• Title/Summary/Keyword: False Rejection

Search Result 57, Processing Time 0.021 seconds

Fingerprint Recognition using Information of Ridge Shape of Minutiae (특징점의 융선형태 정보를 이용한 지문인식)

  • Park Joong-Jo;Lee Kil-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.2
    • /
    • pp.67-73
    • /
    • 2005
  • Recently, the social requirement of personal identification techniques has been increasing. Fingerprint recognition is one of the biometries methods that has been widely used for this requirement. This paper proposes the fingerprint matching algorithm that uses the information of the ridge shapes of minutiae. In which, the data of the ridge shape are expressed in one-dimensional discrete-time signals. In our algorithm, we obtain one-dimensional discrete-time signals for ridge at every minutiae from input and registered fingerprints, and find pairs of minutia which have the similar ridge shape by comparing input fingerprint with registered fingerprint, thereafter we find candidates of rotation angle and moving displacement from the pairs of similar minutia, and obtain the final rotation angle and moving displacement value from those candidates set by using clustering method. After that, we align an input fingerprint by using obtained data, and calculate the matching rate by counting the number of corresponded pairs of minutia within the overlapped area of an input and registered fingerprints. As a result of experiment, false rejection rate(FRR) of $18.0\%$ at false acceptance rate(FAR) of $0.79\%$ is achieved.

  • PDF

A Method for Motion Artifact Compensation of PPG Signal (광혈류량 신호의 움직임 훼손 보상 기법)

  • Kim, Hansol;Lee, Eui Chul
    • Journal of Broadcast Engineering
    • /
    • v.18 no.4
    • /
    • pp.543-549
    • /
    • 2013
  • Motion artifacts of central and autonomic nervous system signals degrades the performance of the bio-signal based human factor analysis. Firstly, we propose a defining method of motion artifact section by analyzing successive image frames. Motion artifact section is defined when the amount of motion is greater than the pre-defined threshold. In here, the amount of motion is estimated by first derivation of image frames at temporal domain. Secondly, we propose another defining method of motion artifact section through designing 2D Gaussian probability density function model by analyzing feature vectors of one cycle of signal such as length and amplitude. The defined motion artifact sections are interpolated on the basis of 1D Gaussian function. At result of applying the method into photoplethysmography signal, we confirmed that the calculated heartbeat rate from the restored photoplethysmography came up to the one from electrocardiography. Also, we found that the video based method generated relatively more false acceptance of motion artifact section and the probability density function based method generated relatively more false rejection of motion artifact section.

Rotation-Scale-Translation-Intensity Invariant Algorithm for Fingerprint Identigfication (RSTI 불변 지문인식 알고리즘)

  • Kim, Hyun;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.6
    • /
    • pp.88-100
    • /
    • 1998
  • In this paper, an algorithm for a real-time automatic fingerprint identification system is proposed. The fingerprint feature volume is extracted by considering distinct and local characteristics(such as intensity and image quality difference etc.) in fingerprint images, which makes the algorithm properly adaptive to various image acquisitionj methods. Also the matching technique is designed to be invariant on rotation, scaling and translation (RST) changes while being capable of real-time processing. And the classification of fingerprints is performed based on the ridge flow and the relations among singular points such as cores and deltas. The developed fingerprint identification algorithm has been applied to various sets of fingerprint images such as one from NIST(National Institute of Standards and Technology, USA), a pressed fingerprint database constructed according to Korean population distributions in sex, ages and jobs, and a set of rolled-than-scanned fingerprint images. The overall performance of the algorithm has been analyzed and evaluated to the false rejection ratio of 0.07% while holding the false acceptance ratio of 0%.

  • PDF

Diagnosis of Inter Turn Short Circuit in 3-Phase Induction Motors Using Applied Clarke Transformation (Clarke 변환을 응용한 3상 유도전동기의 Inter Turn Short Circuit 진단)

  • Yeong-Jin Goh;Kyoung-Min Kim
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.518-523
    • /
    • 2023
  • The diagnosis of Inter Turn Short Circuits (ITSC) in induction motors is critical due to the escalating severity of faults resulting from even minor disruptions in the stator windings. However, diagnosing ITSC presents significant challenges due to similarities in noise and losses shared with 3-phase induction motors. Although artificial intelligence techniques have been explored for efficient diagnosis, practical applications heavily rely on model-based methods, necessitating further research to enhance diagnostic performance. This study proposed a diagnostic method applied the Clarke Transformation approach, focusing solely on current components while disregarding changes in rotating flux. Experimental results conducted over a 30-minute period, encompassing both normal and ITSC conditions, demonstrate the effectiveness of the proposed approach, with FAR(False Accept Rates) of 0.2% for normal-to-ITSC FRR(False Rejection Rates) and 0.26% for ITSC-to-normal FRR. These findings underscore the efficacy of the proposed approach.

Performance Analysis on Terrain-Adaptive Clutter Map Algorithm for Ground Clutter Rejection of Weather Radar (기상 레이다의 지형 클러터 제거를 위한 지형적응 클러터 맵 알고리듬 성능분석)

  • Kim, Hye-Ri;Jung, Jung-Soo;Kwag, Young-Kil;Kim, Ji-Won;Kim, Ji-Hyeon;Ko, Jeong-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.12
    • /
    • pp.1292-1299
    • /
    • 2014
  • Weather radar systems can provide weather information of the ground, sea, and air in extensive spatial coverage in near real time. However, it becomes problematic when ground clutter signal exists around precipitation because strong signals of ground can cause a false precipitation report. A large percentage of land coverage of Korea consists of mountainous regions where ground clutter needs to be mitigated for more accurate prediction. Thus, it is considered necessary to introduce a new suitable ground clutter removal technique specifically adequate for Korea. In this paper, the C-Map(Clutter Map) method using raw radar signals is proposed for removing ground clutter using a terrain-adaptive clutter map. A clutter map is generated using raw radar signals(I/Q) of clear days, then it is subtracted from received radar signals in frequency domain. The proposed method is applied to the radar data acquired from Sobaeksan rain radar and the result shows that the clutter rejection ratio is about 91.17 %.

AUTOMATIC DETECTION OF EPILEPTIFORM ACTIVITY USING WAVELET AND ARTIFICIAL NEURAL NETWORK (웨이브렛과 신경회로망을 이용한 간질 파형 자동 검출)

  • Park, H.S.;Park, C.H.;Lee, Y.H.;Lee, D.S.;Kim, S.I.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.05
    • /
    • pp.358-361
    • /
    • 1997
  • This paper describes a multichannel epileptic seizure detection algorithm based on wavelet transform(WT), artificial neural network(ANN) and expert system. First, through the WT, a small number of wavelet coefficients is used to represent the single channel epileptic spike. Next, 3-layer feed-forward network employing the error back propagation algorithm is trained and tested using parameters obtained above. Finally, 16 channel expert system which is based on clinical experience is introduced as a artifact rejection and reliable detection. The suggested algorithm was implemented on personal computer(PC). Two main events i.e., epileptiform and normal activities, were selected from 32 person's EEGs(normal: 20, seizure disorder: 12) in consensus among experts. The result was that WT reduced data input size and ANN detected 97 of the 100 EEGs containing definite spike - sensitivity of 97%. Expert rule system was capable of rejecting a wide variety of artifacts commonly found in EEG recordings. It also reduced false positive detections of ANN.

  • PDF

A study on the Anti-Collision of RFID system using Instruction Code Sufficiency (명령 코드 충족 알고리즘을 이용한 무선인식 시스뎀의 데이터 충돌 방지에 관한 연구)

  • 강민수;이동선;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6B
    • /
    • pp.544-552
    • /
    • 2003
  • This paper suggests an instruction code sufficiency algorithm preventing data collision when multiple transponders attempt to connect in the radio frequency identification system. Conventional time domain procedure generates unconditional collision. On the other hand, this algorithm prevents data collision by transmitting data when it meets instruction code. When multiple transponders are transmitting data coincidently, they exploit desired data with using difference of arrival time generated by recognition distance, respectively. As a result of simulation, utilizing the wireless recognition system, adopting the suggested algorithm, operating in 13.56MHz frequency band, it verify that there is Anti-collision and data loss by ensuring transmission time difference of one bit by adopting this algorithm.

A Multiple Signature Authentication System Based on BioAPI for WWW (웹상의 BioAPI에 기반한 서명 다중 인증 시스템)

  • Yun Sung Keun;Kim Seong Hoon;Jun Byung Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1226-1232
    • /
    • 2004
  • Biometric authentication is rising technology for the security market of the next generation. But most of biometric systems are developed using only one of various biological features. Recently, there is a vigorous research for the standardization of various biometric systems. In this paper, we propose a web-based authentication system using three other verifiers based on functional, parametric, and structural approaches for one biometrics of handwritten signature, which is conformable to a specification of BioAPI introduced by BioAPI Consortium for a standardization of biometric technology. This system is developed with a client-server structure, and clients and servers consist of three layers according to the BioAPI structure. The proposed neb-based multiple authentication system of one biometrics can be used to highly increase confidence degree of authentication without additional several biological measurements, although rejection rate is a little increased. That is, the false accept rate(FAR) decreases on the scale of about 1:40,000, although false reject rate(FRR) increases about 2.7 times in the case of combining above three signature verifiers. So the proposed approach can be used as an effective identification method on the internet of an open network. Also, it can be easily extended to a security system using multimodal biometrics.

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

A Study on the Development of Embedded Serial Multi-modal Biometrics Recognition System (임베디드 직렬 다중 생체 인식 시스템 개발에 관한 연구)

  • Kim, Joeng-Hoon;Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.49-54
    • /
    • 2006
  • The recent fingerprint recognition system has unstable factors, such as copy of fingerprint patterns and hacking of fingerprint feature point, which mali cause significant system error. Thus, in this research, we used the fingerprint as the main recognition device and then implemented the multi-biometric recognition system in serial using the speech recognition which has been widely used recently. As a multi-biometric recognition system, once the speech is successfully recognized, the fingerprint recognition process is run. In addition, speaker-dependent DTW(Dynamic Time Warping) algorithm is used among existing speech recognition algorithms (VQ, DTW, HMM, NN) for effective real-time process while KSOM (Kohonen Self-Organizing feature Map) algorithm, which is the artificial intelligence method, is applied for the fingerprint recognition system because of its calculation amount. The experiment of multi-biometric recognition system implemented in this research showed 2 to $7\%$ lower FRR (False Rejection Ratio) than single recognition systems using each fingerprints or voice, but zero FAR (False Acceptance Ratio), which is the most important factor in the recognition system. Moreover, there is almost no difference in the recognition time(average 1.5 seconds) comparing with other existing single biometric recognition systems; therefore, it is proved that the multi-biometric recognition system implemented is more efficient security system than single recognition systems based on various experiments.