The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many technical papers and scientific studies were written about nowadays mobile devices popularity. Also biometrics and especially the face recognition belong already to standard authentication methods. However, the face is not the only one human feature, which contains unique data about person. Shape and folds of a human ear could also be used for reliable identification of people. Information obtained...
The growing direct or spoofing fraudulent attacks of thieves has motivated us to focus our prime concern on the security over money transaction. The accuracy of biometrics in identification is increasing its usage extensively. The method proposed in this paper focuses on how the money transaction in an ATM machine will be secured by providing personal identification by analyzing biometrics like fingerprints...
The offline signature verification is an automatic verification system that works on the scanned image of a signature. Signature verification uses the gray level measure with varying foreground features. The signature verification is performed by identifying feature vector using local patterns. Before extracting the features preprocessing of scanned images are performed by taking isolated signature...
Among various biometric traits, like face, iris, voice, fingerprints, gait etc. fingerprints are considered to be well known due to its characteristics like, uniqueness, they do not change during time period, two fingerprints are never identical, it maintains its own individuality. But unfortunately the development of fake fingerprints is bringing up new challenges. Therefore fingerprint spoof detection...
This work explores crowdsourcing for the establishment of human baseline performance on signature recognition. We present five experiments according to three different scenarios in which laymen, people without Forensic Document Examiner experience, have to decide about the authenticity of a given signature. The scenarios include single comparisons between one genuine sample and one unlabeled sample...
Gait has become a popular trait for biometric recognition especially in surveillance environments due to its advantage of being captured without active user participation. However the gait description obtained in such scenarios depends on the observed walking direction of the user. Hence, if the user�s walking direction is unknown, comparison against a previously prepared database can be rendered...
In this paper, we propose a Palm print biometric recognition system based on scattering wavelet transform. First a novel approach for extracting Region of Interest (ROI) from palm image is presented. Then, a Scattering Wavelet Transform (SWT) is used to extract discriminative features from the input images that are useful to enhance correct matching. Then, a simple Euclidean distance based matching...
In this paper, we propose a technique of features selection based on modified particle swarm optimization (MPSO) for face recognition system. PSO is a new class of algorithm for feature selection based on the idea of collaborative behavior of bird flocking. The feature selected by the proposed MPSO algorithm plays a vital role to search the solution space for an optimum solution where features are...
Personal identification systems based on biometrics are employed in many applications to enrich the security of person identification systems. A number of biometric traits are used in various applications. Among the different biometric traits, the palm vein images are used for person recognition because of its uniqueness. To improve the recognition rate of the person authentication system, we proposed...
Applications using face biometric are ubiquitous in various domains. We propose an efficient method using Discrete Wavelet Transform (DWT), Extended Directional Binary codes (EDBC), three matrix decompositions and Singular Value Decomposition (SVD) for face recognition. The combined effect of Schur, Hessenberg and QR matrix decompositions are utilized with existing algorithm. The discrimination power...
In this paper we presented a simplified solution of an artificial neural network which matches the patterns of fingerprints. As universal approximator, the artificial neural networks (ANNs) are able to bridge the non linear outcome of the superposition of elementary failures. We built up a multilayer feedforward network, and used the back-propagation on a medium size sample, to reach better accuracy...
Nowadays, identification of persons has a great importance for information protection and access control. Thus, automatic person identification based on biometrics has become a focus of interest both for research and commercial purposes. Among the biometrics used, palmprint identification is one of the most stable and reliable technology. Some desirable properties such as uniqueness, stability, and...
In this paper, a palmprint based authentication system is proposed. The proposed system makes use of locality sensitive discriminant analysis and directional local extrema patterns. A locality sensitive discriminant analysis has the capability to project the palmprints into a new space, where the palmprints belonging to same class become closer, whereas those of different classes move far apart. Locality...
In this paper, an online signature verification system based on the segmentation of online signature is proposed. The two set of features i.e shape features and dynamic features are extracted and a feature vector concatenating these two set of features is obtained. Euclidean distance is used as a classifier and a writer dependent threshold is used for verification purpose. In order to evaluate the...
In recent years, there have been very promising applications of biometric systems to improve access control systems and security of data recording. Of all the biometric systems available, fingerprint verification is the most dominant in commercial application due to its excellent performance and low cost. In this study, it is attempted to implement a fingerprint and face detection and recognition...
This paper proposes a multimodal human personal recognition system based on palm print and knuckle print. Palm is the inner surface of the hand that extends from the wrist to the base of the fingers and contains a lot of unique pattern of ridges, valleys, principal lines and wrinkles. On the other hand, Knuckle is the part of a finger at a joint where bone is near the surface. Pattern formation at...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
Now a days the palm print is one of the physiological characteristics which is believed that it is unique to individuals. Palm print is the great deal of different texture, which is consists of principal lines, regions, datum points, geometry, wrinkles, ridges, delta points and also minutiae features. So many methods of palm images have been applied by several researchers. Different types of image...
Face Recognition is important Biometric credentials for identification or verification of a person. In this paper, we propose a novel technique of generating compressed unique features of face images which helps in improving matching speed of recognition. The training face database samples are applied to 2D-DWT to obtain LL band features. The LL band features are subjected to normalization to scale...
In this paper, we propose an efficient multi-spectral palmprint identification system. For that, we compressed each palmprint band at 0.5 bit per pixel (bpp) by a progressive image compression algorithm where we used the famous Set Partitioning In Hierarchical Trees (SPIHT ) coder. By exploiting the progressiveness of this algorithm, we obtained three images decompressed in several times with different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.