• Title/Summary/Keyword: biometrics measure

Search Result 17, Processing Time 0.025 seconds

Liveness Detection of Fingerprints Using Correlation Filters (상관 필터를 이용한 위조 지문 검출 방법)

  • Choi, Hee-Seung;Choi, Kyung-Taek;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.355-358
    • /
    • 2005
  • Fingerprint recognition systems are the most widely used in biometrics for personal authentication. As they become more familiar, the security weaknesses of fingerprint sensors are becoming better known. In this paper, we propose a liveness detection method that applies correlation filter to the fingerprint recognition systems. The physiological characteristic of sweat pore, observed only in live people, is used as a measure to classify 'live' fingers from 'spoof' fingers. Previous works show that detection of sweat pores and perspiration patterns in fingerprint images can be used as an anti-spoofing measure. These methods don't consider the characteristic of pores in each individual. We construct the correlation filters of each individual which are composed of their pore information. We make the final decision about the "livens" of fingerprint using correlation output. The proposed algorithm was applied to a data set of 110 live, 110 spoof fingerprint images from optical fingerprint scanner and achieved classification rate of 80%.

  • PDF

Development of touchless fingerprint acquisition device for 5 fingerprint (비접촉식 5지문 획득 장비 개발)

  • Noh, Dong-Hyun;Choi, Kyoung-Taek;Choi, Hee-Seung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.961-962
    • /
    • 2008
  • This paper proposes a touchless fingerprint acquisition device for five fingerprints. In conventional devices, they are focused for taking 1 touchless fingerprint image. But this device is taking 5 fingerprint image at a time. Also, it considers problems for focus and rolling in touchless fingerprint recognition for using camera. They affects fingerprint recognition, so this research is performed to measure and analyze these problems.

  • PDF

The Design and Implementation of a Performance Evaluation Tool for the Face Recognition System (얼굴인식시스템 성능평가 도구의 설계 및 구현)

  • Shin, Woo-Chang
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.161-175
    • /
    • 2007
  • Face recognition technology has lately attracted considerable attention because of its non-intrusiveness, usability and applicability. Related companies insist that their commercial products show the recognition rates more than 95% according to their self-testing. But, the rates cannot be admitted as official recognition rates. So, performance evaluation methods and tools are necessary to objectively measure the accuracy and performance of face recognition systems. In this paper, I propose a reference model for biometrics recognition evaluation tools, and implement an evaluation tool for the face recognition system based on the proposed reference model.

A Fake-Iris Detection Method using SVDD (단일 클래스 분류기를 이용한 위조 홍채 검출 방법)

  • Lee, Sung-Joo;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.287-288
    • /
    • 2007
  • In this paper, we propose a fake-iris detection method. In order to detect the fake-iris, we measure physiological features which are the reflectance ratio of the iris to the sclera at 750 nm and that at 850nm. In order to classify live and fake iris features, we use support vector data description (SVDD). From our experimental results, it is clear that our fake-iris detection method achieves high performance when distinguishing between a live-iris and a fake-iris.

  • PDF

Forecast and Present Technology of Hand Vascular Pattern Recognition System (손혈관 인식 시스템의 경쟁기술현황과 전망)

  • Kim, Jae-Woo;Yeo, Woon-Dong;Bae, Sang-Jin;Seong, Kyung-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.114-116
    • /
    • 2004
  • Biometrics consist of technologies that support automatic identification or verification of identity based on behavioral or physical traits. Biometrics can authenticate identities since they measure unique individual characteristics including fingerprints, hand geometry, iris, hand vascular patterns and facial characteristics. we review the state of the hand vascular patterns identification technology and compare other competitive authentication technologies such as cryptography, electronic signature and PKI.

  • PDF

Research on the Analysis System based on the Big Data for Matlab (빅데이터 기반의 생체신호 수집 및 저장소 설계)

  • Joo, Moon-il;Seo, Young-woo;Kim, Hee-cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.472-474
    • /
    • 2018
  • Recent rapid creation of data has resulted in the development of big data technologies. In particular, with the development of wearable devices that measure biological signals, a variety of biological signals are growing exponentially. Thus, storage technologies are required to identify and systematically store characteristics of exponential increase in biological signals. In this paper, we will study the storage design that stores the biometrics by identifying the characteristics of the biometrics and the techniques to collect the biometrics.

  • PDF

Analysis on Iris Image Degradation Factors (홍채 인식 성능에 영향을 미치는 화질 저하 요인 분석)

  • Yoon, So-Weon;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.863-864
    • /
    • 2008
  • To predict the iris matching performance and guarantee its reliability, image quality measure prior to matching is desired. An analysis on iris image degradation factors which deteriorate matching performance is a basic step for iris image quality measure. We considered five degradation factors-white-out, black-out, noise, blur, and occlusion by specular reflection-which happen generally during the iris image acquisition process. Experimental results show that noise and white-out degraded the EER most significantly, while others on EER were either insignificant or degradation images resulted in even better performance in some cases of blur. This means that degradation factors that affect the performance can be different from those based on human perception or image degradation evaluation.

  • PDF

A New Similarity Measure Based on Intraclass Statistics for Biometric Systems

  • Lee, Kwan-Yong;Park, Hye-Young
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.401-406
    • /
    • 2003
  • A biometric system determines the identity of a person by measuring physical features that can distinguish that person from others. Since biometric features have many variations and can be easily corrupted by noises and deformations, it is necessary to apply machine learning techniques to treat the data. When applying the conventional machine learning methods in designing a specific biometric system, however, one first runs into the difficulty of collecting sufficient data for each person to be registered to the system. In addition, there can be an almost infinite number of variations of non-registered data. Therefore, it is difficult to analyze and predict the distributional properties of real data that are essential for the system to deal with in practical applications. These difficulties require a new framework of identification and verification that is appropriate and efficient for the specific situations of biometric systems. As a preliminary solution, this paper proposes a simple but theoretically well-defined method based on a statistical test theory. Our computational experiments on real-world data show that the proposed method has potential for coping with the actual difficulties in biometrics.

  • PDF

A Fake-Iris Detection Method based on the Change of Reflectance Ratio between Iris and Sclera (파장 변화에 따른 홍채 및 공막의 반사율 변화를 이용한 위조 홍채 검출 방법)

  • Lee, Sung-Joo;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.351-354
    • /
    • 2005
  • In this paper, we propose a new fake-iris detection method. In order to detect the fake-iris, we measure the change of the reflectance ratio between iris and sclera. In a live iris, the amount of change is relatively large compared to that in a fake-iris. From our experimental results, it is clear that our fake-iris detection method achieves high performance when distinguishing between a live-iris and a fake-iris.

  • PDF

A Study on A Biometric Bits Extraction Method Using Subpattern-based PCA and A Helper Data (영역기반 주성분 분석 방법과 보조정보를 이용한 얼굴정보의 비트열 변환 방법)

  • Lee, Hyung-Gu;Jung, Ho-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.183-191
    • /
    • 2010
  • Unique and invariant biometric characteristics have been used for secure user authentication. Storing original biometric data is not acceptable due to privacy and security concerns of biometric technology. In order to enhance the security of the biometric data, the cancelable biometrics was introduced. Using revocable and non-invertible transformation, the cancelable biometrics can provide a way of more secure biometric authentication. In this paper, we present a new cancelable bits extraction method for the facial data. For the feature extraction, the Subpattern-based Principle Component Analysis (PCA) is adopted. The Subpattern-based PCA divides a whole image into a set of partitioned subpatterns and extracts principle components from each subpattern area. The feature extracted by using Subpattern-based PCA is discretized with a helper data based method. The elements of the obtained bits are evaluated and ordered according to a measure based on the fisher criterion. Finally, the most discriminative bits are chosen as the biometric bits string and used for authentication of each identity. Even if the generated bits string is compromised, new bits string can be generated simply by changing the helper data. Because, the helper data utilizes partial information of the feature, the proposed method does not reveal privacy sensitive biometric information of the user. For a security evaluation of the proposed method, a scenario in which the helper is compromised by an adversary is also considered.