Dissertations / Theses on the topic 'Biometric identification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometric identification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Ellmauthaler, Andreas, and Eric Wernsperger. "Biometric Identification of Mice." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.
Full textThe identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.
In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.
Out of 20 mice, 18 could be identified successfully using the proposed algorithm.
Larsen, Tormod Emsell. "Biometric Solutions for Personal Identification." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9677.
Full textWith a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint matching is the most mature and most widely used technique of today, several others exist. Among these is ear recognition, which so far has received scant attention, but still has showed good results in performance. The thesis gives a general presentation of the biometric technology, with its advantages and challenges. In addition, the new and novel technology of ear recognition using thermal imagery is elaborated and discussed. An experiment of small scale, aiming to test the ability of thermal ear recognition as a method for identification, was performed. The test also considers the affect on the performance when the ear temperature varies. An EER of 20.7 % with a corresponding detection rate of 78 % was achieved when considering only ears with the same temperature. By including the applied temperature changes, an increase in the EER to 31.5 % with a corresponding detection rate of 72 % was observed. The results indicate that thermal images of the ears are not sufficiently distinguishable for use in establishing identity by itself, but it might be suitable as a supplement to other biometric techniques.
Igarashi, Kei, Chiyomi Miyajima, Katsunobu Itou, Kazuya Takeda, Fumitada Itakura, and Hüseyin Abut. "Biometric identification using driving behavioral signals." IEEE, 2004. http://hdl.handle.net/2237/6800.
Full textHmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.
Full textThis thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
Benedikt, Lanthao. "Using 3d Facial Motion for Biometric Identification." Thesis, Cardiff University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.523527.
Full textJohn, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.
Full textHaskett, Kevin Joseph. "Iris Biometric Identification Using Artificial Neural Networks." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1947.
Full textGreen, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.
Full textBreedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.
Full textTungala, Nikhil C. "Contextual biometric watermarking of fingerprint images." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3686.
Full textTitle from document title page. Document formatted into pages; contains viii, 69 p. : ill. Includes abstract. Includes bibliographical references (p. 62-69).
Al-Khazzar, Ahmed M. A. "Biometric identification using user interaction with virtual worlds." Thesis, University of Portsmouth, 2012. https://researchportal.port.ac.uk/portal/en/theses/biometric-identification-using-user-interaction-with-virtual-worlds(25523f66-88b0-47f2-8e16-40cacba2b76f).html.
Full textBalisane, Hewa. "Human gait analysis for biometric identification and authentication." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.
Full textPahalawatta, Kapila. "Plant species biometric using feature hierarchies." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/1235.
Full textDiefenderfer, Graig T. "Fingerprint recognition." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2761.
Full textUS Navy (USN) author.
Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.
Full textThesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
Carrillo, Cassandra M. "Continuous biometric authentication for authorized aircraft personnel : a proposed design." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FCarrillo.pdf.
Full textCosta, Henrique Sérgio Gutierrez da. "Biometric identification with 3D fingerprints acquired through optical coherence tomography." reponame:Repositório Institucional da UFPR, 2016. http://hdl.handle.net/1884/44486.
Full textCoorientador : Profª. Olga Regina Pereira Bellon
Tese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Exatas, Programa de Pós-Graduação em Informática. Defesa: Curitiba, 28/06/2016
Inclui referências : f. 75-82
Área de concentração
Resumo: Um método para se obter impressões digitais 3D da derme e da epiderme a partir de imagens em alta resolução adquiridas utilizando Tomografia de Coerência Ótica (OCT) é proposto neste trabalho. Este método, resolve limitações das técnicas de reconstrução 3D de impressões digitais que empregam múltiplas câmeras/triangulação ou iluminação estruturada, tais como variações de resolução do centro para as bordas das impressões digitais 3D causadas por erros de reconstrução, sensibilidade a baixa iluminação e contraste insuficiente. Uma técnica de busca e identificação baseados em padrões inovativos, os "mapas KH " (usados para a segmentação de regiões de superfície em imagens de intensidade e de profundidade), extraídos computando as curvaturas Gaussiana (K) e média (H) de uma região de interesse na vizinhança das minúcias (denominada nuvem de minúcia), é apresentada. Grandes bases de mapas KH, uma para cada nuvem de minúcia identificada, podem ser construídos com essa técnica. A estratégia de busca e identificação, em duas etapas, baseia-se primeiro em padrões locais de gradientes (LGP) dos mapas KH, para reduzir o espaço de busca dentro da base, seguidos de uma comparação que utiliza uma medida de similaridade, a correlação cruzada normalizada dos padrões pré-selecionados com o LGP com os que se quer identificar. A acuracidade do método e sua compatibilidade com os métodos correntes, comparável ou superior à dos métodos 2D, é verificada através da identificação biométrica de impressões digitais 3D utilizando duas bases de imagens, uma adquirida através da tecnologia OCT e a outra gentilmente cedida pela Universidade Politécnica de Hong Kong. A base de imagens OCT, a primeira adquirida com essa tecnologia, é composta de imagens coletadas de onze voluntários em duas sessões de escaneamento e contém imagens de dedos de pessoas com diferentes idades, gênero e etnias e contém casos de cicatrizes, calos e alterações, tais como abrasão e arranhões. Uma base de impressões digitais 2D, obtida dos mesmos voluntários através de um leitor regular de impressões digitais, foi adquirida para permitir uma comparação da técnica proposta com os métodos de identificação tradicionais. A aplicabilidade do método proposto à identificação de impressões digitais alteradas, deterioradas acidentalmente ou intencionalmente, é investigada. Nesses casos, a impressão digital 3D extraída da derme e compatível com a da epiderme é empregada. A identificação destas impressões 3D alteradas é testada utilizando a base de imagens adquiridas com OCT. A acuracidade da técnica é comparada com a obtida utilizando os métodos tradicionais 2D usando os gráficos de taxas de Falsa Aceitação e Falsa Rejeição (FAXxFRR) e de Características Cumulativas de Identificação (CMC). Impressões digitais 2D, extraídas a partir das impressões digitais 3D simulando o rolamento do dedo durante a aquisição (rolamento virtual), foram geradas e sua compatibilidade com as bases de imagens 2D foi testada. Um conjunto de medidas de avaliação de qualidade foram aplicados às bases de imagens de impressões digitais 3D e sua correspondência aos escores de identificação foi analisada para determinar aqueles que podem contribuir para melhorar a acuracidade da identificação. Palavras-chave: Impressões digitais 3D. Identificação Biométrica. Tomografia de Coerência Ótica.
Abstract: A method to obtain epidermal and dermal 3D fingerprints from high-resolution images acquired using Optical Coherence Tomography (OCT) is proposed. This method addresses limitations of current 3D reconstruction techniques that employ multiple cameras/triangulation or structured illumination such as depth and resolution variations from the center to the borders of the fingerprint caused by reconstruction errors, sensitivity to low illumination and poor contrast. The availability of these 3D fingerprints allowed the creation of new matching methods that benefit from the rich information available in 3D. A 3D fingerprint matching technique based on novel patterns, the KH maps (used to surface region segmentation in range and intensity images), extracted by computing the Gaussian and mean curvatures (SILVA; BELLON; GOTARDO, 2001) from a region of interest around the minutiae, named minutiae clouds is presented. Large databases of KH maps, one for each identified minutiae cloud can be built. The matching strategy, a two-step approach, relies on local gradient patterns (LGP) of the KH maps to narrow the search space, followed by a similarity matching, the normalized cross correlation of patterns being matched. The accuracy and matching compatibility, comparable or improved in relation to the 2D matching methods, is verified through matching 3D fingerprints from two databases one acquired using OCT and a public database gently made available by the Hong Kong Polytechnic University. The OCT database, the first 3D database acquired using Optical Coherence Tomography, to our knowledge, is made of images collected from eleven volunteers in two scanning sessions and contains images of people of different ages, genders and ethnicities and also cases of scars, calluses and alterations as abrasion and scratches. A 2D fingerprint database, scanned from the same volunteers using a regular fingerprint reader was also obtained for comparison with traditional matching methods. We investigate the applicability of our method to the identification of altered fingerprints, damaged unintentionally or accidentally. In these cases, the 3D dermal fingerprint, compatible with the epidermis fingerprint, is employed. Matching with 3D dermal and epidermal fingerprints is tested in the OCT database. Matching accuracy is compared with the obtained using traditional matching 2D methods by using False Acceptance and False rejection rate (FARxFRR) and Cumulative Matching Characteristics (CMC) graphs. Unwrapped fingerprints, 2D fingerprints extracted from 3D fingerprints by virtual unrolling were generated and tested for compatibility with 2D databases. A set of quality evaluation measures were employed to the 3D fingerprint databases and their correspondence to the matching scores was analyzed to identify those that can contribute to improve the matching accuracy. Key-words: 3D Fingerprints. Biometric identification. Optical Coherence Tomography.
Li, Kefeng. "Biometric person identification using near-infrared hand-dorsa vein images." Thesis, University of Central Lancashire, 2013. http://clok.uclan.ac.uk/9238/.
Full textHasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.
Full textHortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.
Full textBarve, Purva M. "Robust pre-processing techniques for non-ideal iris images." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4306.
Full textTitle from document title page. Document formatted into pages; contains ix, 64 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 61-64).
Gupta, Gaurav. "Models and protocols for evaluation of fingerprint sensors." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4361.
Full textTitle from document title page. Document formatted into pages; contains vi, 78 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 71-75).
Monaco, Matthew K. "Color space analysis for iris recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=5478.
Full textTitle from document title page. Document formatted into pages; contains x, 93 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 86-90).
Gibavičius, Darius. "Genetinių algoritmų taikymas biometrijoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_141716-09318.
Full textIn the graduation thesis to receive the master‘s degree the application of genetic algorithms in biometrics is analysed. The most widely used biometric information have been examined, the most common biometric systems, genetic algorithms and their customization in biometric systems optimization have been described. A new method is proposed for hand recognition. Genetic algorithms have been customized for this method. Structure: introduction, biometry, genetic algorithms, application of genetic algorithms in biometric systems, application of genetic algorithms for hand recognition, the conclusions and bibliography. Thesis consist of: 51 p. text without appendixes, 30 pictures, 4 tables, 32 bibliographical entries.
Manohar, Vasant. "Video-Based Person Identification Using Facial Strain Maps as a Biometric." Scholar Commons, 2006. http://scholarcommons.usf.edu/etd/3797.
Full textClarke, Dalton H., and W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.
Full textThe Defense Manpower Data Center (DMDC) manages the Defense Biometric Identification System (DBIDS). DBIDS captures personal and biometric information to manage DoD-wide access, control, and personnel accountability. DBIDS equipment is installed globally, and managed by a central office on the Monterey peninsula. Program managers track data about the numbers and type of equipment installed at each site. Program managers were tracking DBIDS data using a single Microsoft Excel workbook comprised of several, interlinking worksheets (DBIDS Master Plan Spreadsheet). Data updates were error-prone and difficult, requiring close coordination to keep the number of "current" versions of the spreadsheet to a minimum. This thesis initially focused on reviewing the business rules and processes surrounding DBIDS document, and then transitioned into designing, developing, and implementing of a relational database solution to improve problem areas identified during the initial review. After implementation of the database, this thesis explored the effects of making such a change within an organization. This was attempted by identifying and measuring changes in performance and accuracy of the system; by measuring pre- and post-user satisfaction through the qualitative methods of questionnaires and interviews; and finally using this analysis to improve the project through maintenance and growth iterations.
Young, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.
Full textThesis Advisor(s): Pfeiffer, Karl D. "September 2009." Description based on title screen as viewed on 6 November, 2009. Author(s) subject terms: Database, Database Development Life Cycle, Rapid Prototyping, Business Process Management Software, Business Process Improvement, Business Process Redesign. Includes bibliographical references (p. 63-65). Also available in print.
Clarke, William M. "Rethinking the REAL ID Act and national identification cards as a counterterrorism tool." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FClarke.pdf.
Full textThesis Advisor(s): Dahl, Erik J. ; Denning, Dorothy E. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: REAL ID, PASS ID, biometrics, driver's license, enhanced driver's license, national identification card, biometric technologies, fingerprints, iris scan, facial recognition, hand geometry, Department of Homeland Security. Includes bibliographical references (p. 85-96). Also available in print.
Saleh, Mohamed Ibrahim. "Using Ears for Human Identification." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33158.
Full textMaster of Science
Van, de Haar Helen Augusta. "A framework for biometrics for social grants in South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021018.
Full textIbarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Full textDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
Batie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Full textWalnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.
Full textTitle from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
Meuth, Lotte. "Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /." Berlin : Duncker & Humblot, 2006. http://www.gbv.de/dms/ilmenau/toc/505963787.PDF.
Full textAmin, Md Ashraful. "Gabor wavelets for human biometrics = Gaibo xiao bo zai ren ti shi bie zhong de ying yong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?phd-ee-b23749489f.pdf.
Full text"Submitted to the Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Doctor of Philosophy." Includes bibliographical references.
Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.
Full textNowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.
Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textGiesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Full textJohnson, Amos Y. Jr. "A method for human identification using static, activity-specific parameters." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15793.
Full textKabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.
Full textIn its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
Rouse, Kenneth Arthur Gilbert Juan E. "Classifying speakers using voice biometrics In a multimodal world." Auburn, Ala, 2009. http://hdl.handle.net/10415/1824.
Full textCanavan, Shaun. "Face recognition by multi-frame fusion of rotating heads in videos /." Connect to resource online, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1210446052.
Full textSingh, Richa. "Mitigating the effect of covariates in face recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2008. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=5990.
Full textTitle from document title page. Document formatted into pages; contains xv, 136 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 125-136).
Du, Preez Johan Frederik. "Liveness assurance in biometric systems." Thesis, 2008. http://hdl.handle.net/10210/362.
Full textProf. S.H. Von Solms
Singh, Ajay, and Ashish Kumar Singh. "Biometric Identification using Phonocardiogram." Thesis, 2011. http://ethesis.nitrkl.ac.in/2503/1/asdf123.pdf.
Full text"Investigating and comparing multimodal biometric techniques." Thesis, 2009. http://hdl.handle.net/10210/2538.
Full textDetermining the identity of a person has become vital in today’s world. Emphasis on security has become increasingly more common in the last few decades, not only in Information Technology, but across all industries. One of the main principles of security is that a system only be accessed by a legitimate user. According to the ISO 7498/2 document [1] (an international standard which defines an information security system architecture) there are 5 pillars of information security. These are Identification/Authentication, Confidentiality, Authorization, Integrity and Non Repudiation. The very first line of security in a system is identifying and authenticating a user. This ensures that the user is who he/she claims to be, and allows only authorized individuals to access your system. Technologies have been developed that can automatically recognize a person by his unique physical features. This technology, referred to as ‘biometrics’, allows us to quickly, securely and conveniently identify an individual. Biometrics solutions have already been deployed worldwide, and it is rapidly becoming an acceptable method of identification in the eye of the public. As useful and advanced as unimodal (single biometric sample) biometric technologies are, they have their limits. Some of them aren’t completely accurate; others aren’t as secure and can be easily bypassed. Recently it has been reported to the congress of the U.S.A [2] that about 2 percent of the population in their country do not have a clear enough fingerprint for biometric use, and therefore cannot use their fingerprints for enrollment or verification. This same report recommends using a biometric system with dual (multimodal) biometric inputs, especially for large scale systems, such as airports. In this dissertation we will investigate and compare multimodal biometric techniques, in order to determine how much of an advantage lies in using this technology, over its unimodal equivalent.
"Decision fusion in a multimodal biometric system." 2004. http://library.cuhk.edu.hk/record=b5891972.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 119-123).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Overview --- p.1
Chapter 1.2 --- Multimodal Biometric Systems --- p.3
Chapter 1.3 --- Objectives --- p.7
Chapter 1.4 --- Thesis Outline --- p.7
Chapter 2 --- Background --- p.9
Chapter 2.1 --- Decision Fusions in Multimodal Biometric Systems --- p.10
Chapter 2.2 --- Fuzzy Logic --- p.15
Chapter 2.2.1 --- Fuzzy Sets and Their Operations --- p.15
Chapter 2.2.2 --- Fuzzy Rules --- p.17
Chapter 2.2.3 --- Defuzzification --- p.18
Chapter 2.2.4 --- Applications of Fuzzy Logic --- p.19
Chapter 2.3 --- Demspter-Shafer Theory of Evidence --- p.20
Chapter 2.3.1 --- Belief and Plausibility --- p.20
Chapter 2.3.2 --- Dempster's Rule of Combination --- p.21
Chapter 2.3.3 --- Applications of Dempster-Shafer Theory of Evidence --- p.22
Chapter 2.4 --- Chapter Summary --- p.23
Chapter 3 --- Biometric Modalities --- p.24
Chapter 3.1 --- Speaker Verification --- p.24
Chapter 3.1.1 --- Data Collection --- p.25
Chapter 3.1.2 --- Experiment and Results --- p.26
Chapter 3.2 --- Face Identification --- p.27
Chapter 3.2.1 --- Data Collection --- p.28
Chapter 3.2.2 --- Experiment and Results --- p.29
Chapter 3.3 --- Fingerprint Verification --- p.35
Chapter 3.3.1 --- Data Collection --- p.36
Chapter 3.3.2 --- Experiment and Results --- p.37
Chapter 3.4 --- Chapter Summary --- p.38
Chapter 4 --- Baseline Fusions --- p.39
Chapter 4.1 --- Majority Voting --- p.40
Chapter 4.2 --- Fusion by Weighted Average Scores --- p.45
Chapter 4.3 --- Comparison of Fusion by Majority Voting and Fusion by Weighted Average Scores --- p.51
Chapter 4.4 --- Chapter Summary --- p.53
Chapter 5 --- Fuzzy Logic Decision Fusion --- p.54
Chapter 5.1 --- Introduction --- p.55
Chapter 5.2 --- Fuzzy Inference System --- p.56
Chapter 5.2.1 --- Input Fuzzy Variables and Fuzzy Sets for Face Biometric --- p.56
Chapter 5.2.2 --- Input Fuzzy Variables and Fuzzy Sets for Fingerprint Biometric --- p.59
Chapter 5.2.3 --- Output Fuzzy Variables and Fuzzy Sets --- p.62
Chapter 5.2.4 --- Fuzzy Rules for Face Biometric --- p.63
Chapter 5.2.5 --- Fuzzy Rules for Fingerprint Biometric --- p.64
Chapter 5.3 --- Experiments with Fuzzy Logic Fusion --- p.66
Chapter 5.4 --- Significance Testing --- p.71
Chapter 5.5 --- Comparison of Fuzzy Logic Fusion and Weighted Average Scores --- p.74
Chapter 5.6 --- Testing of Fuzzy Rule Properties --- p.76
Chapter 5.6.1 --- Experiment 1 --- p.77
Chapter 5.6.2 --- Experiment 2 --- p.80
Chapter 5.6.3 --- Experiment 3 --- p.83
Chapter 5.6.4 --- Comparison of Results --- p.86
Chapter 5.7 --- Chapter Summary --- p.86
Chapter 6 --- Decision Fusion Based on Dempster-Shafer Theory of Evi- dence --- p.88
Chapter 6.1 --- Introduction --- p.89
Chapter 6.2 --- Framework of Fusion Based on Dempster-Shafer Theory of Evidence --- p.90
Chapter 6.2.1 --- Evidences for Biometric Systems --- p.91
Chapter 6.2.2 --- Intra-Modality Combination --- p.95
Chapter 6.2.3 --- Inter-Modality Combination --- p.97
Chapter 6.3 --- Experiments with Fusion Based on Dempster-Shafer Theory of Evidence --- p.99
Chapter 6.4 --- Significance Testing --- p.103
Chapter 6.5 --- Comparison of Fusion Based on Dempster-Shafer Theory of Evidence and Weighted Average Scores --- p.106
Chapter 6.6 --- Comparison of Fusion Based on Dempster-Shafer Theory of Evidence and Fuzzy Logic Fusion --- p.108
Chapter 6.7 --- Chapter Summary --- p.110
Chapter 7 --- Conclusions --- p.112
Chapter 7.1 --- Summary --- p.112
Chapter 7.2 --- Contributions --- p.115
Chapter 7.3 --- Future Work --- p.117
Bibliography --- p.119
Chapter A --- Fuzzy Rules --- p.124
Radhika, V. Bhawani. "Biometric Identification Systems: Feature Level Clustering of Large Biometric Data and DWT Based Hash Coded Bar Biometric System." Thesis, 2009. http://ethesis.nitrkl.ac.in/1338/1/thesis_intro(2).pdf.
Full textHu, Chia-Shing, and 胡家幸. "Analysis and Research on Biometric Identification System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7s52ng.
Full text淡江大學
電機工程學系博士班
102
The issues with missing persons in the present society and the lack of suitable channels to assist in locating those lost in the streets, particularly seniors with dementia whose memory degradations result in their inabilities to find the way home, are worrying as going home on their own is almost an impossible task. With their loved ones lost in the streets, the families could only search for the missing persons via the police, media and posting of photographs, during which all involved have to endure the anxieties, frustrations and helplessness of the process similar to finding a needle in a haystack. For the missing persons, their facial appearances may change in the years spent lost in the streets, hence by making their faces younger to facilitate better recognitions by those familiar with the missing persons and aid in the searches by the police or families, the opportunities for the seniors with dementia to return to their homes may be increased. Therefore, the development of the synthetic system for automatic aging/ reverse aging of facial models is not only an essential topic for the protection of seniors with dementia but also a significant contribution to the search efforts of the families. The existing synthetic systems for the faces at various ages do not emphasize on the alignment of facial characteristics and the calibration of distorted images, which are conditions that may lead to failed attempts or inaccuracies in the synthesized images. In this study, a method integrating ASM algorithm and Log-Gabor wavelet is proposed to achieve a reversible synthetic system for the aging/reverse-aging of facial images, which may be applied to the searches for seniors with dementia. First, facial detection of the ASM algorithm are used to collect a set of features describing the characteristics and contours of the faces, which is then calibrated by the system via the invariance and geometric invariance of the inner corner of the eyes. The levels of similarity between the feature values are utilized to determine the face types for searching and testing with similar sample images. Then the Log-Gabor wavelet transformation is implemented to analyze the aging textures of the facial images to obtain the decomposed images, so that the synthetic faces of various ages may be effectively simulated by controlling the number of decomposed images and finally the wrinkle intensity method is applied to objectively determine the results of the synthesis. Furthermore, in the dawning era of e-banking, e-commerce, smartcards, 3C products and cloud technologies, automatic personal identification has become an extremely important topic as the modern society places ever-increasing emphasis on the privacy and secure protection of personal information. Password identification is being phased out gradually due to its low levels of security. Therefore, the preference for the use of characteristics naturally inherent and unique to each human being as personal passwords for identification is now being widely applied in numerous types of products in countries around the world. The “fingerprint” is unique, portable, difficult to forge, could not be forgotten and loaned, hence these properties render “fingerprint identification” as the top choice amongst the biometric identification methods at present. Although the fingerprint identification technology has developed rapidly over the past 40 years, some challenging research topics remain to be resolved. The processing and matching of overlapping fingerprints, created when one or more fingers with multiple contacts on the same location of an object, is a challenging issue lacking attention. However, as the existing minutiae extraction algorithms assume only one fingerprint per image, the overlapping fingerprint data could not be properly processed. Therefore, the effective separation of overlapping fingerprints is an extremely important and essential process. Hence, this study proposes an algorithm for the separation of overlapping fingerprints based on the orientation fields. The local Fourier analysis is utilized for the initial orientation field estimation and the Gabor filter is subsequently used with the orientation field to extract the fingerprint information corresponding to the orientations. However, the wrong orientation fields may lead to erroneous results in the separation of fingerprints, thus to overcome the noise interferences, the concepts of probability density function and multi-scale technique are implemented for corrections. And the accuracy of the separated fingerprints may be evaluated effectively by using the correlation measurements with mathematical calculations.