• Title/Summary/Keyword: Biometric recognition

Search Result 241, Processing Time 0.02 seconds

An Effective Eye Location for Face Recognition (얼굴 인식을 위한 효과적인 눈 위치 추출)

  • Jung Jo Nam;Rhee Phill Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.109-114
    • /
    • 2005
  • Many researchers have been interested in user authentication using biometric information, and face recognition is a lively field of study of ones in the latest biometric recognition field because of advantage that it can recognize who he/she is without touching machinery. This paper proposes method to extract eye location effectively at face detection step that is precedence work of face recognition. The iterative threshold selection was adopted to get a proper binary image and also the Gaussian filter was used to intensify the properties of eyes to extract an eye location. The correlation was adopted to verify if the eye location is correct or not. Extraction of an eye location that propose in paper as well as accuracy, considered so that may can apply to online system and showed satisfactory performance as result that apply to on line system.

Technology Review on Multimodal Biometric Authentication (다중 생체인식 기반의 인증기술과 과제)

  • Cho, Byungchul;Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.132-141
    • /
    • 2015
  • There might have been weakness in securing user authentication or verification with real time service approach, while existing unimodal biometric authentication has been used mainly for user identification and recognition. Accordingly, it is essential to research and develop ways that upgrade security performance with multi biometric based real time authentication and verification technology. This paper focused to suggest binding assignment and strategy for developing multi biometric authentication technology through investigation of advanced study and patents. Description includes introduction, technology outline, technology trend, patent analysis, and conclusion.

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

Evaluation of Face Recognition System based on Scenarios (얼굴인식 시스템의 시나리오 기반 평가 방법론)

  • Maeng, Doo-Lyel;Hong, Byung-Woo;Kim, Sung-Jo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.487-495
    • /
    • 2010
  • It has been required to develop an accurate and reliable evaluation method for the performance of biometric systems as their use is getting popular. Among a number of biometric systems, face recognition is one of the most widely used techniques and this leads to develop a stable evaluation method for face recognition systems in order to standardize the performance of face recognition systems. However, it is considered as a difficult task to evaluation such systems due to a large number of factors that affect their performance. Thus, it may be infeasible to take into account all the environmental factors that are related to the performance of face recognition systems and this naturally suggests an evaluation method for the overall performance based on scenarios. In this paper, we have analyzed environmental factors that are related to the performance of general face recognition systems and proposed their evaluation method taking into account those factors. We have proposed an evaluation method based on scenario that considers the combination of individual environment factors instead of evaluating the performance of face recognition systems regarding each factor. Indeed, we have presented examples on the evaluation of face recognition systems based on scenario that takes into account overall environmental factors.

Web-based University Classroom Attendance System Based on Deep Learning Face Recognition

  • Ismail, Nor Azman;Chai, Cheah Wen;Samma, Hussein;Salam, Md Sah;Hasan, Layla;Wahab, Nur Haliza Abdul;Mohamed, Farhan;Leng, Wong Yee;Rohani, Mohd Foad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.503-523
    • /
    • 2022
  • Nowadays, many attendance applications utilise biometric techniques such as the face, fingerprint, and iris recognition. Biometrics has become ubiquitous in many sectors. Due to the advancement of deep learning algorithms, the accuracy rate of biometric techniques has been improved tremendously. This paper proposes a web-based attendance system that adopts facial recognition using open-source deep learning pre-trained models. Face recognition procedural steps using web technology and database were explained. The methodology used the required pre-trained weight files embedded in the procedure of face recognition. The face recognition method includes two important processes: registration of face datasets and face matching. The extracted feature vectors were implemented and stored in an online database to create a more dynamic face recognition process. Finally, user testing was conducted, whereby users were asked to perform a series of biometric verification. The testing consists of facial scans from the front, right (30 - 45 degrees) and left (30 - 45 degrees). Reported face recognition results showed an accuracy of 92% with a precision of 100% and recall of 90%.

The implementation of Access Control System using Biometric System (Biometric System(fingerprint Reader)을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.439-442
    • /
    • 2003
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometrics is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Biometric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Wiegand (Data Format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

  • PDF

Steganography based Multi-modal Biometrics System

  • Go, Hyoun-Joo;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.148-153
    • /
    • 2007
  • This paper deals with implementing a steganography based multi-modal biometric system. For this purpose, we construct a multi-biometrics system based on the face and iris recognition. Here, the feature vector of iris pattern is hidden in the face image. The recognition system is designed by the fuzzy-based Linear Discriminant Analysis(LDA), which is an expanded approach of the LDA method combined by the theory of fuzzy sets. Furthermore, we present a watermarking method that can embed iris information into face images. Finally, we show the advantages of the proposed watermarking scheme by computing the ROC curves and make some comparisons recognition rates of watermarked face images with those of original ones. From various experiments, we found that our proposed scheme could be used for establishing efficient and secure multi-modal biometric systems.

Person Recognition using Ocular Image based on BRISK (BRISK 기반의 눈 영상을 이용한 사람 인식)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.881-889
    • /
    • 2016
  • Ocular region recently emerged as a new biometric trait for overcoming the limitations of iris recognition performance at the situation that cannot expect high user cooperation, because the acquisition of an ocular image does not require high user cooperation and close capture unlike an iris image. This study proposes a new method for ocular image recognition based on BRISK (binary robust invariant scalable keypoints). It uses the distance ratio of the two nearest neighbors to improve the accuracy of the detection of corresponding keypoint pairs, and it also uses geometric constraint for eliminating incorrect keypoint pairs. Experiments for evaluating the validity the proposed method were performed on MMU public database. The person recognition rate on left and right ocular image datasets showed 91.1% and 90.6% respectively. The performance represents about 5% higher accuracy than the SIFT-based method which has been widely used in a biometric field.

Steganography based Multi-modal Biometrics System

  • Go, Hyoun-Joo;Moon, Dae-Sung;Moon, Ki-Young;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.1
    • /
    • pp.71-76
    • /
    • 2007
  • This paper deals with implementing a steganography based multi-modal biometric system. For this purpose, we construct a multi-biometrics system based on the face and iris recognition. Here, the feature vector of iris pattern is hidden in the face image. The recognition system is designed by the fuzzy-based Linear Discriminant Analysis(LDA), which is an expanded approach of the LDA method combined by the theory of fuzzy sets. Furthermore, we present a watermarking method that can embed iris information into face images. Finally, we show the advantages of the proposed watermarking scheme by computing the ROC curves and make some comparisons recognition rates of watermarked face images with those of original ones. From various experiments, we found that our proposed scheme could be used for establishing efficient and secure multi-modal biometric systems.

A Study on Conformance Testing Method to Verify the BioAPI Based System Module (BioAPl기반 시스템 모듈을 검증하기 위한 적합성시험 방법 연구)

  • Lee Yoo-Young;Kwon Young-Bin
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.759-768
    • /
    • 2004
  • Recently the biometric recognition technology is intensively studied and the standardization of the technology has been highly demanded for its commercialization. Currently many blometric recognition products are being developed based on the BioAPl(Biometric Application Program-ming Interface) specification. However, the reliable testing tools (or scenarios) to evaluate performance and conformance of the products are not shown yet. In this paper, a conformance testing method is presented, which verifies a biometric recognition system to meet the requirements of the BioAPl standard. Two different testing procedures are used in the proposed method. The first procedure evaluates that each functions offered in the BioAPl specification are correctly implemented and that the functions are actually used in the system. Through the Procedure, a BSP(Biometric Service Provider) system is executed on the framework of the BioAPl functions. It requires selection of parameters and prece-dent functions that should be executed first. The second procedure evaluates the abilities of module management, handling operations and ver-ification process by the analysis of the test cases. It tests the correctness of the system operation when a testing scenario is given. The proposed testing method is applied on a fingerprint verification BSP using the sample BSP provided by the BioAPl consortium. The experimental results shows the benefits of the proposed testing method.