Possibilities of Applying the Triangulation Method in the Biometric Identification Process

Author(s):  
Muzafer Saračevič ◽  
Mohamed Elhoseny ◽  
Aybeyan Selimi ◽  
Zoran Lončeravič
2021 ◽  
Vol 5 (4) ◽  
pp. 420
Author(s):  
Budi Tri Utomo ◽  
Iskandar Fitri ◽  
Eri Mardiani

In the era of big data, the biometric identification process is growing very fast and is increasingly being implemented in many applications. Face recognition technology utilizes artificial intelligence (AI) to recognize faces that are already stored in the database. In this research, it is proposed to design an online academic login system at the National University using real time face recognition used OpenCV with the Local Binary Pattern Histogram algorithm and the Haar Cassade Classification method. The system will detect, recognize and compare faces with the stored face database. The image used is 480 x 680 pixels with a .jpg extension in the form of an RGB image which will be converted into a Grayscale image., to make it easier to calculate the histogram value of each face that will be recognized. With a modeling system like this it is hope to make it easy for user to log into online academics.Keywords:Face Recognition, Haar Cascade Clasifier, Local Binary Pattern Histogram, Online Akademic, OpenCV. 


Author(s):  
G. R. Petrosyan ◽  
L. A. Ter-Vardanyan ◽  
A. V. Gaboutchian

In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The main objective of this paper is to introduce the fundamental concepts of Petri Nets to the researchers and practitioners, both from identification systems, who are involved in the work in the areas of modelling and analysis of biometric identification types of systems, as well as those who may potentially be involved in these areas. In addition, the paper introduces high-level Petri Nets, as Colored Petri Nets (CPN). In this paper the model of Colored Petri Net describes the identification process much simpler.


2018 ◽  
Vol 1 (2) ◽  
pp. 34-44
Author(s):  
Faris E Mohammed ◽  
Dr. Eman M ALdaidamony ◽  
Prof. A. M Raid

Individual identification process is a very significant process that resides a large portion of day by day usages. Identification process is appropriate in work place, private zones, banks …etc. Individuals are rich subject having many characteristics that can be used for recognition purpose such as finger vein, iris, face …etc. Finger vein and iris key-points are considered as one of the most talented biometric authentication techniques for its security and convenience. SIFT is new and talented technique for pattern recognition. However, some shortages exist in many related techniques, such as difficulty of feature loss, feature key extraction, and noise point introduction. In this manuscript a new technique named SIFT-based iris and SIFT-based finger vein identification with normalization and enhancement is proposed for achieving better performance. In evaluation with other SIFT-based iris or SIFT-based finger vein recognition algorithms, the suggested technique can overcome the difficulties of tremendous key-point extraction and exclude the noise points without feature loss. Experimental results demonstrate that the normalization and improvement steps are critical for SIFT-based recognition for iris and finger vein , and the proposed technique can accomplish satisfactory recognition performance. Keywords: SIFT, Iris Recognition, Finger Vein identification and Biometric Systems.   © 2018 JASET, International Scholars and Researchers Association    


Author(s):  
A.A. Astapov ◽  
◽  
D.V. Davydov ◽  
A.I. Egorov ◽  
D.V. Drozdov ◽  
...  

2020 ◽  
Author(s):  
Camille Butera

This paper intends to provide a basic primer on de-identifying and anonymizing techniques, with a focus on protecting the identities of subjects belonging to marginalized groups, without erasing them from the data. The primer presents basic de-identification terminology, an annotated bibliography, and a collection of software and programs that can be employed in the de-identification process. Researchers should be aware they must use their discretion to weigh the usability of data against protection of subjects.


Sign in / Sign up

Export Citation Format

Share Document