The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recognizing the people by their ear shape is upcoming application in the field of biometrics. Ear shape of a person does not change over his life span it is also unique and ear appearance cannot be modified by human efforts. Acquiring ear image not need an individual attention. Considering all these unique characteristics, significance in ear authentication modules has developed extremely over a past...
Applications using face biometric are ubiquitous in various domains. We propose an efficient method using Discrete Wavelet Transform (DWT), Extended Directional Binary codes (EDBC), three matrix decompositions and Singular Value Decomposition (SVD) for face recognition. The combined effect of Schur, Hessenberg and QR matrix decompositions are utilized with existing algorithm. The discrimination power...
In recent years, there have been very promising applications of biometric systems to improve access control systems and security of data recording. Of all the biometric systems available, fingerprint verification is the most dominant in commercial application due to its excellent performance and low cost. In this study, it is attempted to implement a fingerprint and face detection and recognition...
Person identification and recognition using fingerprints as a biometric authentication is one of the unique, prominent and reliable method of verification processes. The paper presents fingerprint authentication system using filter bank based matching algorithm. The algorithm uses Gabor filter bank to extract features of fingerprints. These features are then compared for identification and recognition...
Identity Management refers to a challenge of providing authorized users with secure and easy access to information and services for personal identification system. The objective is to implement a secure identification system for determining an individual's identity. Conventional methods for personal identification include keys, tokens, access cards, PINs and passwords which leads to drawbacks such...
In this paper, we propose a very simple face recognition method. This method first exploits a linear combination of all the training samples to express the test sample. Then it evaluates the capability of each class in expressing the test sample and assigns the test sample to the class that has the strongest capability. Using the expression result, the proposed method can classify the testing sample...
In this paper we propose a novel approach to palmprint recognition based on local Haralick features. These features are calculated from the grey-level co-occurrence matrices created on the d × d pixels subimages of the D × D pixels palmprint region of interest (ROI); d < D defined by overlapping sliding-windows. The biometric template for a person consists of N m-component feature vectors, where...
This article is dealing with biometric authentication. We propose an analysis of challenge-response approach usability together with an appropriate candidate for such an approach — visual evoked potentials (VEP). Their physiological properties and recognition capabilities are presented. We design and implement methods covering all phases necessary for processing VEP as a biometric characteristic and...
A new method is presented for person verification based on inner joining lines of fingers of right hand. This paper attempts to improve the performance of hand geometry based verification system by reducing the amount of features and integrating new features. It also decreases computational time by introducing a moderated edge detection method based on high pass filter. The image acquisition of this...
Having a secure information system depends on successful authentication of legitimate users so as to prevent attacks from fraudulent persons. Traditional information security systems use a password or personal identification number (PIN). This means they can be easily accessed by unauthorized persons without access being noticed. This paper addresses the issue of enhancing such systems using keystroke...
Gait recognition systems have recently attracted much interest from biometric researchers. In this work, we present an alternative gait representation of width vector profile. The proposed model-free gait representation, width vector mean, is defined by the arithmetic mean of width vector profiles obtained from a gait sequence. Different gait feature are extracted from the width vector mean such the...
In this paper, a feature-level fusion approach for improving the efficiency of ear image verification is proposed. SIFT is used to extract the features on a ear images at different pose, which is then merged according to a fusion rule to produce a single feature called the fused template. The similarity of SIFT extracted features of the live image and the enrolled user template in the database is...
Although ear recognition has been researched widely, there still exist some problems to be resolved in depth such as multi-pose ear recognition which is rarely focused on. In this paper, different from previous methods used for ear recognition, one nonlinear algorithm, called locally linear embedding (LLE) belonging to manifold learning technique is introduced, and an improved locally linear embedding...
In this paper, we propose an information fusion-based palmprint recognition method. Firstly, three different kinds of palmprint features including texture, principal line and appearance features are extracted using 2D Gabor phase encoding, the modified finite Radon transform (MFRAT) and orthogonal discriminant locality preserving projections (ODLPP), respectively. Then, Hamming distance, pixel-to-area...
This paper describes efficiency of Log Gabor filters in fingerprint verification by giving a performance-based comparative analysis with Gabor filter-bank based approach. The proposed method locates the core point through complex filtering technique and then tessellates the image around core point. A bank of filters is used to capture requisite distinctive fingerprint features as a fingerCode and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.