The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fingerprint recognition has been extensively used in numerous civilian applications ranging from border control to everyday identity verification. The threats to current systems emerge from two facts that can be attributed to potential loss in accuracy due to damaged external fingerprints and attacks on the sensors by creation of an artefacts (e.g. silicone finger) simply by lifting the latent fingerprints...
Biometric recognition of an individual can be done based on physiological characteristics such as a face, palmprint, vein, etc. and behavioural characteristics which include gait, keystroke, mouse dynamics, etc. Among the various biometric modalities, the wrist vein recognition has been known for high accuracy, stability and resistance to spoofing. The success of wrist vein biometrics strongly correlates...
As the research in ear biometrics grows, there is a need to have a publicly available ear images database for researchers to test and validate their methods. There are many available ear databases captured in visible light domain. However, images in those databases are mostly acquired in a controlled environment, not in naturally illuminated environments. Up to the point of writing, there is no thermalbased...
Ocular recognition on smartphone authentication applications are gaining popularity in academic research and in the commercial sector where operators are requesting reliable and robust biometric authentication. The wide acceptance of such ocular based authentication systems also depends on the verification performance on large scale testing with different data subject ethnic groups and platforms....
With the advancement in biometric recognition techniques, Palm Dorsa Subcutaneous Vein Pattern (PDSVP) [1] has emerged as a reliable and promising physiological biometric feature. Consequently, PDSVP has been extensively used as a biometric feature in recent research works on biometrics. However, the procedure of automatic data acquisition and PDSVP extraction is quite challenging. This article shows...
This paper investigates vulnerability of the dorsal hand-vein biometric systems to display based presentation attacks. The database collected for our experiments consists of624 real and 312 spoof images from left and right hands of 52 subjects, of which 32 are males and 20 are females. In order to assess the vulnerability of the system, we have created artefacts in a more realistic scenario assuming...
Authentication on smartphones for high valued transactions in e-banking applications require authentication methods that are both more robust and more convenient than simple PIN based authentication. Although a two factor authentication approach can increase the system security, the second factor has to be robust enough not to be compromised by simple attacks. Face and periocular based biometrics...
The vulnerability of palm vein recognition to spoofing attacks is studied in this paper. A collection of spoofing palm vein images has been created from real palm vein samples. Palm vein images are printed using a commercial printer and then, presented at a contactless palm vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Results...
Recently, pedestrian attributes like gender, age and clothing etc., have been used as soft biometric traits for recognizing people. Unlike existing methods that assume the independence of attributes during their prediction, we propose a multi-label convolutional neural network (MLCNN) to predict multiple attributes together in a unified framework. Firstly, a pedestrian image is roughly divided into...
The problem of person re-identification is to recognize a target subject across non-overlapping distributed cameras at different times and locations. The applications of person re-identification include security, surveillance, multi-camera tracking, etc. In a real-world scenario, person re-identification is challenging due to the dramatic changes in a subject's appearance in terms of pose, illumination,...
In this paper, we propose a person identification method exploiting human motion information. A Self Organizing Neural Network is employed in order to determine a topographic map of representative human body poses. Fuzzy Vector Quantization is applied to the human body poses appearing in a video in order to obtain a compact video representation, that will be used for person identification and action...
The major development of fingerprint technology in the form of wet-ink fingerprinting was initiated and improved for forensic applications by Scotland Yard about 100 years ago. In recent years, new fingerprinting methods such as live scan and contactless methods were developed and continue to evolve. Now-a-days, compatibility between three fingerprinting libraries, namely wet-ink, live-scan and contactless...
Many studies have shown that it is possible to recognize people by the way they walk. However, there are a number of covariate factors that affect recognition performance. The time between capturing the gallery and the probe has been reported to affect recognition the most. To date, no study has shown the isolated effect of time, irrespective of other covariates. Here we present the first principled...
The determination of ethnicity of an individual, as a soft biometrics, can be very useful in a video-based surveillance system. Currently, face is commonly used to determine the ethnicity of a person. Up to now, gait has been used for individual recognition and gender classification but not for ethnicity determination. This paper focuses on the ethnicity determination based on fusion of multi-view...
Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. These include traits such as height, weight, gender, hair, skin and clothing colour. Unlike traditional biometrics (i.e. face, voice) which require cooperation from the subject, soft biometrics can be acquired by surveillance cameras at range without any user cooperation. Whilst these traits...
Iris recognition is a powerful biometrics for personal identification, but it is difficult to acquire good-quality iris images in real time. For making iris recognition more convenient to use, we design an iris recognition system at a distance about 3 meters. There are many key issues to design such a system, including iris image acquisition, human-machine-interface and image processing. In this paper,...
A face database, composed of visual (VIS), near infrared (NIR) and three-dimensional (3D) face images, is collected. Called the HFB face database, it is released now to promote research and development of heterogeneous face biometrics (HFB). This release of version 1 contains a total of 992 images from 100 subjects; there are 4 VIS, 4 NIR, and 1 or 2 3D face images per subject. In this paper, we describe...
The issue of how to represent the palm features for effective classification is still an open problem. In this paper, we propose a novel palm representation, the "junction points" (JP) set, which is formed by the two set of line segments extracted from the registered palmprint and palm vein images respectively. Unlike the existing approaches, the JP set, containing position and orientation...
We present a new method for front-view gait biometrics which uses a single non-calibrated camera and extracts unique signatures from descriptors of a silhouette's deformation. The proposed approach is particularly suitable for identification by gait in the real world, where the advantages of completely unobtrusiveness, remoteness and covertness of the biometric system preclude the availability of...
Face recognition finds its place in a large number of applications. They occur in different contexts related to security, entertainment or Internet applications. Reliable face recognition is still a great challenge to computer vision and pattern recognition researchers, and new algorithms need to be evaluated on relevant databases. The publicly available IV2 database allows monomodal and multimodal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.