To see the other types of publications on this topic, follow the link: Biometric identification.

Dissertations / Theses on the topic 'Biometric identification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Biometric identification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Ellmauthaler, Andreas, and Eric Wernsperger. "Biometric Identification of Mice." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.

Full text
Abstract:

The identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.

In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.

Out of 20 mice, 18 could be identified successfully using the proposed algorithm.

APA, Harvard, Vancouver, ISO, and other styles
3

Larsen, Tormod Emsell. "Biometric Solutions for Personal Identification." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9677.

Full text
Abstract:

With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint matching is the most mature and most widely used technique of today, several others exist. Among these is ear recognition, which so far has received scant attention, but still has showed good results in performance. The thesis gives a general presentation of the biometric technology, with its advantages and challenges. In addition, the new and novel technology of ear recognition using thermal imagery is elaborated and discussed. An experiment of small scale, aiming to test the ability of thermal ear recognition as a method for identification, was performed. The test also considers the affect on the performance when the ear temperature varies. An EER of 20.7 % with a corresponding detection rate of 78 % was achieved when considering only ears with the same temperature. By including the applied temperature changes, an increase in the EER to 31.5 % with a corresponding detection rate of 72 % was observed. The results indicate that thermal images of the ears are not sufficiently distinguishable for use in establishing identity by itself, but it might be suitable as a supplement to other biometric techniques.

APA, Harvard, Vancouver, ISO, and other styles
4

Igarashi, Kei, Chiyomi Miyajima, Katsunobu Itou, Kazuya Takeda, Fumitada Itakura, and Hüseyin Abut. "Biometric identification using driving behavioral signals." IEEE, 2004. http://hdl.handle.net/2237/6800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.

Full text
Abstract:
Ce travail de thèse vise à régénérer des clés crypto-biométriques (clés cryptographiques obtenues avec des données biométriques) résistantes aux méthodes de cryptanalyse quantique. Le défi est d'obtenir des clés avec une haute entropie pour avoir un haut niveau de sécurité, sachant que l'entropie contenue dans les références biométriques limite l'entropie de la clé. Notre choix a été d'exploiter la biométrie faciale.Nous avons d'abord créé un système de reconnaissance faciale de pointe basé en utilisant des bases de données publiques. Notre architecture utilise des réseaux de neurones profonds avec une fonction de perte‘Triplet loss'. Nous avons participé à deux Projets européens H2020 pour lesquelles nous avons fournit des adapations de notres systeme de reconnaise de visage. Nous avons également participé au challenge multimédia NIST SRE19 avec la version finale de notre système classique de reconnaissance faciale qui a donnée d'excellents résultats.Pour obtenir des clés crypto-biométriques, il est nécessaire de disposer de références biométriques binaires. Pour obtenir les représentations binaires directement à partir d'images de visage, nous avons proposé une méthode novatrice tirant parti des auto-encodeurs et la biométrie faciale classique précédemment mise en œuvre. Nous avons également exploité les représentations binaires pour créer un système de vérification de visage cancelable.Concernant notre objectif final, générer des clés crypto-biométriques, nous nous sommes concentrés sur les clés symétriques. Le chiffrement symétrique est menacé par l'algorithme Groover parce qu'il réduit la complexité d'une attaque par force brute de 2(N/2).. Pour atténuer le risque introduit par l'informatique quantique, nous devons augmenter la taille des clés. Pour cela, nous avons essayé de faire la représentation binaire plus longue et plus discriminante.Nous avons réussi à régénérer des clés crypto-biométriques de plus de 400 bits grâce à la qualité des plongements binaires. Les clés crypto-biométriques ont une haute entropie et résistent à la cryptanalyse quantique selon le PQCrypto projet car ils satisfont à l'exigence de longueur. Les clés sont régénérées à l'aide d'un schéma de "fuzzy commitment" en utilisant les codes BCH
This thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
APA, Harvard, Vancouver, ISO, and other styles
6

Benedikt, Lanthao. "Using 3d Facial Motion for Biometric Identification." Thesis, Cardiff University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.523527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haskett, Kevin Joseph. "Iris Biometric Identification Using Artificial Neural Networks." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1947.

Full text
Abstract:
A biometric method is a more secure way of personal identification than passwords. This thesis examines the iris as a personal identifier with the use of neural networks as the classifier. A comparison of different feature extraction methods that include the Fourier transform, discrete cosine transform, the eigen analysis method, and the wavelet transform, is performed. The robustness of each method, with respect to distortion and noise, is also studied.
APA, Harvard, Vancouver, ISO, and other styles
9

Green, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Breedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tungala, Nikhil C. "Contextual biometric watermarking of fingerprint images." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3686.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains viii, 69 p. : ill. Includes abstract. Includes bibliographical references (p. 62-69).
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Khazzar, Ahmed M. A. "Biometric identification using user interaction with virtual worlds." Thesis, University of Portsmouth, 2012. https://researchportal.port.ac.uk/portal/en/theses/biometric-identification-using-user-interaction-with-virtual-worlds(25523f66-88b0-47f2-8e16-40cacba2b76f).html.

Full text
Abstract:
A virtual world is an interactive 3D virtual environment that visually resembles complex physical spaces, and provides an online community through which the users can connect, shop, work, learn, establish emotional relations, and explore different virtual environments. The use of virtual worlds is becoming popular in many fields such as education, economy, space, and games. With the widespread use of virtual worlds, establishing the security of these systems becomes more important. To this date, there is no mechanism to identify users of virtual worlds based on their interactions with the virtual world. Current virtual worlds use knowledge-based authentication mechanisms such as passwords to authenticate users. However they are not capable of distinguishing between genuine users and imposters who possess the knowledge needed to gain access to the virtual world. The aim of the research reported in this thesis is to develop a behavioural biometric system to identify the users of a virtual world based on their behaviour inside these environments. In this thesis, three unique virtual worlds are designed and implemented with different 3D environments and avatars simulating the different environments of virtual worlds. Two experiments are conducted to collect data from user interactions with the virtual worlds. In the first experiment 53 users participated and in the second experiment, a year later, 66 different users participated in the experiment. This research also studies the parameters of user behaviour inside virtual worlds and presents novel feature extraction methods to extract four main biometric features from the collected data, namely: action, time, speed, and entropy biometric features. A sample classification methodology is formulated. Using distance measure algorithms and based on the collected data, users are identified inside the virtual worlds. Also in this thesis the application of biometric fusion in enhancing the performance of the behavioural biometric system is studied. The achieved average equal error rates in this research were between 26-33% depending on the virtual world environment and movement freedom inside virtual worlds. It has been found that avatar actions inside virtual worlds carry more identifying attributes than parameters such as the avatar position inside the virtual world. Also it has been found that virtual worlds with very open environments with respect to avatar movement showed higher EERs when using the biometric system implemented in this research.
APA, Harvard, Vancouver, ISO, and other styles
13

Balisane, Hewa. "Human gait analysis for biometric identification and authentication." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.

Full text
Abstract:
The study of biometrics is concerned with any human physiological or behavioural characteristic which is universal, unique and measurable. Biometric systems operate by acquiring biometric data from individuals, extracting feature sets from data and comparing this feature with the enrolment set in a database. The aIm of this research is to compare the performance of gait-based user recognition of children with adults. Existing analyses techniques in gait-based recognition using wearable sensors for adults are applied to gait analyses in children. This is the first known study to be conducted on children (5-16 years old) for biometric gait recognition. Results presented here show that the performance degradation for children's walking compared to adult walking is approximately 100%. In comparable settings, a 6.21 % Equal Error Rate (EER) for adult gait recognition was reached, whilst for children's walking an EER of 12.69% was achieved. The performance of children's walking whilst carrying an object has also been studied. Results show that carrying an object actually improves the performance when walking normally, but when the children were asked to walk faster the walking becomes unstable, resulting in a higher Equal Error Rate (EER). A comparative investigation of the effects of time on gait recognition in children's walking pattern was carried out. The effects of age and gender have also been considered. In addition, children were tested six months apart; with the sensor on the hip position the performance of gait recognition shows significant variations with EER values. Abstract Finally, this thesis offers for the first time a coupled approach of statistical timedomain and frequency domain methods have been employed in order to match biometric gait signals. It has been shown that initially using root mean squared, crest-factor and kurtosis obtained similar matches in gait signals of children for the ages of 5-16 than for the traditional methods. Hence these novel methods employed can be exploited to verify these more established methods resident in gait recognition software.
APA, Harvard, Vancouver, ISO, and other styles
14

Pahalawatta, Kapila. "Plant species biometric using feature hierarchies." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/1235.

Full text
Abstract:
Biometric identification is a pattern recognition based classification system that recognizes an individual by determining its authenticity using a specific physiological or behavioural characteristic (biometric). In contrast to number of commercially available biometric systems for human recognition in the market today, there is no such a biometric system for plant recognition, even though they have many characteristics that are uniquely identifiable at a species level. The goal of the study was to develop a plant species biometric using both global and local features of leaf images. In recent years, various approaches have been proposed for characterizing leaf images. Most of them were based on a global representation of leaf peripheral with Fourier descriptors, polygonal approximations and centroid-contour distance curve. Global representation of leaf shapes does not provide enough information to characterise species uniquely since different species of plants have similar leaf shapes. Others were based on leaf vein extraction using intensity histograms and trained artificial neural network classifiers. Leaf venation extraction is not always possible since it is not always visible in photographic images. This study proposed a novel approach of leaf identification based on feature hierarchies. First, leaves were sorted by their overall shape using shape signatures. Then this sorted list was pruned based on global and local shape descriptors. The consequent biometric was tested using a corpus of 200 leaves from 40 common New Zealand broadleaf plant species which encompass all categories of local information of leaf peripherals. Two novel shape signatures (full-width to length ratio distribution and half-width to length ratio distribution) were proposed and biometric vectors were constructed using both novel shape signatures, complex-coordinates and centroid-distance for comparison. Retrievals were compared and the biometric vector based on full-width to length ratio distribution was found to be the best classifier. Three types of local information of the leaf peripheral (leaf margin coarseness, stem length to blade length ratio and leaf tip curvature) and the global shape descriptor, leaf compactness, were used to prune the list further. The proposed biometric was able to successfully identify the correct species for 37 test images (out of 40). The proposed biometric identified all the test images (100%) correctly if two species were returned compared to the low recall rates of Wang et al. (2003) (30%, if 10 images were returned) and Ye et al. (2004) (71.4%, if top 5 images were returned). The biometric can be strengthened by adding reference images of new species to the database, or by adding more reference images of existing species when the reference images are not enough to cover the leaf shapes.
APA, Harvard, Vancouver, ISO, and other styles
15

Diefenderfer, Graig T. "Fingerprint recognition." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2761.

Full text
Abstract:
The use of biometrics is an evolving component in today's society. Fingerprint recognition continues to be one of the most widely used biometric systems. This thesis explores the various steps present in a fingerprint recognition system. The study develops a working algorithm to extract fingerprint minutiae from an input fingerprint image. This stage incorporates a variety of image pre-processing steps necessary for accurate minutiae extraction and includes two different methods of ridge thinning. Next, it implements a procedure for matching sets of minutiae data. This process goes through all possible alignments of the datasets and returns the matching score for the best possible alignment. Finally, it conducts a series of matching experiments to compare the performance of the two different thinning methods considered. Results show that thinning by the central line method produces better False Non-match Rates and False Match Rates than those obtained through thinning by the block filter method.
US Navy (USN) author.
APA, Harvard, Vancouver, ISO, and other styles
16

Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
17

Carrillo, Cassandra M. "Continuous biometric authentication for authorized aircraft personnel : a proposed design." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FCarrillo.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Costa, Henrique Sérgio Gutierrez da. "Biometric identification with 3D fingerprints acquired through optical coherence tomography." reponame:Repositório Institucional da UFPR, 2016. http://hdl.handle.net/1884/44486.

Full text
Abstract:
Orientador : Prof. Dr. Luciano Silva
Coorientador : Profª. Olga Regina Pereira Bellon
Tese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Exatas, Programa de Pós-Graduação em Informática. Defesa: Curitiba, 28/06/2016
Inclui referências : f. 75-82
Área de concentração
Resumo: Um método para se obter impressões digitais 3D da derme e da epiderme a partir de imagens em alta resolução adquiridas utilizando Tomografia de Coerência Ótica (OCT) é proposto neste trabalho. Este método, resolve limitações das técnicas de reconstrução 3D de impressões digitais que empregam múltiplas câmeras/triangulação ou iluminação estruturada, tais como variações de resolução do centro para as bordas das impressões digitais 3D causadas por erros de reconstrução, sensibilidade a baixa iluminação e contraste insuficiente. Uma técnica de busca e identificação baseados em padrões inovativos, os "mapas KH " (usados para a segmentação de regiões de superfície em imagens de intensidade e de profundidade), extraídos computando as curvaturas Gaussiana (K) e média (H) de uma região de interesse na vizinhança das minúcias (denominada nuvem de minúcia), é apresentada. Grandes bases de mapas KH, uma para cada nuvem de minúcia identificada, podem ser construídos com essa técnica. A estratégia de busca e identificação, em duas etapas, baseia-se primeiro em padrões locais de gradientes (LGP) dos mapas KH, para reduzir o espaço de busca dentro da base, seguidos de uma comparação que utiliza uma medida de similaridade, a correlação cruzada normalizada dos padrões pré-selecionados com o LGP com os que se quer identificar. A acuracidade do método e sua compatibilidade com os métodos correntes, comparável ou superior à dos métodos 2D, é verificada através da identificação biométrica de impressões digitais 3D utilizando duas bases de imagens, uma adquirida através da tecnologia OCT e a outra gentilmente cedida pela Universidade Politécnica de Hong Kong. A base de imagens OCT, a primeira adquirida com essa tecnologia, é composta de imagens coletadas de onze voluntários em duas sessões de escaneamento e contém imagens de dedos de pessoas com diferentes idades, gênero e etnias e contém casos de cicatrizes, calos e alterações, tais como abrasão e arranhões. Uma base de impressões digitais 2D, obtida dos mesmos voluntários através de um leitor regular de impressões digitais, foi adquirida para permitir uma comparação da técnica proposta com os métodos de identificação tradicionais. A aplicabilidade do método proposto à identificação de impressões digitais alteradas, deterioradas acidentalmente ou intencionalmente, é investigada. Nesses casos, a impressão digital 3D extraída da derme e compatível com a da epiderme é empregada. A identificação destas impressões 3D alteradas é testada utilizando a base de imagens adquiridas com OCT. A acuracidade da técnica é comparada com a obtida utilizando os métodos tradicionais 2D usando os gráficos de taxas de Falsa Aceitação e Falsa Rejeição (FAXxFRR) e de Características Cumulativas de Identificação (CMC). Impressões digitais 2D, extraídas a partir das impressões digitais 3D simulando o rolamento do dedo durante a aquisição (rolamento virtual), foram geradas e sua compatibilidade com as bases de imagens 2D foi testada. Um conjunto de medidas de avaliação de qualidade foram aplicados às bases de imagens de impressões digitais 3D e sua correspondência aos escores de identificação foi analisada para determinar aqueles que podem contribuir para melhorar a acuracidade da identificação. Palavras-chave: Impressões digitais 3D. Identificação Biométrica. Tomografia de Coerência Ótica.
Abstract: A method to obtain epidermal and dermal 3D fingerprints from high-resolution images acquired using Optical Coherence Tomography (OCT) is proposed. This method addresses limitations of current 3D reconstruction techniques that employ multiple cameras/triangulation or structured illumination such as depth and resolution variations from the center to the borders of the fingerprint caused by reconstruction errors, sensitivity to low illumination and poor contrast. The availability of these 3D fingerprints allowed the creation of new matching methods that benefit from the rich information available in 3D. A 3D fingerprint matching technique based on novel patterns, the KH maps (used to surface region segmentation in range and intensity images), extracted by computing the Gaussian and mean curvatures (SILVA; BELLON; GOTARDO, 2001) from a region of interest around the minutiae, named minutiae clouds is presented. Large databases of KH maps, one for each identified minutiae cloud can be built. The matching strategy, a two-step approach, relies on local gradient patterns (LGP) of the KH maps to narrow the search space, followed by a similarity matching, the normalized cross correlation of patterns being matched. The accuracy and matching compatibility, comparable or improved in relation to the 2D matching methods, is verified through matching 3D fingerprints from two databases one acquired using OCT and a public database gently made available by the Hong Kong Polytechnic University. The OCT database, the first 3D database acquired using Optical Coherence Tomography, to our knowledge, is made of images collected from eleven volunteers in two scanning sessions and contains images of people of different ages, genders and ethnicities and also cases of scars, calluses and alterations as abrasion and scratches. A 2D fingerprint database, scanned from the same volunteers using a regular fingerprint reader was also obtained for comparison with traditional matching methods. We investigate the applicability of our method to the identification of altered fingerprints, damaged unintentionally or accidentally. In these cases, the 3D dermal fingerprint, compatible with the epidermis fingerprint, is employed. Matching with 3D dermal and epidermal fingerprints is tested in the OCT database. Matching accuracy is compared with the obtained using traditional matching 2D methods by using False Acceptance and False rejection rate (FARxFRR) and Cumulative Matching Characteristics (CMC) graphs. Unwrapped fingerprints, 2D fingerprints extracted from 3D fingerprints by virtual unrolling were generated and tested for compatibility with 2D databases. A set of quality evaluation measures were employed to the 3D fingerprint databases and their correspondence to the matching scores was analyzed to identify those that can contribute to improve the matching accuracy. Key-words: 3D Fingerprints. Biometric identification. Optical Coherence Tomography.
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Kefeng. "Biometric person identification using near-infrared hand-dorsa vein images." Thesis, University of Central Lancashire, 2013. http://clok.uclan.ac.uk/9238/.

Full text
Abstract:
Biometric recognition is becoming more and more important with the increasing demand for security, and more usable with the improvement of computer vision as well as pattern recognition technologies. Hand vein patterns have been recognised as a good biometric measure for personal identification due to many excellent characteristics, such as uniqueness and stability, as well as difficulty to copy or forge. This thesis covers all the research and development aspects of a biometric person identification system based on near-infrared hand-dorsa vein images. Firstly, the design and realisation of an optimised vein image capture device is presented. In order to maximise the quality of the captured images with relatively low cost, the infrared illumination and imaging theory are discussed. Then a database containing 2040 images from 102 individuals, which were captured by this device, is introduced. Secondly, image analysis and the customised image pre-processing methods are discussed. The consistency of the database images is evaluated using mean squared error (MSE) and peak signal-to-noise ratio (PSNR). Geometrical pre-processing, including shearing correction and region of interest (ROI) extraction, is introduced to improve image consistency. Image noise is evaluated using total variance (TV) values. Grey-level pre-processing, including grey-level normalisation, filtering and adaptive histogram equalisation are applied to enhance vein patterns. Thirdly, a gradient-based image segmentation algorithm is compared with popular algorithms in references like Niblack and Threshold Image algorithm to demonstrate its effectiveness in vein pattern extraction. Post-processing methods including morphological filtering and thinning are also presented. Fourthly, feature extraction and recognition methods are investigated, with several new approaches based on keypoints and local binary patterns (LBP) proposed. Through comprehensive comparison with other approaches based on structure and texture features as well as performance evaluation using the database created with 2040 images, the proposed approach based on multi-scale partition LBP is shown to provide the best recognition performance with an identification rate of nearly 99%. Finally, the whole hand-dorsa vein identification system is presented with a user interface for administration of user information and for person identification.
APA, Harvard, Vancouver, ISO, and other styles
20

Hasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.

Full text
Abstract:
The aim of this thesis is to provide comprehensive information on the possibilities of authentication, combination of authentication factors and the integration of this issue into corporate communication. The work focuses on this issue and specifies the possibilities for obtaining authentication information, analyses the authentication methods, identification and authorization. It examines the applicability of biometric technologies, the principle of their functionality, examples of their use, their impact, the advantages and disadvantages they bring. A natural, easy-to-use, convenient tool for effective and secure communication is authentication including the dynamic biometric signature. The issues of the dynamic biometric signature technology and its implementation are examined from a comprehensive perspective involving experiments. The research proved that the dynamic biometric signature can serve as a method for supporting secure corporate communication and reduce authentication risks in companies and for individuals.
APA, Harvard, Vancouver, ISO, and other styles
22

Barve, Purva M. "Robust pre-processing techniques for non-ideal iris images." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4306.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2005.
Title from document title page. Document formatted into pages; contains ix, 64 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 61-64).
APA, Harvard, Vancouver, ISO, and other styles
23

Gupta, Gaurav. "Models and protocols for evaluation of fingerprint sensors." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4361.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2005.
Title from document title page. Document formatted into pages; contains vi, 78 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 71-75).
APA, Harvard, Vancouver, ISO, and other styles
24

Monaco, Matthew K. "Color space analysis for iris recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=5478.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2007.
Title from document title page. Document formatted into pages; contains x, 93 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 86-90).
APA, Harvard, Vancouver, ISO, and other styles
25

Gibavičius, Darius. "Genetinių algoritmų taikymas biometrijoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_141716-09318.

Full text
Abstract:
Baigiamajame magistro darbe nagrinėjamas genetinių algoritmų taikymas biometrijoje. Išnagrinėta plačiausiai naudojama biometrinė informacija, aprašytos labiausiai paplitusios biometrinės sistemos, genetiniai algoritmai bei jų pritaikymas biometrinių sistemų optimizavimui. Baigiamajame darbe pasiūlytas naujas rankos atpažinimo metodas. Šiam metodui pritaikyti genetiniai algoritmai. Darbą sudaro 7 dalys: įvadas, biometrija, genetiniai algoritmai, genetinių algoritmų taikymas biometrinėse sistemose, genetinių algoritmų taikymas rankos atpažinimui, išvados ir literatūra. Darbo apimtis – 51 p. teksto be priedų, 30 pav., 4 lent., 32 bibliografiniai šaltiniai.
In the graduation thesis to receive the master‘s degree the application of genetic algorithms in biometrics is analysed. The most widely used biometric information have been examined, the most common biometric systems, genetic algorithms and their customization in biometric systems optimization have been described. A new method is proposed for hand recognition. Genetic algorithms have been customized for this method. Structure: introduction, biometry, genetic algorithms, application of genetic algorithms in biometric systems, application of genetic algorithms for hand recognition, the conclusions and bibliography. Thesis consist of: 51 p. text without appendixes, 30 pictures, 4 tables, 32 bibliographical entries.
APA, Harvard, Vancouver, ISO, and other styles
26

Manohar, Vasant. "Video-Based Person Identification Using Facial Strain Maps as a Biometric." Scholar Commons, 2006. http://scholarcommons.usf.edu/etd/3797.

Full text
Abstract:
Research on video-based face recognition has started getting increased attention in the past few years. Algorithms developed for video have an advantage from the availability of plentitude of frames in videos to extract information from. Despite this fact, most research in this direction has limited the scope of the problem to the application of still image-based approaches to some selected frames on which 2D algorithms are expected to perform well. It can be realized that such an approach only uses the spatial information contained in video and does not incorporate the temporal structure.Only recently has the intelligence community begun to approach the problem in this direction. Video-based face recognition algorithms in the last couple of years attempt to simultaneously use the spatial and temporal information for the recognition of moving faces. A new face recognition method that falls into the category of algorithms that adopt spatio-temporal representation and utilizes dynamic information extracted from video is presented. The method was designed based on the hypothesis that the strain pattern exhibited during facial expression provides a unique "fingerprint" for recognition. First, a dense motion field is obtained with an optical flow algorithm. A strain pattern is then derived from the motion field. In experiments with 30 subjects, results indicate that strain pattern is an useful biometric, especially when dealing with extreme conditions such as shadow light and face camouflage, for which conventional face recognition methods are expected to fail. The ability to characterize the face using the elastic properties of facial skin opens up newer avenues to the face recognition community in the context of modeling a face using features beyond visible cues.
APA, Harvard, Vancouver, ISO, and other styles
27

Clarke, Dalton H., and W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.

Full text
Abstract:
Approved for public release, distribution unlimited
The Defense Manpower Data Center (DMDC) manages the Defense Biometric Identification System (DBIDS). DBIDS captures personal and biometric information to manage DoD-wide access, control, and personnel accountability. DBIDS equipment is installed globally, and managed by a central office on the Monterey peninsula. Program managers track data about the numbers and type of equipment installed at each site. Program managers were tracking DBIDS data using a single Microsoft Excel workbook comprised of several, interlinking worksheets (DBIDS Master Plan Spreadsheet). Data updates were error-prone and difficult, requiring close coordination to keep the number of "current" versions of the spreadsheet to a minimum. This thesis initially focused on reviewing the business rules and processes surrounding DBIDS document, and then transitioned into designing, developing, and implementing of a relational database solution to improve problem areas identified during the initial review. After implementation of the database, this thesis explored the effects of making such a change within an organization. This was attempted by identifying and measuring changes in performance and accuracy of the system; by measuring pre- and post-user satisfaction through the qualitative methods of questionnaires and interviews; and finally using this analysis to improve the project through maintenance and growth iterations.
APA, Harvard, Vancouver, ISO, and other styles
28

Young, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Pfeiffer, Karl D. "September 2009." Description based on title screen as viewed on 6 November, 2009. Author(s) subject terms: Database, Database Development Life Cycle, Rapid Prototyping, Business Process Management Software, Business Process Improvement, Business Process Redesign. Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
29

Clarke, William M. "Rethinking the REAL ID Act and national identification cards as a counterterrorism tool." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FClarke.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Dahl, Erik J. ; Denning, Dorothy E. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: REAL ID, PASS ID, biometrics, driver's license, enhanced driver's license, national identification card, biometric technologies, fingerprints, iris scan, facial recognition, hand geometry, Department of Homeland Security. Includes bibliographical references (p. 85-96). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
30

Saleh, Mohamed Ibrahim. "Using Ears for Human Identification." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33158.

Full text
Abstract:
Biometrics includes the study of automatic methods for distinguishing human beings based on physical or behavioral traits. The problem of finding good biometric features and recognition methods has been researched extensively in recent years. Our research considers the use of ears as a biometric for human recognition. Researchers have not considered this biometric as much as others, which include fingerprints, irises, and faces. This thesis presents a novel approach to recognize individuals based on their outer ear images through spatial segmentation. This approach to recognizing is also good for dealing with occlusions. The study will present several feature extraction techniques based on spatial segmentation of the ear image. The study will also present a method for classifier fusion. Principal components analysis (PCA) is used in this research for feature extraction and dimensionality reduction. For classification, nearest neighbor classifiers are used. The research also investigates the use of ear images as a supplement to face images in a multimodal biometric system. Our base eigen-ear experiment results in an 84% rank one recognition rate, and the segmentation method yielded improvements up to 94%. Face recognition by itself, using the same approach, gave a 63% rank one recognition rate, but when complimented with ear images in a multimodal system improved to 94% rank one recognition rate.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
31

Van, de Haar Helen Augusta. "A framework for biometrics for social grants in South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021018.

Full text
Abstract:
In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
APA, Harvard, Vancouver, ISO, and other styles
32

Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.

Full text
Abstract:
Traitant des données très sensibles, les systèmes de gestion d'identité doivent fournir une protection adéquate de la confidentialité. En utilisant le calcul multipartite (MPC), le chiffrement homomorphe (HE) et le chiffrement fonctionnel (FE), cette thèse aborde la conception et la mise en œuvre de systèmes biométriques préservant la confidentialité pour de multiples scénarios. Nous améliorons les travaux existants dans le domaine, en équilibrant la précision et la performance avec les garanties de sécurité. Nous allons au-delà des adversaires semi-honnêtes pour garantir la correction face aux adversaires malveillants. Enfin, nous abordons la question de la fuite des données biométriques lors de la révélation du résultat, un problème de confidentialité souvent négligé dans la littérature. Les principales contributions de cette thèse sont : - Une nouvelle solution d'identification de visage construite sur la FE pour produits scalaires atténuant la fuite d'entrée. - Un nouveau protocole de calcul à deux parties, Funshade, pour préserver la confidentialité des opérations biométriques de calcul de distance avec seuil. - Une méthode innovante d'identification biométrique préservant la confidentialité, basée sur la notion de test de groupe appelée Grote. - Un nouveau protocole de décryptage distribué avec masquage collaboratif traitant la fuite d'entrée, appelé Colmade. - Un protocole de calcul tripartite à majorité honnête, Banners, pour réaliser l'inférence malicieusement sécurisée de réseaux neuronaux binarisés. - Une bibliothèque Python HE nommée Pyfhel, offrant une abstraction de haut niveau et des fonctionnalités de bas niveau, avec des applications dans l'enseignement
Dealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
APA, Harvard, Vancouver, ISO, and other styles
33

Batie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.

Full text
Abstract:
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as "BIO+PIN"). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN.
APA, Harvard, Vancouver, ISO, and other styles
34

Walnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.

Full text
Abstract:
Thesis (M.A.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
APA, Harvard, Vancouver, ISO, and other styles
35

Meuth, Lotte. "Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /." Berlin : Duncker & Humblot, 2006. http://www.gbv.de/dms/ilmenau/toc/505963787.PDF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Amin, Md Ashraful. "Gabor wavelets for human biometrics = Gaibo xiao bo zai ren ti shi bie zhong de ying yong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?phd-ee-b23749489f.pdf.

Full text
Abstract:
Thesis (Ph.D.)--City University of Hong Kong, 2009.
"Submitted to the Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Doctor of Philosophy." Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
37

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Full text
Abstract:

Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.

APA, Harvard, Vancouver, ISO, and other styles
38

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Full text
Abstract:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
APA, Harvard, Vancouver, ISO, and other styles
39

Giesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Johnson, Amos Y. Jr. "A method for human identification using static, activity-specific parameters." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.

Full text
Abstract:
Dans son contexte spécifique, le terme « biométrie » est souvent associé à l'étude des caractéristiques physiques et comportementales des individus afin de parvenir à leur identification ou à leur vérification. Ainsi, le travail développé dans cette thèse nous a conduit à proposer un algorithme d'identification robuste, en considérant les caractéristiques intrinsèques des phalanges de la main. Considérée comme une biométrie cachée, cette nouvelle approche peut s'avérer intéressante, notamment lorsqu'il est question d'assurer un niveau de sécurité élevé, robuste aux différentes attaques qu'un système biométrique doit contrer. La base des techniques proposées requière trois phases, à savoir: (1) la segmentation des phalanges, (2) l'extraction de leurs caractéristiques par la génération d'une empreinte, appelée « Phalange-Code » et (3) l'identification basée sur la méthode du 1-plus proche voisin ou la vérification basée sur une métrique de similarité. Ces algorithmes opèrent sur des niveaux hiérarchiques permettant l'extraction de certains paramètres, invariants à des transformations géométriques telles que l'orientation et la translation. De plus, nous avons considéré des techniques robustes au bruit, pouvant opérer à différentes résolutions d'images. Plus précisément, nous avons élaboré trois approches de reconnaissance biométrique : la première approche utilise l'information spectrale des contours des phalanges de la main comme signature individuelle, alors que la deuxième approche nécessite l'utilisation des caractéristiques géométriques et morphologiques des phalanges (i.e. surface, périmètre, longueur, largeur, capacité). Enfin, la troisième approche requière la génération d'un nouveau rapport de vraisemblance entre les phalanges, utilisant la théorie de probabilités géométriques. En second lieu, la construction d'une base de données avec la plus faible dose de rayonnement a été l'un des grands défis de notre étude. Nous avons donc procédé par la collecte de 403 images radiographiques de la main, acquises en utilisant la machine Apollo EZ X-Ray. Ces images sont issues de 115 adultes volontaires (hommes et femmes), non pathologiques. L'âge moyen étant de 27.2 ans et l'écart-type est de 8.5. La base de données ainsi construite intègre des images de la main droite et gauche, acquises à des positions différentes et en considérant des résolutions différentes et des doses de rayonnement différentes (i.e. réduction jusqu'à 98 % de la dose standard recommandée par les radiologues « 1 µSv »).Nos expériences montrent que les individus peuvent être distingués par les caractéristiques de leurs phalanges, que ce soit celles de la main droite ou celles de la main gauche. Cette distinction est également valable pour le genre des individus (homme/femme). L'étude menée a montré que l'approche utilisant l'information spectrale des contours des phalanges permet une identification par seulement trois phalanges, à un taux EER (Equal Error Rate) inférieur à 0.24 %. Par ailleurs, il a été constaté « de manière surprenante » que la technique fondée sur les rapports de vraisemblance entre les phalanges permet d'atteindre un taux d'identification de 100 % et un taux d'EER de 0.37 %, avec une seule phalange. Hormis l'aspect identification/authentification, notre étude s'est penchée sur l'optimisation de la dose de rayonnement permettant une identification saine des individus. Ainsi, il a été démontré qu'il était possible d'acquérir plus de 12500/an d'images radiographiques de la main, sans pour autant dépasser le seuil administratif de 0.25 mSv
In its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
APA, Harvard, Vancouver, ISO, and other styles
42

Rouse, Kenneth Arthur Gilbert Juan E. "Classifying speakers using voice biometrics In a multimodal world." Auburn, Ala, 2009. http://hdl.handle.net/10415/1824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Canavan, Shaun. "Face recognition by multi-frame fusion of rotating heads in videos /." Connect to resource online, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1210446052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Singh, Richa. "Mitigating the effect of covariates in face recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2008. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=5990.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 2008.
Title from document title page. Document formatted into pages; contains xv, 136 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 125-136).
APA, Harvard, Vancouver, ISO, and other styles
45

Du, Preez Johan Frederik. "Liveness assurance in biometric systems." Thesis, 2008. http://hdl.handle.net/10210/362.

Full text
Abstract:
The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and specifically personal information must be regulated and secured in a trusted way. The use of passwords and tokens (example: bank card) that’s currently the most popular and well known mechanism for electronic identification can only identify the password or token but NOT the physical user using the password or token for identification. Biometrics addresses the above issue by being part of the physical user. For example: your fingerprint, retina or iris. Current biometric technologies provide an enabling medium to help with more accurate identification and verification. Thereby protecting and securing electronic information…BUT: One of the biggest problem areas surrounding biometrics is the fact that most biometric tokens (fingerprints, hand geometry and the human eye) can be used in some cases to identify the owner of the biometric token even after death as if the owner was still alive. The problem becomes apparent in the case of a person that passed away and the possibility of using the biometric tokens of the deceased to obtain access to his/her bank account. Therefore the importance of effective liveness testing is highlighted. Current liveness testing technologies can not be trusted in a way that would be necessary to provide the trust needed in the example of access to a personal bank account at an ATM (automatic teller machine). This dissertation reports on the initial stages of a research project that addresses the above problem by proposing the use of biometric tokens that doesn’t exist if the owner is not alive, thus the dissertation coins the new term – Inherent Liveness Biometrics. The way the human heart beats as a biometric token to identify or verify a person, might solve the issue of liveness testing, because “The way the human heart beats” might prove to be a natural biometric token that is only valid for a living person, thus an inherent liveness biometric.
Prof. S.H. Von Solms
APA, Harvard, Vancouver, ISO, and other styles
46

Singh, Ajay, and Ashish Kumar Singh. "Biometric Identification using Phonocardiogram." Thesis, 2011. http://ethesis.nitrkl.ac.in/2503/1/asdf123.pdf.

Full text
Abstract:
Phonocardiogram (PCG) signals as a biometric is a new and novel method for user identification. Use of PCG signals for user recognition is a highly reliable method because heart sounds are produced by internal organs and cannot be forged easily as compared to other recognition systems such as fingerprint, iris, DNA etc. PCG signals have been recorded using an electronic stethoscope. Database of heart sound is made using the electronic stethoscope. In the beginning, heart sounds for different classes is observed in time as well as frequency for their uniqueness for each class. The first step performed is to extract features from the recorded heart signals. We have implemented LFBC algorithm as a feature extraction algorithm to get the cepstral component of heart sound. The next objective is to classify these feature vectors to recognize a person. A classification algorithm is first trained using a training sequence for each user to generate unique features for each user. During the testing period, the classifier uses the stored training attributes for each user and uses them to match or identify the testing sequence. We have used LBG-VQ and GMM for the classification of user classes. Both the algorithms are iterative, robust and well established methods for user identification. We have implemented the normalization at two places; first, before feature extraction; then just after the feature extraction in case of GMM classifier which is not proposed in earlier literature.
APA, Harvard, Vancouver, ISO, and other styles
47

"Investigating and comparing multimodal biometric techniques." Thesis, 2009. http://hdl.handle.net/10210/2538.

Full text
Abstract:
M.Sc.
Determining the identity of a person has become vital in today’s world. Emphasis on security has become increasingly more common in the last few decades, not only in Information Technology, but across all industries. One of the main principles of security is that a system only be accessed by a legitimate user. According to the ISO 7498/2 document [1] (an international standard which defines an information security system architecture) there are 5 pillars of information security. These are Identification/Authentication, Confidentiality, Authorization, Integrity and Non Repudiation. The very first line of security in a system is identifying and authenticating a user. This ensures that the user is who he/she claims to be, and allows only authorized individuals to access your system. Technologies have been developed that can automatically recognize a person by his unique physical features. This technology, referred to as ‘biometrics’, allows us to quickly, securely and conveniently identify an individual. Biometrics solutions have already been deployed worldwide, and it is rapidly becoming an acceptable method of identification in the eye of the public. As useful and advanced as unimodal (single biometric sample) biometric technologies are, they have their limits. Some of them aren’t completely accurate; others aren’t as secure and can be easily bypassed. Recently it has been reported to the congress of the U.S.A [2] that about 2 percent of the population in their country do not have a clear enough fingerprint for biometric use, and therefore cannot use their fingerprints for enrollment or verification. This same report recommends using a biometric system with dual (multimodal) biometric inputs, especially for large scale systems, such as airports. In this dissertation we will investigate and compare multimodal biometric techniques, in order to determine how much of an advantage lies in using this technology, over its unimodal equivalent.
APA, Harvard, Vancouver, ISO, and other styles
48

"Decision fusion in a multimodal biometric system." 2004. http://library.cuhk.edu.hk/record=b5891972.

Full text
Abstract:
Lau, Chun Wai.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 119-123).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Overview --- p.1
Chapter 1.2 --- Multimodal Biometric Systems --- p.3
Chapter 1.3 --- Objectives --- p.7
Chapter 1.4 --- Thesis Outline --- p.7
Chapter 2 --- Background --- p.9
Chapter 2.1 --- Decision Fusions in Multimodal Biometric Systems --- p.10
Chapter 2.2 --- Fuzzy Logic --- p.15
Chapter 2.2.1 --- Fuzzy Sets and Their Operations --- p.15
Chapter 2.2.2 --- Fuzzy Rules --- p.17
Chapter 2.2.3 --- Defuzzification --- p.18
Chapter 2.2.4 --- Applications of Fuzzy Logic --- p.19
Chapter 2.3 --- Demspter-Shafer Theory of Evidence --- p.20
Chapter 2.3.1 --- Belief and Plausibility --- p.20
Chapter 2.3.2 --- Dempster's Rule of Combination --- p.21
Chapter 2.3.3 --- Applications of Dempster-Shafer Theory of Evidence --- p.22
Chapter 2.4 --- Chapter Summary --- p.23
Chapter 3 --- Biometric Modalities --- p.24
Chapter 3.1 --- Speaker Verification --- p.24
Chapter 3.1.1 --- Data Collection --- p.25
Chapter 3.1.2 --- Experiment and Results --- p.26
Chapter 3.2 --- Face Identification --- p.27
Chapter 3.2.1 --- Data Collection --- p.28
Chapter 3.2.2 --- Experiment and Results --- p.29
Chapter 3.3 --- Fingerprint Verification --- p.35
Chapter 3.3.1 --- Data Collection --- p.36
Chapter 3.3.2 --- Experiment and Results --- p.37
Chapter 3.4 --- Chapter Summary --- p.38
Chapter 4 --- Baseline Fusions --- p.39
Chapter 4.1 --- Majority Voting --- p.40
Chapter 4.2 --- Fusion by Weighted Average Scores --- p.45
Chapter 4.3 --- Comparison of Fusion by Majority Voting and Fusion by Weighted Average Scores --- p.51
Chapter 4.4 --- Chapter Summary --- p.53
Chapter 5 --- Fuzzy Logic Decision Fusion --- p.54
Chapter 5.1 --- Introduction --- p.55
Chapter 5.2 --- Fuzzy Inference System --- p.56
Chapter 5.2.1 --- Input Fuzzy Variables and Fuzzy Sets for Face Biometric --- p.56
Chapter 5.2.2 --- Input Fuzzy Variables and Fuzzy Sets for Fingerprint Biometric --- p.59
Chapter 5.2.3 --- Output Fuzzy Variables and Fuzzy Sets --- p.62
Chapter 5.2.4 --- Fuzzy Rules for Face Biometric --- p.63
Chapter 5.2.5 --- Fuzzy Rules for Fingerprint Biometric --- p.64
Chapter 5.3 --- Experiments with Fuzzy Logic Fusion --- p.66
Chapter 5.4 --- Significance Testing --- p.71
Chapter 5.5 --- Comparison of Fuzzy Logic Fusion and Weighted Average Scores --- p.74
Chapter 5.6 --- Testing of Fuzzy Rule Properties --- p.76
Chapter 5.6.1 --- Experiment 1 --- p.77
Chapter 5.6.2 --- Experiment 2 --- p.80
Chapter 5.6.3 --- Experiment 3 --- p.83
Chapter 5.6.4 --- Comparison of Results --- p.86
Chapter 5.7 --- Chapter Summary --- p.86
Chapter 6 --- Decision Fusion Based on Dempster-Shafer Theory of Evi- dence --- p.88
Chapter 6.1 --- Introduction --- p.89
Chapter 6.2 --- Framework of Fusion Based on Dempster-Shafer Theory of Evidence --- p.90
Chapter 6.2.1 --- Evidences for Biometric Systems --- p.91
Chapter 6.2.2 --- Intra-Modality Combination --- p.95
Chapter 6.2.3 --- Inter-Modality Combination --- p.97
Chapter 6.3 --- Experiments with Fusion Based on Dempster-Shafer Theory of Evidence --- p.99
Chapter 6.4 --- Significance Testing --- p.103
Chapter 6.5 --- Comparison of Fusion Based on Dempster-Shafer Theory of Evidence and Weighted Average Scores --- p.106
Chapter 6.6 --- Comparison of Fusion Based on Dempster-Shafer Theory of Evidence and Fuzzy Logic Fusion --- p.108
Chapter 6.7 --- Chapter Summary --- p.110
Chapter 7 --- Conclusions --- p.112
Chapter 7.1 --- Summary --- p.112
Chapter 7.2 --- Contributions --- p.115
Chapter 7.3 --- Future Work --- p.117
Bibliography --- p.119
Chapter A --- Fuzzy Rules --- p.124
APA, Harvard, Vancouver, ISO, and other styles
49

Radhika, V. Bhawani. "Biometric Identification Systems: Feature Level Clustering of Large Biometric Data and DWT Based Hash Coded Bar Biometric System." Thesis, 2009. http://ethesis.nitrkl.ac.in/1338/1/thesis_intro(2).pdf.

Full text
Abstract:
Biometric authentication systems are fast replacing conventional identification schemes such as passwords and PIN numbers. This paper introduces a novel matching scheme that uses a image hash scheme. It uses Discrete Wavelet Transformation (DWT) of biometric images and randomized processing strategies for hashing. In this scheme the input image is decomposed into approximation, vertical, horizontal and diagonal coefficients using the discrete wavelet transform. The algorithm converts images into binary strings and is robust against compression, distortion and other transformations. As a case study the system is tested on ear database and is outperforming with an accuracy of 96.37% with considerably low FAR of 0.17%. The performance shows that the system can be deployed for high level security applications.
APA, Harvard, Vancouver, ISO, and other styles
50

Hu, Chia-Shing, and 胡家幸. "Analysis and Research on Biometric Identification System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7s52ng.

Full text
Abstract:
博士
淡江大學
電機工程學系博士班
102
The issues with missing persons in the present society and the lack of suitable channels to assist in locating those lost in the streets, particularly seniors with dementia whose memory degradations result in their inabilities to find the way home, are worrying as going home on their own is almost an impossible task. With their loved ones lost in the streets, the families could only search for the missing persons via the police, media and posting of photographs, during which all involved have to endure the anxieties, frustrations and helplessness of the process similar to finding a needle in a haystack. For the missing persons, their facial appearances may change in the years spent lost in the streets, hence by making their faces younger to facilitate better recognitions by those familiar with the missing persons and aid in the searches by the police or families, the opportunities for the seniors with dementia to return to their homes may be increased. Therefore, the development of the synthetic system for automatic aging/ reverse aging of facial models is not only an essential topic for the protection of seniors with dementia but also a significant contribution to the search efforts of the families. The existing synthetic systems for the faces at various ages do not emphasize on the alignment of facial characteristics and the calibration of distorted images, which are conditions that may lead to failed attempts or inaccuracies in the synthesized images. In this study, a method integrating ASM algorithm and Log-Gabor wavelet is proposed to achieve a reversible synthetic system for the aging/reverse-aging of facial images, which may be applied to the searches for seniors with dementia. First, facial detection of the ASM algorithm are used to collect a set of features describing the characteristics and contours of the faces, which is then calibrated by the system via the invariance and geometric invariance of the inner corner of the eyes. The levels of similarity between the feature values are utilized to determine the face types for searching and testing with similar sample images. Then the Log-Gabor wavelet transformation is implemented to analyze the aging textures of the facial images to obtain the decomposed images, so that the synthetic faces of various ages may be effectively simulated by controlling the number of decomposed images and finally the wrinkle intensity method is applied to objectively determine the results of the synthesis. Furthermore, in the dawning era of e-banking, e-commerce, smartcards, 3C products and cloud technologies, automatic personal identification has become an extremely important topic as the modern society places ever-increasing emphasis on the privacy and secure protection of personal information. Password identification is being phased out gradually due to its low levels of security. Therefore, the preference for the use of characteristics naturally inherent and unique to each human being as personal passwords for identification is now being widely applied in numerous types of products in countries around the world. The “fingerprint” is unique, portable, difficult to forge, could not be forgotten and loaned, hence these properties render “fingerprint identification” as the top choice amongst the biometric identification methods at present. Although the fingerprint identification technology has developed rapidly over the past 40 years, some challenging research topics remain to be resolved. The processing and matching of overlapping fingerprints, created when one or more fingers with multiple contacts on the same location of an object, is a challenging issue lacking attention. However, as the existing minutiae extraction algorithms assume only one fingerprint per image, the overlapping fingerprint data could not be properly processed. Therefore, the effective separation of overlapping fingerprints is an extremely important and essential process. Hence, this study proposes an algorithm for the separation of overlapping fingerprints based on the orientation fields. The local Fourier analysis is utilized for the initial orientation field estimation and the Gabor filter is subsequently used with the orientation field to extract the fingerprint information corresponding to the orientations. However, the wrong orientation fields may lead to erroneous results in the separation of fingerprints, thus to overcome the noise interferences, the concepts of probability density function and multi-scale technique are implemented for corrections. And the accuracy of the separated fingerprints may be evaluated effectively by using the correlation measurements with mathematical calculations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography