give authorization without being physically present; this way the user can give authorization by way of a simple phone call. The advantage is it s easy to use. Its disadvantage is background noise and voice changes. Figure 2.9 Voice Authentication Scanners Keystroke Scanners Keystroke scanners are software programs that evaluate a person s typing patterns based on flight time and dwell time. One of the most likely possible uses for keystroke dynamics in the business and information world today would be for user identification purposes. Once proper calibrated, the template will be easily able to 19

14 distinguish whether the acceptable user is typing or not by comparing the flight and dwell times to those set in the template. The advantage is it s easy to use between software versus physical device. The disadvantage is its accuracy is very limited. Figure 2.10 Keystroke Biometric Authentication Scanners 2.10 Performance Evaluation Referable to the variations existing within any biometric signal, a biometric authentication or recognition system cannot render an absolute answer about the individual's identity; rather it provides the individual's identity information with a certain confidence level. This is adverse to traditional authentication systems (for instance, a password system) where the match has to be exact and an absolute yes or no response is given. The biometric signal variations of an individual are usually referred to as intra-class variations (Figure 2.11); whereas variations between different individuals are called inter-class variations. 20

15 Figure 2.11 : Intra-class variation. Figure 2.11 shows the examples of intra-class variation. There are eight different fingerprint impressions of the same finger. Note that huge differences of image contrasts, locations, rotations, sizes, and qualities, exist among them. A biometric matcher takes two biometric signals, and returns a similarity measurement result. If the result becomes closer to 1, the matcher recognizes more confidently that both biometric signals come from the same individual; when it becomes closer to 0, the matcher recognizes that both biometric signals come from the same individual with lesser confidence. Generally, the identity of a submitted biometric signal is either a genuine type or an impostor type; hence, there are two statistical distributions of similarity scores, which are called genuine distribution and impostor distribution (Figure 2.12). Each type of input identity has one of the two possible results, accept or reject, from a biometric matcher. Consequently, there are four possible outcomes: 1. A genuine individual is accepted; 2. A genuine individual is rejected; 3. An impostor individual is accepted; 4. An impostor individual is rejected. 21

16 The first and fourth outcomes are correct while the second and third outcomes represent the error situations. The second outcome is referred to as false reject and the corresponding error rate is called False Reject Rate (FRR); the third outcome is referred to as false accept and the corresponding error rate is called False Accept Rate (FAR). They are the most widely used measurements in today's commercial environment. Given a genuine distribution, p g, and impostor distribution, p i, the FAR and FRR at threshold th is given by 1 FFFFFF(TT) = pp ii (xx)dddd tth FFFFFF(TT) = tth 0 pp gg (xx)dddd Strict tradeoff exists between FAR and FRR in every biometric system [21]. From equation 2.1 and 2.2, both FAR and FRR are actually functions of threshold th. When th decreases, the system would have more tolerance to intra-class variations and noise, however the FAR will increase. Similarly, if the value of th is lower, the system would be more secure and the FRR decreases. The following figure 2.12 shows the example of genuine and imposter distributions. The red line is the imposter and the blue line is the genuine. Figure 2.12: Example of Genuine and Impostor Distributions 22

17 Depending on the nature of an application, the biometric system may be chosen to operate at low FAR configuration (for example, the login process in ATMs), or to operate at low FRR configuration (for example, the access control system for a library). A system designer may have no prior knowledge about the nature of the application in which the biometric system is to be applied, thus it is helpful to report the system performance at all possible operating points (thresholds). Other useful performance measurements are: Equal Error Rate (EER): the error rate where FAR equals to FRR. ZeroFNMR: the lowest FAR at which no false reject occurs. ZeroFMR: the lowest FRR at which no false accept occurs. Failure To Capture Rate: the rate at which the biometric acquisition device fails to automatically capture the biometric signals. A high failure to capture rate makes the biometric system hard to use. Failure To Enroll Rate: the rate at which users are not able to enroll in the system. This error mainly occurs when the biometric signal is rejected due to its poor quality. Failure to Match Rate: occurs when the biometric system fails to convert the input biometric signal into a machine readable/understandable biometric template. Unlike FRR, a failure to match the error occurs at a stage prior to the decision making stage in a biometric system Merits and Demerits of Biometric System The merits of the biometric system are as follows, It is significantly more difficult to copy, share, and distribute biometrics with as much ease as passwords and tokens. Biometrics cannot be lost or forgotten and online biometrics-based recognition systems require the person to be recognized to be present at the point of recognition. 23

18 It is difficult to forge biometrics and extremely unlikely for a user to repudiate, for example, having accessed a computer network. Further, all the users of the system have a relatively equal security level and one account is no easier to break than any other (e.g., through social engineering methods). Biometrics introduce incredible convenience for the users (as users are no longer required to remember multiple, long and complex, frequently changing passwords) while maintaining a sufficiently high degree of security. Biometric systems that operate using any single biometric characteristic have few issues to be monitored are as follows: Noise in sensed data: The sensed data might be noisy or distorted Intra-class variations: The biometric data acquired from an individual during authentication may be very different from the data that was used to generate the template during enrollment, thereby affecting the matching process. Distinctiveness: While a biometric trait is expected to vary significantly across individuals, there may be large inter-class similarities in the feature sets used to represent these traits. Non-universality: While every user is expected to possess the biometric trait being acquired, in reality it is possible for a subset of the users to not possess a particular biometric. Spoof attacks: An impostor may attempt to spoof the biometric trait of a legitimate enrolled user in order to circumvent the system. This type of attack is especially relevant when behavioral traits such as signature and voice are used Summary The successful installation of biometric systems in various civilian applications does not imply those biometrics are a fully solved problem. It is clear that there is plenty of scope for improvement in biometrics. Researchers are not only addressing issues related to reducing error rates, but they are also looking at ways to enhance the usability of biometric systems. Biometric systems that operate using any single biometric characteristic have some 24

19 limitations which will lead to poor identification results. This chapter provides the general idea of biometric system functionalities and its applications. The proposed research work concentrates on fingerprint based image processing. The next chapter discusses about an elaborate study on fingerprint recognition system. 25

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

BIOMETRIC TECHNOLOGY: A REVIEW

BIOMETRIC TECHNOLOGY: A REVIEW International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

Biometric Cryptosystems: for User Authentication

Biometric Cryptosystems: for User Authentication Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,

More information

FINGERPRINT BIOMETRICS

FINGERPRINT BIOMETRICS FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

A Review of Emerging Biometric Authentication Technologies

A Review of Emerging Biometric Authentication Technologies International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Biometrics: The Password You ll Never Forget

Biometrics: The Password You ll Never Forget 1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within

More information

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,

More information

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular

More information

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz

More information

Advanced Touchless Biometric Identification using SIFT Features

Advanced Touchless Biometric Identification using SIFT Features Advanced Touchless Biometric Identification using SIFT Features H.Abubacker Siddique PG Scholar, Department of CSE National College of Engineering Tirunelveli, Tamilnadu, India. ahamedabdul786@gmail.com

More information

Carmen Alonso Montes 23rd-27th November 2015

Carmen Alonso Montes 23rd-27th November 2015 Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

The Future of Authentication

The Future of Authentication The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION

More information

IJITKM Volume 7 Number 1 December 2013 pp (ISSN )

IJITKM Volume 7 Number 1 December 2013 pp (ISSN ) Biometric Recognition Challenges Dr. Chander Kant, Archana Toky Assistant Professor, Deptt. of computer Science & Appl. K.U. Kurukshetra Faculty, Deptt. Of Computer Science, Govt. College for women, Hisar

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...

More information

Chapter 6. Multibiometrics

Chapter 6. Multibiometrics 148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

The Design of Fingerprint Biometric Authentication on Smart Card for

The Design of Fingerprint Biometric Authentication on Smart Card for The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es

More information

Fingerprint Mosaicking &

Fingerprint Mosaicking & 72 1. New matching methods for comparing the ridge feature maps of two images. 2. Development of fusion architectures to improve performance of the hybrid matcher. 3. Constructing the ridge feature maps

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris

More information

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,

More information

Multimodal Biometric System in Secure e- Transaction in Smart Phone

Multimodal Biometric System in Secure e- Transaction in Smart Phone Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords

More information

Highly Secure Authentication Scheme: A Review

Highly Secure Authentication Scheme: A Review e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:

More information

Gaithashing: a two-factor authentication scheme based on gait features

Gaithashing: a two-factor authentication scheme based on gait features Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT 2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

Authentication by Mouse Movements. By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004

Authentication by Mouse Movements. By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004 Authentication by Mouse Movements By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004 Topics Introduction Design and Implementation Active authentication Passive

More information

CHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS

CHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS 5 CHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS 2.1 DIGITAL IMAGE PROCESSING The process of receiving and analyzing visual information by digital computer is called

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

An Algorithm for Feature Level Fusion in Multimodal Biometric System

An Algorithm for Feature Level Fusion in Multimodal Biometric System An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FINGER PRINT BASED ELECTRONIC VOTING MACHINE PROF. K. M. PIMPLE 1, MISS. PALLAVI

More information

Biometrics Hybrid System Based Verification

Biometrics Hybrid System Based Verification Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,

More information

Encryption of Text Using Fingerprints

Encryption of Text Using Fingerprints Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

POLYBIO Multibiometrics Database: Contents, description and interfacing platform POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

Lecture 11: Human Authentication CS /12/2018

Lecture 11: Human Authentication CS /12/2018 Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted

More information