The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The theme of work presented in this paper is a novel Iris recognition technique using partial energies of transformed iris image. To generate transformed iris images, various transforms like Cosine, Walsh, Haar, Kekre, Hartley transforms and their wavelet transforms are applied on the iris images. Feature vectors are then generated from these transformed Iris images using the concept of energy compaction...
Nowadays biometric identification systems are widely spread since the safety of those systems has been proven. They exhibit a large number of advantages when compared to other identification systems such as key and password that are subject to falsification and loss. Among biometric systems, finger vein recognition based on venous network has been considered recently in the literatures. This paper...
Providing security by means of using traditional methods such as PINs, Passwords, access cards are being vulnerable to various attacks and are easily hacked by intruders or unauthorized users. The aim is to develop an efficient personal identification system to provide secure access for legitimate users which is a challenging task. In order to avoid these problems, the use of biométrie traits reliably...
In different color spaces, the three color channels might have different relationship, but most of color face recognition methods exploit the color information in a simple way. In this paper, we propose a novel hybrid fusion scheme for color face recognition, which first uses two-phase test sample representation (TPTSR) to obtain matching scores of each color channel of the test sample and then uses...
Biometrics is become a necessary technology in today's world. Research is rapidly growing in the field of biometrics. This paper gives the overview of the major Biometrie Technologies which is well proven versus Electrocardiogram as biometrie authentication tool. A researcher who is planning to work on Biometrics field could use this paper for understanding various biometrics technologies and how...
Fake iris detection has been studied so far using near-infrared sensors (NIR), which provide grey scale-images, i.e. With luminance information only. Here, we incorporate into the analysis images captured in visible range, with color information, and perform comparative experiments between the two types of data. We employ Gray-Level Cocurrence textural features and SVM classifiers. These features...
We present a new system for biometric recognition using periocular images. The feature extraction method employed describes neighborhoods around key points by projection onto harmonic functions which estimates the presence of a series of various symmetric curve families around such key points. The isocurves of such functions are highly symmetric w.r.t. The key points and the estimated coefficients...
The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the...
The article presents an analysis of gait biometrics system, that is based on a RGB-D images. The data used for the analysis is captured with a Microsoft Kinect sensor and it is transformed by the Skeletal Tracking SDK. The developed gait recognition system is based on a body geometry and on a body behavioral recorded during the person walking. Experiments were conducted on a database that contains...
During the last decades, several different techniques have been proposed for computer recognition of human faces. A further step in the development of these biometrics is to implement them in portable devices, such as mobile phones. Due to this devices' features and limitations it is necessary to select, among the currently available algorithms, the one with the best performance in terms of algorithm...
The goal of this work is the identification of humans based on motion data in the form of natural hand gestures. The identification problem is formulated as classification with classes corresponding to persons' identities, based on recorded signals of performed gestures. The identification performance is examined with a database of twenty-two natural hand gestures recorded with two types of hardware...
Biometrics is a way that identifies people with the help of physical human features. There are many ways of bio-metric identification and recognition systems such as fingerprints, face, iris and veins etc. However, these conventional methods have some problems with respect of performance and convenience. Every human hand has unique veins patterns. Hand veins based recognition is most feasible than...
It is important to secure the privacy of digital face image that are stored in central database. To impart privacy to such biometric face images, first the digital face image is split into two such that, each of it gives no idea of existence of the original face image and the original image can be retrieved only when both split images available. To achieve this, Visual Cryptography, Halftoning along...
This paper presents a multimodal biometric system for authentication, based on the fusion of iris and palmprint. We propose an approach for feature extraction of each modality by using wavelet packet decomposition at four levels. This gives 256 packets which can generate a compact binary code. It is obtained from the first three highest energy peaks to compute an adapted threshold that enable to affect...
Best way to localize iris inside an image of an eye is still a huge challenge because a standard regarding iris image does not yet exist. The first step of iris segmentation is iris localization. It is very important step because it will ensure the other step is running well. In this paper, a novel method to localize iris in a robust and simple manner is explained. The method is able to localize iris...
Biometric-based intelligence in authentication machines (A-machines) concerns with the problem of balancing human and machine functions in applications such as mass public events and border crossing. The focus of this paper is intelligent human-machine interfacing of behavior biometrics, which seems to play an important role in future generations of A-machines. Various pilot projects use the "talking...
Automated and accurate biometrics identification using periocular imaging has wide range of applications from human surveillance to improving performance for iris recognition systems, especially under less-constrained imaging environment. Restricted Boltzmann Machine is a generative stochastic neural network that can learn the probability distribution over its set of inputs. As a convolutional version...
In the past decade, expression variations have been one of the most challenging sources of variability in 3D face recognition, especially for scenarios where there are a large number of face samples to discriminate between. In this paper, an expression robust reject or is proposed that first robustly locates landmarks on the relatively stable structure of the nose and its environs, termed the cheek/nose...
Criminal and victim identification is always vital in forensic investigation. Many biometric traits, such as DNA, fingerprint, face and palm print, have been regularly used by law enforcement agencies. However, they are not applicable to legal cases where only non-facial body sites of criminals or victims in evidence images are available for identification. These cases include but are not limited...
Biometrics-based hand authentication is among the most popular biometrics used to automatically characterize a person especially in forensic applications. Hand recognition systems are able to confirm or deny the identity of a claimed person because they do not cause anxiety for the users. However, different individuals may have almost similar hands. Therefore, the performance of the hand verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.