The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic personal identification from their physical and behavioral traits, called biometrics technologies, is now needed in many fields such as: surveillance systems, access control systems, physical buildings and many more applications. In this paper, we propose an efficient online personal identification system based on Multi-Spectral Palmprint images (MSP) using Hidden Markov Model (HMM) and...
The biometrics is used to identify or verify persons effectively in the real time scenario. In this paper, we propose Optimized Face Recognition Algorithm using Spatial and Transform Domain Techniques. The face images are preprocessed using Discrete Wavelet Transform (DWT), resize and filtering. The Compound Local Binary Pattern (CLBF) is used to generate magnitude and sign components from preprocessed...
Recently, a wide variety of applications require reliable personal recognition systems to either confirm or determine the identity of an individual requesting their services. So, a reliable identity recognition system is a critical part in these applications that render their services only to genuine users. Thus, biometrics is an emerging technology that utilizes distinct behavioral or physiological...
The single biometric system may be inadequate in many applications such as public security, access control and banking because of noise in data samples or because of unavailability of a sample at a given time. In order to overcome the limitation of the single biometric, a Multi-representation biometric is used. In this paper we present a multimodal personal identification system using the Histogram...
Biometric authentication on devices such as smartphones and tablets has increased significantly in the last years. One of the most acceptable and increasing traits is the handwriting signature as it has been used in financial and legal agreements scenarios for over a century. Nowadays, it is frequent to sign in banking and commercial areas on digitizing tablets. For these reasons, it is necessary...
Recently, skin segmentation has been utilized in wide variety of biometric applications including face detection, recognition, tracking, image filtering, archival and retrieval, etc. Along with its applications, different methods have been designed in order to segment pixels of an arbitrary image into skin and non-skin classes. However, there is no reliable, accurate, appropriate and applicatory dataset...
Biometric systems are vulnerable to different kinds of attacks. Particularly, the systems based on iris are vulnerable to direct attacks consisting on the presentation of a fake iris to the sensor trying to access the system as it was from a legitimate user. The analysis of some countermeasures against this type of attacking scheme is the problem addressed in the present paper. Several state-of-the-art...
Biometrics represents a return to a natural way of identification: testing someone by what (s)he is, instead of relying on something (s)he owns or knows seems likely to be the way forward. Biometric systems that include multiple sources of information are known as multimodal. Such systems are generally regarded as an alternative to fight a variety of problems all unimodal systems stumble upon. One...
The human ear is a new technology in biometrics which is not yet used in a real context or in commercial applications. For this purpose of biometric system, we present an improvement for ear recognition methods that use Elliptical Local Binary Pattern operator as a robust technique for characterizing the fine details of the two dimensional ear images. The improvements are focused on feature extraction...
External shape of the human ear presents a rich and stable information embedded on the curved 3D surface, which has invited lot attention from the forensic and engineer scientists in order to differentiate and recognize people. However, recognizing identity from external shape of the human ear in unconstrained environments, with insufficient and incomplete training data, dealing with strong person-specificity,...
Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody else's identity by presenting samples of that person's traits, or tries to gain benefit from the “leakage” of stored biometric information...
The attendance maintaining system is difficult process if it is done manually. The smart and automated attendance system for managing the attendance can be implemented using the various ways of biometrics. Face recognition is one of them. By using this system, the issue of fake attendance and proxies can be solved. In the previous face recognition based attendance system, there were some disadvantages...
Due to the high deployment of devices such as smartphones and tablets and their increasing popularity in our society, the use of biometric traits in commercial and banking applications through these novel devices as an easy, quick and reliable way to perform payments is rapidly increasing. The handwritten signature is one of the most socially accepted biometric traits in these sectors due to the fact...
Biometric system is a security model which could not be easily cracked or penetrated as compared to the traditional methods like password, ID card to get information. Trait information storage of a particular person in the database makes it vulnerable to template database attack. Fuzzy vault is a popular biometric cryptosystem technique that provides security to the biometric templates. The challenge...
We focus on the feature transform approach as one methodology for biometric template protection, where the template consists of the features extracted from the biometric trait. This paper considers some properties of the unitary transform-based template protection in particular. It is known that the Euclidean distance between the templates protected by a unitary transform is the same as that between...
In a time when personal data circulates constantly between devices and within the cloud, biometric security systems represents one of the most viable security solutions. A relatively new biometric modality based on the individual's Electroencephalogram (EEG) is starting now to gain popularity among researchers. Its relevance relay mainly on its prospects of high security and robustness against intruders...
Offline signature verification system is widely used as a behavioral biometric for identifying a person. This behavioral biometric trait is a challenge in designing the system that has to counter intrapersonal and interpersonal variations. In this paper, we propose a novel technique PCVOS: Principal Component Variances based Off-line Signature Verification on two critical parameters viz., the Pixel...
In this paper we propose a biometric solution for individual identification based on electroencephalography with classification using local probability centers. In our study, the electroencephalography signals of a subject are recorded from only one active channel Cz with eyes closed and without any external stimulations. The original signals are preprocessed by Haar wavelet transformation; then a...
Feature extraction techniques such as local binary patterns (LBP) or binarized statistical image features (BSIF) are crucial components in a biometric recognition system. The vast majority of relevant approaches employs spectral histograms as feature representation, i.e. extracted biometric reference data consists of sequences of histograms. Transforming these histogram sequences to a binary representation...
Handwritten digit strings and handwritten signature are used in various applications on a daily basis. Whether one signs a contract, work documents, petition, or wants to approve a cheque payment, one will use personal signature to do all those things. Similar is true for digits strings, where digit recognition is used in postal mail sorting, bank cheque processing, etc. In this paper we use this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.