The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear...
In this paper, a new approach for personal identity verification using finger knuckle images and least-square contour alignment method has been proposed. A special test rig with a digital camera was prepared for acquisition the knuckle images. Next, the obtained images of finger knuckle were subjected to image processing method in order to extract the knuckle furrows from them. The verification of...
Smartphone based periocular recognition has received substantial attention from the biometric research community. In this work, we propose a new scheme for the smartphone based periocular recognition. The proposed scheme is based on the texture features extracted from the periocular images using Maximum Response (MR) filters. These texture features are then classified using a deep neural network based...
Now a days the palm print is one of the physiological characteristics which is believed that it is unique to individuals. Palm print is the great deal of different texture, which is consists of principal lines, regions, datum points, geometry, wrinkles, ridges, delta points and also minutiae features. So many methods of palm images have been applied by several researchers. Different types of image...
Fingerprints are the most widely used biometric feature for person identification & verification in the field of biometric identification. Fingerprint possesâ two main types of features that are used for automatic fingerprint identification & verification (i) Ridge & furrow structure that forms a special pattern in the central region of finger...
Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. In the recent years, hand based biometrics is extensively used for personal recognition. In this paper a new biometric system based on texture of the hand knuckles, namely Finger-Knuckle-Print (FKP), is proposed. To extract...
The electrocardiogram (ECG) is an emerging biometric modality that has seen about 13 years of development in peer-reviewed literature, and as such deserves a systematic review and discussion of the associated methods and findings. In this paper, we review most of the techniques that have been applied to the use of the electrocardiogram for biometric recognition. In particular, we categorize the methodologies...
This paper presents a new approach in evaluation of biometric identity verification system, which is based on three important indicators: false acceptance rate, false reject rate and failure to enroll rate. Those mentioned indicators are grouped by using fuzzy sets and linguistic variables to provide important pieces of information.
A new method is presented for person verification based on inner joining lines of fingers of right hand. This paper attempts to improve the performance of hand geometry based verification system by reducing the amount of features and integrating new features. It also decreases computational time by introducing a moderated edge detection method based on high pass filter. The image acquisition of this...
Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not...
Having a secure information system depends on successful authentication of legitimate users so as to prevent attacks from fraudulent persons. Traditional information security systems use a password or personal identification number (PIN). This means they can be easily accessed by unauthorized persons without access being noticed. This paper addresses the issue of enhancing such systems using keystroke...
The use of computer has increased rapidly as well as the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require a password authentication scheme to make sure only the genuine individual can login to the application. Passwords and personal identification numbers (PIN) have traditionally been used to access such applications [1,...
Fingerprint is a reliable biometric which is used for personal verification. Current fingerprint verification techniques can be broadly classified as Minutiae-based, ridge feature-based and correlation-based each having its own merits and demerits. In this paper, we propose use of the statistical texture analysis of a fingerprint using spatial grey level dependence method (SGLDM) for discrimination...
We present here a report on a new performance evaluation system for biometric systems, which is secure, automatic and remote. This system will provide developers in biometrics to progress in their works, avoiding problems with data protection policies related to testing, but without compromising the privacy of testing subjects. Biometric testing needs personal data to be recorded and used. Therefore...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.