The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Finger vein recognition has emerged as the robust biometric modality because of their unique vein pattern that can be captured using near infrared spectrum. The large scale finger vein based biometric solutions demand the need of searching the probe finger vein sample against the large collection of gallery samples. In order to improve the reliability in searching for the suitable identity in the...
Biometrics identification systems containing a largescale database have been gaining increasing attention. In order to speed up searching in a large-scale fingerprint database, fingerprint indexing algorithm has been studied and introduced into biometrics identification system. One critical component of a fingerprint indexing algorithm is the feature extraction method. Majority of researchers developed...
Deployments of biometric technologies are already widely disseminated, i.e. the protection of biometric reference data becomes vital in order to safeguard individuals’ privacy. Bio- metric template protection techniques are designed to protect biometric templates in an irreversible and unlinkable man- ner (ISO/IEC IS 24745). In addition, these schemes are re- quired to maintain key system properties,...
In this work we propose a generic framework for generat- ing an irreversible representation of multiple biometric tem- plates based on adaptive Bloom filters. The presented tech- nique enables a feature level fusion of different biometrics (face and iris) to a single protected template, improving pri- vacy protection compared to the corresponding systems based on a single biometric trait. At the same...
In order to satisfy the requirements for security and privacy of biometric enrolment data records, it is essential to protect this reference data by applying appropriate template protection schemes. Bloom filters have been applied successfully on iris biometrics and face biometrics and achieved good result in terms of irreversibility and biometric performance. In this paper we study, whether it is...
The increasing usage of smartphones has raised security concerns regarding these devices due to presence of high amount of personal and sensitive data. The risk is higher without a proper mechanism to handle the authentication to access the smartphone device. In this work, we present a standalone modular biometric system based on periocular information to authenticate towards device. The proposed...
Palmprint is a widely used biometric trait deployed in various access-control applications due to its convenience in use, reliability, and low cost. In this paper, we propose a novel scheme for palmprint recognition using a sparse representation of features obtained from Bank of Binarized Statistical Image Features (B-BSIF). The palmprint image is characterized by a rich set of features including...
Smartphones are increasingly used as biométrie sensor for many authentication applications due to the computational ability and high resolution cameras that can be used to capture biométrie information. The objective of this paper is to assess the performance of iris versus periocular recognition for smartphones in non ideal conditions (change of illumination, highly pigmented iris, shadows on iris...
Highly unique pattern of the vein within the finger makes it robust biométrie characteristic which is instrumental in achieving low error rates for verification. Vascular pattern is reliable in many terms as they are characterized by very low error rates, good spoofing resistance and user convenience when compared with other existing biométrie modalities. In this paper, we present an extensive study...
Smartphones and tablet computers are being actively studied for the performance of biometric recognition in visible spectrum. Owing to robust performance of iris recognition, many works have investigated the performance in visible spectrum. Increasing popularity of iris recognition in the visible spectrum has further resulted in using smartphones for the same. The extraction of robust features for...
The use of (online) signatures for the purpose of verifying a subject's identity is highly accepted within society and perceived as a noninvasive and nonthreatening biometric characteristic by most users. However, signature biometrics is typically characterized by a high intra-class variability, being influenced by several physical and emotional conditions, i.e. identity verification based on online...
The vascular pattern of the finger has emerged as a promising new biometric modality, characterized by very low error rates, good spoofing resistance and user convenience when compared with other existing biometric modalities. In this paper, we present a new sensor design that is not only cost effective but also robust enough to capture the finger vascular (or finger vein) pattern. We evaluate the...
Recent research in texture-based ear recognition also indicates that ear detection and texture-based ear recognition are robust against signal degradation and encoding artefacts. Based on these findings, we further investigate and compare the performance of texture descriptors for ear recognition and seek to explore possibilities to complement texture descriptors with depth information. On the basis...
The face biometric systems are highly vulnerable for the presentation attack that can be carried out by presenting a photo or video or even a 3D mask. In this paper, we present a novel Presentation Attack Detection (PAD) algorithm that can accurately detect and mitigate the 3D mask attacks on a face recognition system. The proposed scheme extracts both local and global features from the captured face...
The performance limitations of the state-of-the-art methods for fingerprint presentation attack detection motivate the application of the Optical Coherence Tomography as the scanning technology capable of capturing all the information necessary for both the fingerprint identification and the presentation attack detection. The previous research has evidenced the need for a reliable technique for assessing...
Multimodal biometric systems based on fingerprint and finger vein modality provide promising features useful for robust and reliable identity verification. In this paper, we present a robust imaging device that can capture both fingerprint and finger vein simultaneously. The presented low-cost sensor employs a single camera followed by both near infrared and visible light sources organized along with...
Presentation (or spoof) attacks on biometric system is a growing concern that received substantial attention from both academics and industry. In this paper, we present a novel way of addressing a Presentation Attack Detection (PAD) (or spoof detection) by exploiting the inherent characteristics of the Light Field Camera (LFC) for visible spectrum iris biometric system. The proposed PAD algorithm...
Ear classification refers to the process by which an input ear image is assigned to one of several pre-defined classes based on a set of features extracted from the image. In the context of large-scale ear identification, where the input probe image has to be compared against a large set of gallery images in order to locate a matching identity, classification can be used to restrict the matching process...
Biometric data are considered sensitive personal data and any privacy leakage poses severe security risks. Biometric templates should hence be protected, obscuring the biometric signal in a non-reversible manner, while preserving the unprotected system's performance. In the present work, irreversible face templates based on adaptive Bloom filters are proposed. Experiments are carried out on the publicly...
The face quality assessment from video must quantitatively measure the applicability of the face images that are typically captured over multiple frames with various degradations. In this work, we address the face quality assessment from the video captured using Automatic Border Control (ABC) system. To this extent, we employed MorphoWayTM ABC system as a data capture device to construct a new database...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.