Biometrics

Author(s):  
Muzhir Shaban Al-Ani

It is important to know that absolute security does not exist, and the main goal of the security system is to reach an optimal approach that satisfies the customer requirements. Biometrics is a small part of the security system that aims to replace a traditional password or a key. Biometrics offer higher security levels by simply ensuring that only the authorized people have access to sensitive data. It is easy to copy or get a traditional password using different methods (legal or illegal), but it is difficult to copy a key of biometric pattern such as iris or fingerprint or other patterns. Recent years have seen a boom in the use of biometric techniques in the design of modern equipment to maintain the information and personal identification. This chapter focuses on biometrics (types and technologies), personal identification, and specifications, and then how to implement these performances in security. Finally, a future aspect of merging technologies and disciplines is a good issue to treat via a specific concentration of information technology. In this chapter, two approached are proposed: a novel thinning algorithm for fingerprint recognition and a novel e-passport based on personal identification.

Author(s):  
Mariya Nazarkevych ◽  
Serhii Dmytruk ◽  
Volodymyr Hrytsyk ◽  
Olha Vozna ◽  
Anzhela Kuza ◽  
...  

Background: Systems of the Internet of Things are actively implementing biometric systems. For fast and high-quality recognition in sensory biometric control and management systems, skeletonization methods are used at the stage of fingerprint recognition. The analysis of the known skeletonization methods of Zhang-Suen, Hilditch, Ateb-Gabor with the wave skeletonization method has been carried out and it shows a good time and qualitative recognition results. Methods: The methods of Zhang-Suen, Hildich and thinning algorithm based on Ateb-Gabor filtration, which form the skeletons of biometric fingerprint images, are considered. The proposed thinning algorithm based on Ateb-Gabor filtration showed better efficiency because it is based on the best type of filtering, which is both a combination of the classic Gabor function and the harmonic Ateb function. The combination of this type of filtration makes it possible to more accurately form the surroundings where the skeleton is formed. Results: Along with the known ones, a new Ateb-Gabor filtering algorithm with the wave skeletonization method has been developed, the recognition results of which have better quality, which allows to increase the recognition quality from 3 to 10%. Conclusion: The Zhang-Suen algorithm is a 2-way algorithm, so for each iteration, it performs two sets of checks during which pixels are removed from the image. Zhang-Suen's algorithm works on a plot of black pixels with eight neighbors. This means that the pixels found along the edges of the image are not analyzed. Hilditch thinning algorithm occurs in several passages, where the algorithm checks all pixels and decides whether to replace a pixel from black to white if certain conditions are satisfied. This Ateb-Gabor filtering will provide better performance, as it allows to obtain more hollow shapes, organize a larger range of curves. Numerous experimental studies confirm the effectiveness of the proposed method.


2011 ◽  
Vol 271-273 ◽  
pp. 1509-1513 ◽  
Author(s):  
Mei Xiu Lu ◽  
Fu Rong Wang ◽  
Feng Li

Image thinning is one of important steps of fingerprint preprocessing. Most of fingerprint recognition algorithms checked the characteristic points on thinning image. In this paper, we discover some shortages in OPTA and mathematical morphology thinning algorithm and find out the reasons for some shortages such as many glitches and snags, defective thinning, and so on. A new improved algorithm is proposed in the paper, which is an ideal algorithm because it is faster, produces less glitch, and thins completely.


2005 ◽  
Vol 44 (5) ◽  
pp. 742 ◽  
Author(s):  
Yang-Hoi Doh ◽  
Jong-Soo Yoon ◽  
Kyung-Hyun Choi ◽  
Mohammad S. Alam

Author(s):  
Pin Shen Teh ◽  
Ning Zhang ◽  
Andrew Beng Jin Teoh ◽  
Ke Chen

Purpose The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices. Design/methodology/approach The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects. Findings The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length. Originality/value The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.


2016 ◽  
Vol 25 (07) ◽  
pp. 1650067 ◽  
Author(s):  
Álvaro Díaz ◽  
Javier González-Bayon ◽  
Pablo Sánchez

Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually related to power and execution time estimation. However, security is a feature that cannot be estimated and it is either “active” or “inactive”, with no possibility of introducing intermediate security levels. This lack of flexibility is a disadvantage in real deployments where different operation modes with different security and power specifications are often needed. This paper proposes including a new security estimation metric in a previously proposed framework for WSN simulation and embedded software (SW) performance analysis. This metric is called Security Estimation Metric (SEM) and it provides information about the security encryption used in WSN transmissions. Results show that the metric improves flexibility, granularity and execution time compared to other cryptographic tests.


2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


Author(s):  
Prof. C. S. More

In today’s world, face recognition is the type of biometric that is used in almost every field. This technology is used for security purposes and can be used in many verification and security system. Though it is less efficient than eyes recognition and fingerprint recognition, is still in market due to its untouchability and non-intrusive method. Besides, face recognition should also be utilized for attendance checking in schools, colleges, offices, etc. Face Recognition method pivot to build up a class attendance system which uses the idea of face recognition as present hand done attendance process is lethargic and not suitable to keep. And there are chances of too much proxy attendance. Thus, the want for this method is much needed. This method involves 4 stages- database introduction, face detection, face recognition, attendance updation. The database is made by taking the snap shots of the students in elegance. Face detection and popularity is done using python opencv. Attendance is to be exported at the end of semester.


2021 ◽  
Vol 14 (1) ◽  
pp. 24-29
Author(s):  
Gabriel Popan ◽  
Lorena Muscar ◽  
Lacrimioara Grama

Abstract The goal of this paper is to create a security system to identify a specific person who wants to access private information or enter a building using their voice. To perform this system, we identified a database containing the audio files of the users who will be able to authenticate with this system. Several steps were sequentially performed in order to extract the characteristics of the Mel Frequency Cepstral Coefficients from the audio files. Based on the k-Nearest Neighbor algorithm with an Euclidean distance and 4 neighbors, a training model was created. Through experimental results we prove in two ways, using confusion matrix and scatter plot, that the overall voice fingerprint recognition is 100%, for this particular configuration.


Sign in / Sign up

Export Citation Format

Share Document