The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scars, marks and tattoos (SMT) are being increasingly used for suspect and victim identification in forensics and law enforcement agencies. Tattoos, in particular, are getting serious attention because of their visual and demographic characteristics as well as their increasing prevalence. However, current tattoo matching procedure requires human-assigned class labels in the ANSI/NIST ITL 1-2000 standard...
Cryptographic protocols are the foundation of secure network infrastructure, facilitating authentication, transactions, and data integrity. In traditional cryptographic protocols, generated keys (and, in most cases, passwords) are used. The utility of biometrics as a convenient and reliable method for authentication has emerged in recent years, but little work has been performed on a serious integration...
Biometric performance assessment is made difficult by virtue of the fact that each user in the database introduces variability that cannot be controlled even with a well designed acquisition procedure and experimental protocol. As a result, the system performance is inevitably user-dependent. We propose explicitly to rank the users according to their performance using criteria such as the F-ratio,...
A biometric system provides poor performances when the input data exhibit intra-class variations which are not well represented by the enrolled template set. This problem has been recently faced by template update techniques. The majority of the proposed techniques can be regarded as ldquoself-updaterdquo methods, as the system updates its own templates using the recognition results provided by the...
Fully automated image segmentation is an essential step for designing automated identification systems. In this paper, we address the problem of fully automated image segmentation in the context of ear biometrics. Our segmentation approach achieves more than 90% accuracy based on three different sets of 3750 facial images for 376 persons. We also present an approach for the automated evaluation of...
Lip contours detection and tracking has been studied extensively because it can significantly improve the performance of the automatic speech recognition and face recognition systems. A major challenge is to find a robust and accurate method for detecting and tracking lip contours. In this paper, we propose and evaluate novel method for lip detection and tracking, which is based on the concept of...
We present a novel probabilistic method to estimate the orientation field in fingerprint images. Traditional approach based on the smoothing of local image gradients usually generates unsatisfactory results in poor quality regions of fingerprint images. We show how to improve the orientation field estimation by first constructing a Markov random field (MRF) and then inferring the orientation field...
Requirements for identifying and defining additional fingerprint features beyond minutiae, even not limited to level 3 details, has already been addressed by the community . However, new feature proposals are based on refinements of existing features (e.g. a finer level of classification), or on the introduction of new single features (e.g. 3-D level features such as the ridge height) . The new set...
We illustrate the steps in building a secure authentication system using a construct called PinSketch where the identifier is a set of points derived from the minutiae extracted from a fingerprint. We define a relative set difference based threshold for matching templates, that takes the sizes of the sets being compared into account and show that it performs better than a fixed threshold for all fingerprints...
In this paper we propose a three factor (smart card, iris code and password) scheme for cryptographic key regeneration based on fuzzy sketches idea which handles biometric variability with error correcting codes. Because errors in iris codes have mixed nature (random and burst errors), concatenated Hadamard and Reed-Solomon codes are used in this work. Hadamard codes can correct up to 25% errors but...
We propose a new biometric approach based on cardiovascular signals recorded using laser Doppler vibrometry (LDV) with a robust feature selection method. A novel feature selection method provides robustness against physiological variability of a given individual. LDV signals were collected from 191 individuals under controlled conditions during three sessions, each at intervals of one week to six...
New physiological or behavioural characteristics have to be considered in order to improve the performance of automatic mono/multi-biometric recognition systems. It has recently been shown in, by means of a preliminary study, that PhonoCardioGram (PCG) signals have specific individual characteristics that can be taken into consideration as a physiological sign used in a biometric system. This paper...
Recent disasters have emphasized the significance of automated dental identification systems. Statistics show that 20% of the 9/11 victims, identified in the first year, were manually identified using dental records. Moreover, 75% of Tsunami victims in Thailand were similarly identified using dental records, compared to 0.5% identified using DNA. This paper addresses the first important problem of...
In this article, we propose an original way to characterize information content in online signatures through a client-entropy measure based on local density estimation by a hidden Markov model. We show that this measure can be used to categorize signatures in visually coherent classes that can be related to complexity and variability criteria. Besides, the generated categories are coherent across...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.