首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.

The main role of cancellable biometric schemes is to protect the privacy of the enrolled users. The protected biometric data are generated by applying a parametrized transformation function to the original biometric data. Although cancellable biometric schemes achieve high security levels, they may degrade the recognition accuracy. One of the mostwidely used approaches to enhance the recognition accuracy in biometric systems is to combine several instances of the same biometric modality. In this paper, two multi-instance cancellable biometric schemes based on iris traits are presented. The iris biometric trait is used in both schemes because of the reliability and stability of iris traits compared to the other biometric traits. A generative adversarial network (GAN) is used as a transformation function for the biometric features. The first scheme is based on a pre-transformation feature-level fusion, where the binary features of multiple instances are concatenated and inputted to the transformation phase. On the other hand, the second scheme is based on a post-transformation feature-level fusion, where each instance is separately inputted to the transformation phase. Experiments conducted on the CASIA Iris-V3-Internal database confirm the high recognition accuracy of the two proposed schemes. Moreover, the security of the proposed schemes is analyzed, and their robustness against two well-known types of attacks is proven.

  相似文献   

2.
You can build an effective palmprint verification system using a combination of mostly off-the-shelf components and techniques. Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics verification offers many advantages over the username-plus-password approach for access control. Users don't have to memorize any codes or passwords, and biometric systems are more reliable because biometric characteristics can't easily be duplicated, lost, or stolen. Researchers have studied such biometric characteristics as faces, fingerprints, irises, voices, and palmprints.Facial appearance and features change with age. Fingerprints can be affected by surface abrasions or otherwise compromised. Capturing iris images is relatively difficult, and iris scans can be intrusive. Voices are susceptible to noise corruption and can be easily copied and manipulated. Palmprints are potentially a good choice for biometric applications because they're invariant with a person, easy to capture, and difficult to duplicate. They offer greater security than fingerprints because palm veins are more complex than finger veins. However, compared to other biometric characteristics, they have perhaps seen less research. This provides a big opportunity for advancing palmprint technology and applications. We've developed an effective prototype palmprint verification system using a combination of mostly off-the-shelf (and therefore tried and tested) components and techniques. Such an approach should make palmprint verification an appealing proposition.  相似文献   

3.
《Interacting with computers》2006,18(5):1101-1122
As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared based on the recognition and verification of several biometric features considered unique to each individual. Signature and voice characteristics, facial features, and iris and fingerprint patterns have all been used to identify a person or just to verify that the person is who he/she claims to be. Although still relatively new, these new technologies have already reached a level of development that allows its commercialization. However, there is a lack of studies devoted to the evaluation of these technologies from a user-centered perspective. This paper is intended to promote user-centered design and evaluation of biometric technologies. Towards this end, we have developed a platform to perform empirical evaluations of commercial biometric identity verification systems, including fingerprint, voice and signature verification. In this article, we present an initial empirical study in which we evaluate, compare and try to get insights into the factors that are crucial for the usability of these systems.  相似文献   

4.

Face recognition is an efficient technique and one of the most preferred biometric modalities for the identification and verification of individuals as compared to voice, fingerprint, iris, retina eye scan, gait, ear and hand geometry. This has over the years necessitated researchers in both the academia and industry to come up with several face recognition techniques making it one of the most studied research area in computer vision. A major reason why it remains a fast-growing research lies in its application in unconstrained environments, where most existing techniques do not perform optimally. Such conditions include pose, illumination, ageing, occlusion, expression, plastic surgery and low resolution. In this paper, a critical review on the different issues of face recognition systems are presented, and different approaches to solving these issues are analyzed by presenting existing techniques that have been proposed in the literature. Furthermore, the major and challenging face datasets that consist of the different facial constraints which depict real-life scenarios are also discussed stating the shortcomings associated with them. Also, recognition performance on the different datasets by researchers are also reported. The paper is concluded, and directions for future works are highlighted.

  相似文献   

5.
Uncooperative iris identification systems at a distance suffer from poor resolution of the acquired iris images, which significantly degrades iris recognition performance. Super-resolution techniques have been employed to enhance the resolution of iris images and improve the recognition performance. However, most existing super-resolution approaches proposed for the iris biometric super-resolve pixel intensity values, rather than the actual features used for recognition. This paper thoroughly investigates transferring super-resolution of iris images from the intensity domain to the feature domain. By directly super-resolving only the features essential for recognition, and by incorporating domain specific information from iris models, improved recognition performance compared to pixel domain super-resolution can be achieved. A framework for applying super-resolution to nonlinear features in the feature-domain is proposed. Based on this framework, a novel feature-domain super-resolution approach for the iris biometric employing 2D Gabor phase-quadrant features is proposed. The approach is shown to outperform its pixel domain counterpart, as well as other feature domain super-resolution approaches and fusion techniques.  相似文献   

6.
A machine-vision system for iris recognition   总被引:40,自引:0,他引:40  
This paper describes a prototype system for personnel verification based on automated iris recognition. The motivation for this endevour stems from the observation that the human iris provides a particularly interesting structure on which to base a technology for noninvasive biometric measurement. In particular, it is known in the biomedical community that irises are as distinct as fingerprints or patterns of retinal blood vessels. Further, since the iris is an overt body, its appearance is amenable to remote examination with the aid of a machine-vision system. The body of this paper details the design and operation of such a system. Also presented are the results of an empirical study in which the system exhibits flawless performance in the evaluation of 520 iris images.  相似文献   

7.
Biometric technology - the automated recognition of individuals using biological and behavioral traits - has been presented as a natural identity management tool that offers "greater security and convenience than traditional methods of personal recognition." Indeed, many existing government identity management systems employ biometrics to assure that each person has only one identity in the system and that only one person can access each identity. Historically, however, biometric technology has also been controversial, with many writers suggesting that biometrics invade privacy, that specific technologies have error rates unsuitable for large-scale applications, or that the techniques "are useful to organizations that regulate the individual, but of little use where the individual controls identification and authorization." Here, I address these controversies by looking more deeply into the basic assumptions made in biometric recognition. I'll look at some example systems and delve into the differences between personal identity and digital identity. I'll conclude by discussing how those whose identity is managed with biometrics can manage biometric identity management.  相似文献   

8.
We present an approach to identify noncooperative individuals at a distance from a sequence of images, using 3-D face models. Most biometric features (such as fingerprints, hand shape, iris, or retinal scans) require cooperative subjects in close proximity to the biometric system. We process images acquired with an ultrahigh-resolution video camera, infer the location of the subjects' head, use this information to crop the region of interest, build a 3-D face model, and use this 3-D model to perform biometric identification. To build the 3-D model, we use an image sequence, as natural head and body motion provides enough viewpoint variation to perform stereomotion for 3-D face reconstruction. We have conducted experiments on a 2-D and 3-D databases collected in our laboratory. First, we found that metric 3-D face models can be used for recognition by using simple scaling method even though there is no exact scale in the 3-D reconstruction. Second, experiments using a commercial 3-D matching engine suggest the feasibility of the proposed approach for recognition against 3-D galleries at a distance (3, 6, and 9 m). Moreover, we show initial 3-D face modeling results on various factors including head motion, outdoor lighting conditions, and glasses. The evaluation results suggest that video data alone, at a distance of 3 to 9 meters, can provide a 3-D face shape that supports successful face recognition. The performance of 3-D–3-D recognition with the currently generated models does not quite match that of 2-D–2-D. We attribute this to the quality of the inferred models, and this suggests a clear path for future research.   相似文献   

9.
Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy third-party in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication.  相似文献   

10.
The intricate structure of the iris constitutes a powerful biometric characteristic utilized by iris recognition algorithms to extract discriminative biometric templates. Iris recognition is field-proven but consequential issues, e.g. privacy protection or recognition in unconstrained environments, still to be solved, raise the need for further investigations. In this paper different improvements focused on template protection and biometric comparators are presented. Experimental evaluations are performed on a public dataset confirming the soundness of proposed enhancements.  相似文献   

11.
The randomness of iris pattern makes it one of the most reliable biometric traits. On the other hand, the complex iris image structure and the various sources of intra-class variations result in the difficulty of iris representation. Although, a number of iris recognition methods have been proposed, it has been found that several accurate iris recognition algorithms use multiscale techniques, which provide a well-suited representation for iris recognition. In this paper and after a thorough analysis and summarization, a multiscale edge detection approach has been employed as a pre-processing step to efficiently localize the iris followed by a new feature extraction technique which is based on a combination of some multiscale feature extraction techniques. This combination uses special Gabor filters and wavelet maxima components. Finally, a promising feature vector representation using moment invariants is proposed. This has resulted in a compact and efficient feature vector. In addition, a fast matching scheme based on exclusive OR operation to compute bits similarity is proposed where the result experimentation was carryout out using CASIA database. The experimental results have shown that the proposed system yields attractive performances and could be used for personal identification in an efficient and effective manner and comparable to the best iris recognition algorithm found in the current literature.  相似文献   

12.
We introduce a new cryptographic primitive which is the signature analog of fuzzy identity based encryption (FIBE). We call it fuzzy identity based signature (FIBS). It possesses similar error-tolerance property as FIBE that allows a user with the private key for identity ω to decrypt a ciphertext encrypted for identity ω′ if and only if ω and ω′ are within a certain distance judged by some metric. We give the definition and security model of FIBS and present the first practical FIBS scheme. We prove that our scheme is existentially unforgeable against adaptively chosen message attack in the standard model. To our best knowledge, this primitive was never considered in the identity based signature before. FIBS is of particular value for biometric authentication, where biometric identifiers such as fingerprints, iris, voice and gait are used in human identification. We demonstrate the applicability of our construction to secure biometric authentication.  相似文献   

13.

The use of the iris and periocular region as biometric traits has been extensively investigated, mainly due to the singularity of the iris features and the use of the periocular region when the image resolution is not sufficient to extract iris information. In addition to providing information about an individual’s identity, features extracted from these traits can also be explored to obtain other information such as the individual’s gender, the influence of drug use, the use of contact lenses, spoofing, among others. This work presents a survey of the databases created for ocular recognition, detailing their protocols and how their images were acquired. We also describe and discuss the most popular ocular recognition competitions (contests), highlighting the submitted algorithms that achieved the best results using only iris trait and also fusing iris and periocular region information. Finally, we describe some relevant works applying deep learning techniques to ocular recognition and point out new challenges and future directions. Considering that there are a large number of ocular databases, and each one is usually designed for a specific problem, we believe this survey can provide a broad overview of the challenges in ocular biometrics.

  相似文献   

14.
基于局部小波变换与奇异值分解的虹膜识别算法   总被引:5,自引:0,他引:5  
虹膜识别以其唯一性、稳定性和非侵犯性等优点成为生物特征识别中极具发展潜力的身份识别技术。文章提出了一种基于局部小波变换和奇异值分解的虹膜识别算法。该算法首先对虹膜图像实行分窗小波分解,并对各窗口的子带图像作筛选处理,然后通过奇异值分解对筛选后的各子带图像作进一步的特征提取和压缩,得到虹膜识别特征。最后利用加权欧氏距离分类器进行识别。基于CASIA虹膜数据库的实验结果表明了该算法的有效性,为虹膜识别提供了一种新途径。  相似文献   

15.
Cancellable biometrics has recently been introduced in order to overcome some privacy issues about the management of biometric data, aiming to transform a biometric trait into a new but revocable representation for enrolment and identification (verification). Therefore, a new representation of original biometric data can be generated in case of being compromised. Additionally, the use multi-biometric systems are increasingly being deployed in various biometric-based applications since the limitations imposed by a single biometric model can be overcome by these multi-biometric recognition systems. In this paper, we specifically investigate the performance of different fusion approaches in the context of multi-biometrics cancellable recognition. In this investigation, we adjust the ensemble structure to be used for a biometric system and we use as examples two different biometric modalities (voice and iris data) in a multi-biometrics context, adapting three cancellable transformations for each biometric modality.  相似文献   

16.
Although biometrics is being increasingly used across the world, it also raises concerns over privacy and security of the enrolled identities. This is due to the fact that biometrics are not cancelable and if compromised may give access to the intruder. To address these problems, in this paper, we suggest two simple and powerful techniques called (i) Random Permutation Principal Component Analysis (RP-PCA) and (ii) Random Permutation Two Dimensional Principal Component Analysis (RP-2DPCA). The proposed techniques are based on the idea of cancelable biometric which can be reissued if compromised. The proposed techniques work in a cryptic manner by accepting the cancelable biometric template and a key (called PIN) issued to a user. The identity of a person is recognized only if the combination of template and PIN is valid, otherwise the identity is rejected. The superiority of the proposed techniques is demonstrated on three freely available face (ORL), iris (UBIRIS) and ear (IITD) datasets against state-of-the-art methods. The key advantages of the proposed techniques are (i) classification accuracy remains unaffected due to cancelable biometric templates generated using random permutation (ii) robustness across different biometrics. In addition, no image registration is required for performing recognition.  相似文献   

17.
The performance of a biometric system that relies on a single biometric modality (e.g., fingerprints only) is often stymied by various factors such as poor data quality or limited scalability. Multibiometric systems utilize the principle of fusion to combine information from multiple sources in order to improve recognition accuracy whilst addressing some of the limitations of single-biometric systems. The past two decades have witnessed the development of a large number of biometric fusion schemes. This paper presents an overview of biometric fusion with specific focus on three questions: what to fuse, when to fuse, and how to fuse. A comprehensive review of techniques incorporating ancillary information in the biometric recognition pipeline is also presented. In this regard, the following topics are discussed: (i) incorporating data quality in the biometric recognition pipeline; (ii) combining soft biometric attributes with primary biometric identifiers; (iii) utilizing contextual information to improve biometric recognition accuracy; and (iv) performing continuous authentication using ancillary information. In addition, the use of information fusion principles for presentation attack detection and multibiometric cryptosystems is also discussed. Finally, some of the research challenges in biometric fusion are enumerated. The purpose of this article is to provide readers a comprehensive overview of the role of information fusion in biometrics.  相似文献   

18.
通过分析掌纹、指纹、虹膜、人脸、步态、声纹等生物特征识别技术的特点以及煤矿现场对入井人员生物特征的影响,指出虹膜识别、人脸识别、步态识别、声纹识别适用于煤矿入井人员唯一性检测;提出了一种基于人员定位和生物特征识别的煤矿入井人员唯一性检测技术方案,将生物特征识别技术嵌入人员定位系统,利用人员定位识别卡实现识别卡数量及人员身份的唯一性检测;指出煤矿入井人员唯一性检测技术的研究关键点是严重污染人脸的识别算法、对设备遮挡情况下人员步态图像的采集及对混入人员语音信号的煤矿现场噪声消除算法。  相似文献   

19.
Abstract

Biometrics can be defined as science by which an individual is identified through analyses of physical data and behavioral characteristics.1 The measurement of an individual's characteristics quantifies his or her physical, behavioral characteristics. The physically unique characteristics include, but are not limited to, fingerprints, hand or palm geometry, retina or iris scans, voice or facial characteristics, keystroke patterns, and gait. These presumably unique characteristics are used, in turn, to recognize (identify), authenticate, deny, or grant access based on the individual's characteristics.  相似文献   

20.
In this paper, a new scheme is proposed to design a biometric personal recognition system. First, this paper used the thermal image of the hand by using infrared camera to build the sensor module of the recognition system; the extraction features include the length of palmar midpoint to each finger, palmar profile, finger length and finger width. The thermal image presented in this paper was detects infrared energy and converts it into an electronic signal. Then a new recognition method based on the extension is proposed to perform the core of the personal recognition system. The experimental results confirmed that proposed recognition system has a very high recognition rates, therefore, this paper verification using thermal image of the hand to identity recognition was feasible.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号