• Title/Summary/Keyword: biometrics recognition

Search Result 218, Processing Time 0.027 seconds

Inexpensive Visual Motion Data Glove for Human-Computer Interface Via Hand Gesture Recognition (손 동작 인식을 통한 인간 - 컴퓨터 인터페이스용 저가형 비주얼 모션 데이터 글러브)

  • Han, Young-Mo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.5
    • /
    • pp.341-346
    • /
    • 2009
  • The motion data glove is a representative human-computer interaction tool that inputs human hand gestures to computers by measuring their motions. The motion data glove is essential equipment used for new computer technologiesincluding home automation, virtual reality, biometrics, motion capture. For its popular usage, this paper attempts to develop an inexpensive visual.type motion data glove that can be used without any special equipment. The proposed approach has the special feature; it can be developed as a low-cost one becauseof not using high-cost motion-sensing fibers that were used in the conventional approaches. That makes its easy production and popular use possible. This approach adopts a visual method that is obtained by improving conventional optic motion capture technology, instead of mechanical method using motion-sensing fibers. Compared to conventional visual methods, the proposed method has the following advantages and originalities Firstly, conventional visual methods use many cameras and equipments to reconstruct 3D pose with eliminating occlusions But the proposed method adopts a mono vision approachthat makes simple and low cost equipments possible. Secondly, conventional mono vision methods have difficulty in reconstructing 3D pose of occluded parts in images because they have weak points about occlusions. But the proposed approach can reconstruct occluded parts in images by using originally designed thin-bar-shaped optic indicators. Thirdly, many cases of conventional methods use nonlinear numerical computation image analysis algorithm, so they have inconvenience about their initialization and computation times. But the proposed method improves these inconveniences by using a closed-form image analysis algorithm that is obtained from original formulation. Fourthly, many cases of conventional closed-form algorithms use approximations in their formulations processes, so they have disadvantages of low accuracy and confined applications due to singularities. But the proposed method improves these disadvantages by original formulation techniques where a closed-form algorithm is derived by using exponential-form twist coordinates, instead of using approximations or local parameterizations such as Euler angels.

A Study on Multi-modal Near-IR Face and Iris Recognition on Mobile Phones (휴대폰 환경에서의 근적외선 얼굴 및 홍채 다중 인식 연구)

  • Park, Kang-Ryoung;Han, Song-Yi;Kang, Byung-Jun;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.1-9
    • /
    • 2008
  • As the security requirements of mobile phones have been increasing, there have been extensive researches using one biometric feature (e.g., an iris, a fingerprint, or a face image) for authentication. Due to the limitation of uni-modal biometrics, we propose a method that combines face and iris images in order to improve accuracy in mobile environments. This paper presents four advantages and contributions over previous research. First, in order to capture both face and iris image at fast speed and simultaneously, we use a built-in conventional mega pixel camera in mobile phone, which is revised to capture the NIR (Near-InfraRed) face and iris image. Second, in order to increase the authentication accuracy of face and iris, we propose a score level fusion method based on SVM (Support Vector Machine). Third, to reduce the classification complexities of SVM and intra-variation of face and iris data, we normalize the input face and iris data, respectively. For face, a NIR illuminator and NIR passing filter on camera are used to reduce the illumination variance caused by environmental visible lighting and the consequent saturated region in face by the NIR illuminator is normalized by low processing logarithmic algorithm considering mobile phone. For iris, image transform into polar coordinate and iris code shifting are used for obtaining robust identification accuracy irrespective of image capturing condition. Fourth, to increase the processing speed on mobile phone, we use integer based face and iris authentication algorithms. Experimental results were tested with face and iris images by mega-pixel camera of mobile phone. It showed that the authentication accuracy using SVM was better than those of uni-modal (face or iris), SUM, MAX, NIN and weighted SUM rules.

A Method for Improving Vein Recognition Performance by Illumination Normalization (조명 정규화를 통한 정맥인식 성능 향상 기법)

  • Lee, Eui Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.423-430
    • /
    • 2013
  • Recently, the personal identification technologies using vein pattern of back of the hand, palm, and finger have been developed actively because it has the advantage that the vein blood vessel in the body is impossible to damage, make a replication and forge. However, it is difficult to extract clearly the vein region from captured vein images through common image prcessing based region segmentation method, because of the light scattering and non-uniform internal tissue by skin layer and inside layer skeleton, etc. Especially, it takes a long time for processing time and makes a discontinuity of blood vessel just in a image because it has non-uniform illumination due to use a locally different adaptive threshold for the binarization of acquired finger-vein image. To solve this problem, we propose illumination normalization based fast method for extracting the finger-vein region. The proposed method has advantages compared to the previous methods as follows. Firstly, for remove a non-uniform illumination of the captured vein image, we obtain a illumination component of the captured vein image by using a low-pass filter. Secondly, by extracting the finger-vein path using one time binarization of a single threshold selection, we were able to reduce the processing time. Through experimental results, we confirmed that the accuracy of extracting the finger-vein region was increased and the processing time was shortened than prior methods.

An Algorithm of Fingerprint Image Restoration Based on an Artificial Neural Network (인공 신경망 기반의 지문 영상 복원 알고리즘)

  • Jang, Seok-Woo;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.530-536
    • /
    • 2020
  • The use of minutiae by fingerprint readers is robust against presentation attacks, but one weakness is that the mismatch rate is high. Therefore, minutiae tend to be used with skeleton images. There have been many studies on security vulnerabilities in the characteristics of minutiae, but vulnerability studies on the skeleton are weak, so this study attempts to analyze the vulnerability of presentation attacks against the skeleton. To this end, we propose a method based on the skeleton to recover the original fingerprint using a learning algorithm. The proposed method includes a new learning model, Pix2Pix, which adds a latent vector to the existing Pix2Pix model, thereby generating a natural fingerprint. In the experimental results, the original fingerprint is restored using the proposed machine learning, and then, the restored fingerprint is the input for the fingerprint reader in order to achieve a good recognition rate. Thus, this study verifies that fingerprint readers using the skeleton are vulnerable to presentation attacks. The approach presented in this paper is expected to be useful in a variety of applications concerning fingerprint restoration, video security, and biometrics.

Human Identification using EMG Signal based Artificial Neural Network (EMG 신호 기반 Artificial Neural Network을 이용한 사용자 인식)

  • Kim, Sang-Ho;Ryu, Jae-Hwan;Lee, Byeong-Hyeon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.142-148
    • /
    • 2016
  • Recently, human identification using various biological signals has been studied and human identification based on the gait has been actively studied. In this paper, we propose a human identification based on the EMG(Electromyography) signal of the thigh muscles that are used when walking. Various features such as RMS, MAV, VAR, WAMP, ZC, SSC, IEMG, MMAV1, MMAV2, MAVSLP, SSI, WL are extracted from EMG signal data and ANN(Artificial Neural Network) classifier is used for human identification. When we evaluated the recognition ratio per channel and features to select approptiate channels and features for human identification. The experimental results show that the rectus femoris, semitendinous, vastus lateralis are appropriate muscles for human identification and MAV, ZC, IEMG, MMAV1, MAVSLP are adaptable features for human identification. Experimental results also show that the average recognition ratio of method of using all channels and features is 99.7% and that of using selected 3 channels and 5 features is 96%. Therefore, we confirm that the EMG signal can be applied to gait based human identification and EMG signal based human identification using small number of adaptive muscles and features shows good performance.

An Algorithm for Filtering False Minutiae in Fingerprint Recognition and its Performance Evaluation (지문의 의사 특징점 제거 알고리즘 및 성능 분석)

  • Yang, Ji-Seong;An, Do-Seong;Kim, Hak-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.3
    • /
    • pp.12-26
    • /
    • 2000
  • In this paper, we propose a post-processing algorithm to remove false minutiae which decrease the overall performance of an automatic fingerprint identification system by increasing computational complexity, FAR(False Acceptance Rate), and FRR(False Rejection Rate) in matching process. The proposed algorithm extracts candidate minutiae from thinned fingerprint image. Considering characteristics of the thinned fingerprint image, the algorithm selects the minutiae that may be false and located in recoverable area. If the area where the selected minutiae reside is thinned incorrectly due to noise and loss of information, the algorithm recovers the area and the selected minutiae are removed from the candidate minutiae list. By examining the ridge pattern of the block where the candidate minutiae are found, true minutiae are recovered and in contrast, false minutiae are filtered out. In an experiment, Fingerprint images from NIST special database 14 are tested and the result shows that the proposed algorithm reduces the false minutiae extraction rate remarkably and increases the overall performance of an automatic fingerprint identification system.

  • PDF

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.