scholarly journals Biometric Technologies in Recognition Systems: A Survey

2019 ◽  
Vol 24 (6) ◽  
pp. 132
Author(s):  
Shihab A. Shawkat1 ◽  
Raya N. Ismail2

The ability to recognize people uniquely and to associate personal attributes such as name and nationality with them has been very important to the fabric of human society. Nowadays, modern societies have an explosion in population growth and increased mobility which necessitated building advanced identity management systems for recording and maintaining people’s identities. In the last decades, biometrics has played an important role in recognizing people instead of traditional ways such as passwords and keys which can be forgotten or be stolen. Biometric systems employ physiological and/or behavioral characteristics of people to verify their identities. There are different biometric modalities that can be used to recognize people such as fingerprints, face, hand geometry, voice, iris, signature, etc. In this paper, a comprehensive overview have been provided on the major issues of biometric systems including general biometric system architecture, major biometric traits, biometric systems performance, and some relevant works.   http://dx.doi.org/10.25130/tjps.24.2019.120

Author(s):  
Dakshina Ranjan Kisku ◽  
Phalguni Gupta ◽  
Jamuna Kanta Sing

Biometric systems are considered as human pattern recognition systems that can be used for individual identification and verification. The decision on the authenticity is done with the help of some specific measurable physiological or behavioral characteristics possessed by the individuals. Robust architecture of any biometric system provides very good performance of the system against rotation, translation, scaling effect and deformation of the image on the image plane. Further, there is a need of development of real-time biometric system. There exist many graph matching techniques used to design robust and real-time biometrics systems. This chapter discusses different types of graph matching techniques that have been successfully used in different biometric traits.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 591
Author(s):  
Yue Sun ◽  
Lu Leng ◽  
Zhe Jin ◽  
Byung-Gyu Kim

Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods.


2021 ◽  
pp. 1-13
Author(s):  
Shikhar Tyagi ◽  
Bhavya Chawla ◽  
Rupav Jain ◽  
Smriti Srivastava

Single biometric modalities like facial features and vein patterns despite being reliable characteristics show limitations that restrict them from offering high performance and robustness. Multimodal biometric systems have gained interest due to their ability to overcome the inherent limitations of the underlying single biometric modalities and generally have been shown to improve the overall performance for identification and recognition purposes. This paper proposes highly accurate and robust multimodal biometric identification as well as recognition systems based on fusion of face and finger vein modalities. The feature extraction for both face and finger vein is carried out by exploiting deep convolutional neural networks. The fusion process involves combining the extracted relevant features from the two modalities at score level. The experimental results over all considered public databases show a significant improvement in terms of identification and recognition accuracy as well as equal error rates.


2021 ◽  
Vol 1 (3) ◽  
pp. 470-495
Author(s):  
Md Shopon ◽  
Sanjida Nasreen Tumpa ◽  
Yajurv Bhatia ◽  
K. N. Pavan Kumar ◽  
Marina L. Gavrilova

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.


Author(s):  
Zahid Akhtar

The demand for reliable and robust person recognition systems has expanded due to intense security requirements in today's highly intertwined network society. The advantages of biometrics over traditional security systems have triggered large-scale deployment of biometrics as an authentic technique to determine the identity of an individual. The prime objective of such methods is to assure that the systems are only accessed by genuine users. Since, biometric traits are overt, leading thus to a threat of them being captured, copied, and forged. Numerous techniques have been developed over the years for biometric spoofing and anti-spoofing. The goal of this chapter is to provide a comprehensive overview on works in the field of spoofing and anti-spoofing with special attention to three mainly accepted biometric traits (i.e., fingerprint, face and iris) and multimodal biometric systems. We also present the key challenges, major issues and point out some of the salient and useful research directions.


Author(s):  
Hunny Mehrotra ◽  
Pratyush Mishra ◽  
Phalguni Gupta

In today’s high-speed world, millions of transactions occur every minute. For these transactions, data need to be readily available for the genuine people who want to have access, and it must be kept securely from imposters. Some methods of establishing a person’s identity are broadly classified into: 1. Something You Know: These systems are known as knowledge-based systems. Here the person is granted access to the system using a piece of information like a password, PIN, or your mother’s maiden name. 2. Something You Have: These systems are known as token-based systems. Here a person needs a token like a card key, smartcard, or token (like a Secure ID card). 3. Something You Are: These systems are known as inherited systems like biometrics. This refers to the use of behavioral and physiological characteristics to measure the identity of an individual. The third method of authentication is preferred over token-based and knowledge-based methods, as it cannot be misplaced, forgotten, stolen, or hacked, unlike other approaches. Biometrics is considered as one of the most reliable techniques for data security and access control. Among the traits used are fingerprints, hand geometry, handwriting, and face, iris, retinal, vein, and voice recognition. Biometrics features are the information extracted from biometric samples which can be used for comparison. In cases of face recognition, the feature set comprises detected landmark points like eye-to-nose distance, and distance between two eye points. Various feature extraction methods have been proposed, for example, methods using neural networks, Gabor filtering, and genetic algorithms. Among these different methods, a class of methods based on statistical approaches has recently received wide attention. In cases of fingerprint identification, the feature set comprises location and orientation of ridge endings and bifurcations, known as a minutiae matching approach (Hong, Wan, & Jain, 1998). Most iris recognition systems extract iris features using a bank of filters of many scales and orientation in the whole iris region. Palmprint recognition, just like fingerprint identification, is based on aggregate information presented in finger ridge impression. Like fingerprint identification, three main categories of palm matching techniques are minutiae-based matching, correlation-based matching, and ridge-based matching. The feature set for various traits may differ depending upon the extraction mechanism used. The system that uses a single trait for authenticity veri- fication is called unimodal biometric system. A unimodal biometric system (Ross & Jain, 2003) consists of three major modules: sensor module, feature extraction module, and matching module. However, even the best biometric traits face numerous problems like non-universality, susceptibility to biometric spoofing, and noisy input. Multimodal biometrics provides a solution to the above mentioned problems. A multimodal biometric system uses multiple sensors for data acquisition. This allows capturing multiple samples of a single biometric trait (called multi-sample biometrics) and/or samples of multiple biometric traits (called multi-source or multimodal biometrics). This approach also enables a user who does not possess a particular biometric identifier to still enroll and authenticate using other traits, thus eliminating the enrollment problems. Such systems, known as multimodal biometric systems (Tolba & Rezq, 2000), are expected to be more reliable due to the presence of multiple pieces of evidence. A good fusion technique is required to fuse information for such biometric systems.


Physiological or behavioral characteristics of a person being identified or verified using biometric systems. The preprocessing block has the fir filter in which enhanced energy-efficiency has been obtained by introducing the low power architectures within it. The implementation of low power architectures in the fir filter part will further provide the optimization in the various parameters such as power, area and timing. Therefore, this will help us to do the biometrics process faster and efficient.


2016 ◽  
Vol 13 (2) ◽  
pp. 313-334
Author(s):  
Bojan Jovanovic ◽  
Ivan Milenkovic ◽  
Marija Bogicevic-Sretenovic ◽  
Dejan Simic

Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Yuheng Guo

COVID-19 has had an inevitable impact on the daily life of people in 2020. Changes in behavior such as wearing masks have a considerable impact on biometric systems, especially face recognition systems. When people are aware of this impact, a comprehensive evaluation of this phenomenon is lacking. The purpose of this paper is to qualitatively evaluate the impact of COVID-19 on various biometric systems and to quantitatively evaluate face detection and recognition. The experimental results show that a real-world masked face dataset is essential to build an effective face recognition-based biometric system.


Author(s):  
V. Jagan Naveen ◽  
K. Krishna Kishore ◽  
P. Rajesh Kumar

In the modern world, human recognition systems play an important role to   improve security by reducing chances of evasion. Human ear is used for person identification .In the Empirical study on research on human ear, 10000 images are taken to find the uniqueness of the ear. Ear based system is one of the few biometric systems which can provides stable characteristics over the age. In this paper, ear images are taken from mathematical analysis of images (AMI) ear data base and the analysis is done on ear pattern recognition based on the Expectation maximization algorithm and k means algorithm.  Pattern of ears affected with different types of noises are recognized based on Principle component analysis (PCA) algorithm.


Sign in / Sign up

Export Citation Format

Share Document