The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes an off-line handwritten signature identification system using the Histogram of Symbolic Representation (HSR). The HSR is considered as one-class classifier which has the ability to generate a model for each writer using only its own reference signatures. This method allows also modeling the writing style of each writer by taking into account the variability of signatures. To evaluate...
This paper proposes a fingerprint method for webtoon identification using frequency features. The proposed fingerprint method uses features of a webtoon extracted from frequency components of each row of the webtoon image. Applying the proposed fingerprint method, the perfect accuracy is achieved for webtoon identification with randomly selected webtoon patches for testing. We compared our proposed...
Given their widespread use for authentication, biometricsystems are a key target for Presentation Attacks (PAs). A presentation attack is an attempt to circumvent a biometricsystem by simulating the trait of an authorized person andpresenting it to the sensor. Social dimension of biometric authenticationnourishes the interest in spoofing attacks. Dependingon motivation and availability of resources,...
Among various biometric traits, like face, iris, voice, fingerprints, gait etc. fingerprints are considered to be well known due to its characteristics like, uniqueness, they do not change during time period, two fingerprints are never identical, it maintains its own individuality. But unfortunately the development of fake fingerprints is bringing up new challenges. Therefore fingerprint spoof detection...
In this paper, we describe an approach to accelerate fingerprint techniques by skipping the search for irrelevant sections of the signal and demonstrate its application to the divide and locate (DAL) audio fingerprint method. The search result for the applied method, DAL3, is the same as that of DAL mathematically. Experimental results show that DAL3 can reduce the computational cost of DAL to approximately...
Fingerprints are unique, permanent and universal. The minutiae of fingerprints of a human have sufficient details. We can use these non-trivial details as identification marks to verify the fingerprints. The purpose of this paper is to investigate and implement the working of minutiae based fingerprint matching system. Minutiae based fingerprint matching is widely used for fingerprint verification...
Fingerprint minutiae are the most important features used by latent fingerprint examiners, as well as in automated fingerprint recognition systems. Hence, understanding the statistical distribution of minutiae is essential in many fingerprint recognition related problems, such as fingerprint individuality and fingerprint synthesis. Prior work considers the occurrence of a minutia as a random event,...
This paper presents a straightforward method of fingerprint identification considering partial fingerprints through neural network system. The fingerprint templates constitute the largest data in the biometric field. By considering partial fingerprint samples, the amount of data in the database shall be decreased and this will consequently lead to a faster processing for fingerprint identification...
Inspired by the serum pooling strategy in medical area, this paper presents a new approach for video fingerprint search. The proposed method has adopted the serum pooling strategy to reduce the unnecessary matching calculation during the search process. Two observations about random vectors are given, which enable us to obtain a general similarity measure and accelerate the search speed without losing...
We propose an efficient repeating segment detection approach that doesn't require computation of the distance matrix for the whole song. The proposed framework first extracts audio fingerprints for the whole song. Then,for each time step in the song we perform a query to match a sequence of M fingerprint codewords against the fingerprints of the rest of the song. In order to find a match for the first...
Various methods have been developed for indoor localization using WLAN signals. Algorithms that fingerprint the Received Signal Strength Indication (RSSI) of WiFi for different locations can achieve tracking accuracies of the order of a few meters. RSSI fingerprinting suffers though from two main limitations: first, as the signal environment changes, so does the fingerprint database, which requires...
Automated fingerprint identification system have become popular tool in many security and law enforcement application. Matching incomplete or partial fingerprints continues to be important challenges today. The current Fingerprint matching technology is quite mature for matching tenprints, matching partial fingerprints still needs lots of improvement. The major challenges faced in partial fingerprint...
Matching of partial fingerprints has important applications in both biometrics and forensics. It is well-known that the accuracy of minutiae-based matching algorithms dramatically decreases as the number of available minutiae decreases. When singular structures such as core and delta are unavailable, extended features can be utilized. The current Fingerprint matching technology is quite mature for...
Security issues of Biometric Encryption are discussed in terms of resilience to the attacks. A number of previously unpublished attacks are considered: Nearest Impostors; using Error Correcting Code statistics; and Non-randomness attack.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.