The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper authors have studied the current state of the art, noting the achievements and gaps existing in published works. Most of the gaps are related to the testing data used, and therefore the reliability of the results obtained. With this in mind, the paper not only covers such review of the literature, but also the efforts of the authors in developing a solution that could demonstrate the...
Interest on palmprint biometrics has experimented a strong growth in the last decades due to its useful characteristics as uniqueness, permanence, reliability, user-friendliness, acceptability, non-intrusiveness, and low cost of the acquisition devices, which make it attractive for civil and commercial applications. Accordingly, a wide research has been developed in this field. Nevertheless, there...
In this work, the Curvelet transform is proposed as a fairly new feature extraction method for palmprint recognition. Particularly, a multiscale analysis has been performed at four levels, assessing and combining the features extracted at each level in order to find those which better represent the palmprint. Feature matching has been conducted by means of Euclidean distance and Support Vector Machines...
Since the beginning of hand vein biometrics, the approaches to this problem have been countless, making this modality suitable for commercial use in some countries. This paper shows some of them and tries to show which are the most common procedures in each of the main stages of these systems. We will be able to see that the same database usage is not common along the literature, being the main problem...
The use of tattoos as a soft biometric is increasing in popularity among law enforcement communities. There is great need for large scale, publicly available tattoo datasets that can be used to standardize efforts to develop tattoo-based biometric systems. In this work, we introduce a large tattoo dataset (WVU-MediaTatt) collected from a social-media website. Additionally, we provide the source links...
In the last years, several papers on EEG-based biometric recognition systems have been published. Specifically, most of the proposed contributions focus on brain signals recorded in resting state conditions, with either closed or open eyes. A common assumption is that the acquired signals are quasi-stationarity. In this paper, we investigate such property in terms of discriminative capability, and...
Biometrics has been widely used in the last decades for security purposes and for increasing the confidence of people in the new informational systems. The present paper presents a new analysis and encoding method of dorsal hand vein patterns, for biometric recognition. Two multiresolution approaches, Discrete Wavelet Transform and Riesz Wavelet Transform, are firstly applied to extract directional...
In this paper, a new approach for personal identity verification using finger knuckle images and least-square contour alignment method has been proposed. A special test rig with a digital camera was prepared for acquisition the knuckle images. Next, the obtained images of finger knuckle were subjected to image processing method in order to extract the knuckle furrows from them. The verification of...
Designing a biometrie system based solely on skin texture is of interest because the face is sometimes oeeluded by hair or artefacts in many real-world contexts. This work presents a novel framework for the assessment of skin-based biometric systems incorporating skin quality information. The quality or purity of the extracted skin region is automatically established using pixel colour models prior...
A few years ago, some of the authors proposed an ultrasound technique for achieving 3D palm vein patterns for biometric recognition purposes. That technique was developed with a commercial imaging system using doppler modality. Unfortunately, even if results were promising, the acquisition time was too long for practical applications. More recently, they proposed an effective recognition system that...
The bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric...
Fingerprint recognition has been extensively used in numerous civilian applications ranging from border control to everyday identity verification. The threats to current systems emerge from two facts that can be attributed to potential loss in accuracy due to damaged external fingerprints and attacks on the sensors by creation of an artefacts (e.g. silicone finger) simply by lifting the latent fingerprints...
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing...
Feature extraction for an optimal data representation is crucial for any biometric identification system. A new fuzzy-based feature extraction algorithm for an effective biometric identification system is proposed in this paper. The Sugeno-Takagi Fuzzy System is used for the image modeling. The system parameter are systematically adjusted by using a recursive algorithm. The proposed algorithm is integrated...
A weighted version of fusion strategy is introduced for multiple biometrics that compensates the limitations impinged on single biometrics. The least intrusive facial biometrics that combines the facial behaviometrics for person identification is a new trend that needs further investigation. The aim of this study is to apply this weighted fusion scheme for our proposed bi-modal framework that uses...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
SIFT-based identification techniques have been broadly criticised in biometrics due to its high false matching rate. To overcome this weakness, a new method for SIFT-based palmprint matching, called the Self Geometric Relationship-based matching (SGR-Matching) is presented. While existing matching techniques consider only the relationship between the SIFT-points of the query image on one hand and...
Presentation attacks (or spoofing) on finger-vein biometric capture devices are gaining increased attention because of their wider deployment in multiple secure applications. In this work. we propose a novel method for fingervein Presentation Attack Detection (PAD) by exploring the transfer learning ability of Deep Convolutional Neural Network (CNN). To this extent, we have considered the pre-trained...
In this paper, we have proposed a smart ration card using Radio frequency identification (RFID) technique, biometrics and SMS gateway to prevent the ration forgery. In this system, a RFID tag is used that carries family member details and the customer needs to show this tag at the ration shop. The user will also have to provide thumb impression on the biometric machine. If the user is found authentic...
This paper proposes an efficient ear recognition algorithm using band limited phase only correlation (BLPOC) based local block matching. Phase information over the frequency field of an image has been acquired by discrete wavelet transform (DWT). The DWT may decompose an ear image into a set of basis function. The BLPOC is strong to resilient noise and rescaling variables may efficiently upgrade the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.