• Title/Summary/Keyword: biometric techniques

Search Result 58, Processing Time 0.027 seconds

Iris Recognition Using the 2-D Gabor Filter (2-D Gabor 필터를 이용한 홍채인식)

  • Go, Hyoun-Joo;Lee, Dae-Jong;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.6
    • /
    • pp.716-721
    • /
    • 2003
  • This paper deals with the iris recognition as one of biometric techniques which are applied to identify a person using his/her behavior or congenital characteristics. The iris of a human eye has a texture that is unique and time invariant for each individual. First, we obtain the feature vector from the 2D iris pattern having a property of size invariant and divide it into 24 sectors which are further through three types of 2D Gabor filters. At the recognition process, we compute the similarity measure based on the correlation values. Here, since we use three different matching values obtained from three different directional Gabor filters and select the maximum value among them, it is possible to minimize the recognition error rate. To show the usefulness of the proposed algorithm, we applied it to a biometric database consisting of 50 iris patterns extracted from 10 subjects and finally get more higher than 90% recognition rate.

Wearable Sensor-Based Biometric Gait Classification Algorithm Using WEKA

  • Youn, Ik-Hyun;Won, Kwanghee;Youn, Jong-Hoon;Scheffler, Jeremy
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.45-50
    • /
    • 2016
  • Gait-based classification has gained much interest as a possible authentication method because it incorporate an intrinsic personal signature that is difficult to mimic. The study investigates machine learning techniques to mitigate the natural variations in gait among different subjects. We incorporated several machine learning algorithms into this study using the data mining package called Waikato Environment for Knowledge Analysis (WEKA). WEKA's convenient interface enabled us to apply various sets of machine learning algorithms to understand whether each algorithm can capture certain distinctive gait features. First, we defined 24 gait features by analyzing three-axis acceleration data, and then selectively used them for distinguishing subjects 10 years of age or younger from those aged 20 to 40. We also applied a machine learning voting scheme to improve the accuracy of the classification. The classification accuracy of the proposed system was about 81% on average.

Technology Trends of the Biometric Template Protection Techniques (생체정보 보호 연구 동향)

  • Pan, S.B.;Lee, K.H.;Ahn, D.S.;Chung, Y.H.;Lee, N.I.
    • Electronics and Telecommunications Trends
    • /
    • v.18 no.5 s.83
    • /
    • pp.37-51
    • /
    • 2003
  • 21세기를 맞이하면서 정보통신 기술의 발전과 인터넷 이용 확산 등으로 사용자 인증이 중요한 문제로 대두되고 있다. 패스워드 또는 PIN을 이용한 사용자 인증 방법이 현재까지 널리 쓰이고 있으나 타인에게 노출되거나 잊어버리는 등의 문제점이 있다. 이러한 문제를 해결하기 위하여 개인의 고유한 생체정보를 이용한 주요 정보 보호 및 사용자 인증 등의 연구가 활발히 진행되고 있다. 그러나, 이러한 생체인식 기술을 대규모 응용에 적용하기 위해서는 생체정보의 안전한 저장/전송/처리 등 생체정보 보호에 대한 연구가 필수적이다. 본 고에서는 이러한 생체정보 보호와 관련된 연구 동향을 소개한다.

Implementation of a Portable Identification System using Iris Recognition Techniques (홍채인식을 이용한 정보보안을 위한 휴대용 신분인식기 개발)

  • Joo, Sang-Hyun;Yang, Woo-Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.107-112
    • /
    • 2011
  • In this paper, we introduce the implementation of the security system using iris recognition. This system acquires images with infrared camera and extracts the 2D code from a infrared image which uses scale-space filtering and concavity. We examine the system by (i) extract 2D code and (ii) compare the code that stored on the server (iii) measure FAR and FRR using pattern matching. Experiment results show that the proposed method is very suitable.

An EEG Encryption Scheme for Authentication System based on Brain Wave (뇌파 기반의 인증시스템을 위한 EEG 암호화 기법)

  • Kim, Jung-Sook;Chung, Jang-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.330-338
    • /
    • 2015
  • Gradually increasing the value of the technology, the techniques of the various security systems to protect the core technology have been developed. The proposed security scheme, which uses both a Password and the various devices, is always open by malicious user. In order to solve that problem, the biometric authentication systems are introduced but they have a problem which is the secondary damage to the user. So, the authentication methods using EEG(Electroencephalography) signals were developed. However, the size of EEG signals is big and it cause a lot of problems for the real-time authentication. And the encryption method is necessary. In this paper, we proposed an efficient real-time authentication system applied encryption scheme with junk data using chaos map on the EEG signals.

Gait Recognition Based on GF-CNN and Metric Learning

  • Wen, Junqin
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1105-1112
    • /
    • 2020
  • Gait recognition, as a promising biometric, can be used in video-based surveillance and other security systems. However, due to the complexity of leg movement and the difference of external sampling conditions, gait recognition still faces many problems to be addressed. In this paper, an improved convolutional neural network (CNN) based on Gabor filter is therefore proposed to achieve gait recognition. Firstly, a gait feature extraction layer based on Gabor filter is inserted into the traditional CNNs, which is used to extract gait features from gait silhouette images. Then, in the process of gait classification, using the output of CNN as input, we utilize metric learning techniques to calculate distance between two gaits and achieve gait classification by k-nearest neighbors classifiers. Finally, several experiments are conducted on two open-accessed gait datasets and demonstrate that our method reaches state-of-the-art performances in terms of correct recognition rate on the OULP and CASIA-B datasets.

Emotion Recognition using Short-Term Multi-Physiological Signals

  • Kang, Tae-Koo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1076-1094
    • /
    • 2022
  • Technology for emotion recognition is an essential part of human personality analysis. To define human personality characteristics, the existing method used the survey method. However, there are many cases where communication cannot make without considering emotions. Hence, emotional recognition technology is an essential element for communication but has also been adopted in many other fields. A person's emotions are revealed in various ways, typically including facial, speech, and biometric responses. Therefore, various methods can recognize emotions, e.g., images, voice signals, and physiological signals. Physiological signals are measured with biological sensors and analyzed to identify emotions. This study employed two sensor types. First, the existing method, the binary arousal-valence method, was subdivided into four levels to classify emotions in more detail. Then, based on the current techniques classified as High/Low, the model was further subdivided into multi-levels. Finally, signal characteristics were extracted using a 1-D Convolution Neural Network (CNN) and classified sixteen feelings. Although CNN was used to learn images in 2D, sensor data in 1D was used as the input in this paper. Finally, the proposed emotional recognition system was evaluated by measuring actual sensors.

A Margin-based Face Liveness Detection with Behavioral Confirmation

  • Tolendiyev, Gabit;Lim, Hyotaek;Lee, Byung-Gook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.187-194
    • /
    • 2021
  • This paper presents a margin-based face liveness detection method with behavioral confirmation to prevent spoofing attacks using deep learning techniques. The proposed method provides a possibility to prevent biometric person authentication systems from replay and printed spoofing attacks. For this work, a set of real face images and fake face images was collected and a face liveness detection model is trained on the constructed dataset. Traditional face liveness detection methods exploit the face image covering only the face regions of the human head image. However, outside of this region of interest (ROI) might include useful features such as phone edges and fingers. The proposed face liveness detection method was experimentally tested on the author's own dataset. Collected databases are trained and experimental results show that the trained model distinguishes real face images and fake images correctly.

Identification via Retinal Vessels Combining LBP and HOG

  • Ali Noori;Esmaeil Kheirkhah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.187-192
    • /
    • 2023
  • With development of information technology and necessity for high security, using different identification methods has become very important. Each biometric feature has its own advantages and disadvantages and choosing each of them depends on our usage. Retinal scanning is a bio scale method for identification. The retina is composed of vessels and optical disk. The vessels distribution pattern is one the remarkable retinal identification methods. In this paper, a new approach is presented for identification via retinal images using LBP and hog methods. In the proposed method, it will be tried to separate the retinal vessels accurately via machine vision techniques which will have good sustainability in rotation and size change. HOG-based or LBP-based methods or their combination can be used for separation and also HSV color space can be used too. Having extracted the features, the similarity criteria can be used for identification. The implementation of proposed method and its comparison with one of the newly-presented methods in this area shows better performance of the proposed method.

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.