Two-Directional PCA/LDA

Author(s):  
David Zhang ◽  
Xiao-Yuan Jing ◽  
Jian Yang

This chapter introduces a two-directional PCA/LDA approach that is a useful statistical technique applied to biometric authentication. We first describe both bi-directional PCA (BDPCA) and BDPCA plus LDA. Then, some basic models and definitions related to two-directional PCA/LDA approach are given. Next, we discuss two-directional PCA plus LDA. And, finally, the experimental results and chapter summary are given.

Author(s):  
David Zhang ◽  
Xiao-Yuan Jing ◽  
Jian Yang

This chapter introduces a complete kernel Fisher discriminant analysis (KFD) that is a useful statistical technique applied to biometric application. We first describe theoretical perspective of KPCA. Then, a new KFD algorithm framework, KPCA plus LDA, is given. Afterwards, we discuss the complete KFD algorithm. Finally, the experimental results and chapter summary are given.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Robertas Damaševičius ◽  
Rytis Maskeliūnas ◽  
Egidijus Kazanavičius ◽  
Marcin Woźniak

Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.


Author(s):  
Qurban A Memon

As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Moreover, most of the financial institutions such as banks, etc. enforce two or three step access into their corporate data to enforce security. However, personal devices currently do not support similar applications or way of enforcing multilayered access to its different domains/regions of data. In this paper, a multilayered multimodal biometric approach using three biometric methods (such as finger print, face and voice) is proposed for smartphones. It is shown that fusion of biometric methods can be layered to enforce secured access to private data on smartphone. The experimental results are presented.


2013 ◽  
Vol 717 ◽  
pp. 826-831
Author(s):  
K. Inthavisas ◽  
N. Sungprasert

A recent work utilized a transformation function to protect a DTW template. Unfortunately, a matching template was not protected properly. In this paper, we first show that an adversary can exploit the matching template to gain access to the system. Then, we introduce our scheme to address this problem. For this scheme, a hardened template is utilized to protect the DTW template. For the matching template, it is protected by a cryptographic framework. We evaluate the system with a public database: the MIT mobile device speaker verification corpus. The experimental results show that our scheme outperforms the other approaches.


1988 ◽  
Vol 102 ◽  
pp. 357-360
Author(s):  
J.C. Gauthier ◽  
J.P. Geindre ◽  
P. Monier ◽  
C. Chenais-Popovics ◽  
N. Tragin ◽  
...  

AbstractIn order to achieve a nickel-like X ray laser scheme we need a tool to determine the parameters which characterise the high-Z plasma. The aim of this work is to study gold laser plasmas and to compare experimental results to a collisional-radiative model which describes nickel-like ions. The electronic temperature and density are measured by the emission of an aluminium tracer. They are compared to the predictions of the nickel-like model for pure gold. The results show that the density and temperature can be estimated in a pure gold plasma.


Author(s):  
Y. Harada ◽  
T. Goto ◽  
H. Koike ◽  
T. Someya

Since phase contrasts of STEM images, that is, Fresnel diffraction fringes or lattice images, manifest themselves in field emission scanning microscopy, the mechanism for image formation in the STEM mode has been investigated and compared with that in CTEM mode, resulting in the theory of reciprocity. It reveals that contrast in STEM images exhibits the same properties as contrast in CTEM images. However, it appears that the validity of the reciprocity theory, especially on the details of phase contrast, has not yet been fully proven by the experiments. In this work, we shall investigate the phase contrast images obtained in both the STEM and CTEM modes of a field emission microscope (100kV), and evaluate the validity of the reciprocity theory by comparing the experimental results.


Author(s):  
A. Ourmazd ◽  
G.R. Booker ◽  
C.J. Humphreys

A (111) phosphorus-doped Si specimen, thinned to give a TEM foil of thickness ∼ 150nm, contained a dislocation network lying on the (111) plane. The dislocation lines were along the three <211> directions and their total Burgers vectors,ḇt, were of the type , each dislocation being of edge character. TEM examination under proper weak-beam conditions seemed initially to show the standard contrast behaviour for such dislocations, indicating some dislocation segments were undissociated (contrast A), while other segments were dissociated to give two Shockley partials separated by approximately 6nm (contrast B) . A more detailed examination, however, revealed that some segments exhibited a third and anomalous contrast behaviour (contrast C), interpreted here as being due to a new dissociation not previously reported. Experimental results obtained for a dislocation along [211] with for the six <220> type reflections using (g,5g) weak-beam conditions are summarised in the table below, together with the relevant values.


Author(s):  
Scott Lordi

Vicinal Si (001) surfaces are interesting because they are good substrates for the growth of III-V semiconductors. Spots in RHEED patterns from vicinal surfaces are split due to scattering from ordered step arrays and this splitting can be used to determine the misorientation angle, using kinematic arguments. Kinematic theory is generally regarded to be inadequate for the calculation of RHEED intensities; however, only a few dynamical RHEED simulations have been attempted for vicinal surfaces. The multislice formulation of Cowley and Moodie with a recently developed edge patching method was used to calculate RHEED patterns from vicinal Si (001) surfaces. The calculated patterns are qualitatively similar to published experimental results and the positions of the split spots quantitatively agree with kinematic calculations.RHEED patterns were calculated for unreconstructed (bulk terminated) Si (001) surfaces misoriented towards [110] ,with an energy of 15 keV, at an incident angle of 36.63 mrad ([004] bragg condition), and a beam azimuth of [110] (perpendicular to the step edges) and the incident beam pointed down the step staircase.


Sign in / Sign up

Export Citation Format

Share Document