Individual Identification from Video Based on "Behavioural Biometrics"

Author(s):  
Y. Pratheepan ◽  
J.V. Condell ◽  
G. Prasad

This chapter presents multiple methods for recognizing individuals from their “style of action/actions,” that is, “biometric behavioural characteristics.” Two forms of human recognition can be useful: the determination that an object is from the class of humans (which is called human detection), and the determination that an object is a particular individual from this class (which is called individual recognition). This chapter focuses on the latter problem. For individual recognition, this chapter considers two different categories. First, individual recognition using “style of single action,” that is, hand waving and partial gait, and second, individual recognition using “style of doing similar actions” in video sequences. The “style of single action” and “style of doing similar actions,” that is, behavioural biometric characteristics, are proposed as a cue to discriminate between two individuals. Nowadays, multibiometric security systems are available to recognise individuals from video sequences. Those multibiometric systems are combined with finger print, face, voice, and iris biometrics. This chapter reports multiple novel behavioural biometric techniques for individual recognition based on “style of single action” and “style of multiple actions” (i.e., analysing the pattern history of behavioural biometric motion), which can be additionally combined with finger print, face, voice, and iris biometrics as a complementary cue to intelligent security systems.

Information ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 361
Author(s):  
Handan Hou ◽  
Wei Shi ◽  
Jinyan Guo ◽  
Zhe Zhang ◽  
Weizheng Shen ◽  
...  

Individual identification of dairy cows based on computer vision technology shows strong performance and practicality. Accurate identification of each dairy cow is the prerequisite of artificial intelligence technology applied in smart animal husbandry. While the rump of each dairy cow also has lots of important features, so do the back and head, which are also important for individual recognition. In this paper, we propose a non-contact cow rump identification method based on convolutional neural networks. First, the rump image sequences of the cows while feeding were collected. Then, an object detection model was applied to detect the cow rump object in each frame of image. Finally, a fine-tuned convolutional neural network model was trained to identify cow rumps. An image dataset containing 195 different cows was created to validate the proposed method. The method achieved an identification accuracy of 99.76%, which showed a better performance compared to other related methods and a good potential in the actual production environment of cow husbandry, and the model is light enough to be deployed in an edge-computing device.


2021 ◽  
Vol VII (1) ◽  
pp. 61-76
Author(s):  
Ashley Hlebinsky

In 1953, Ruger released a single-action revolver—patterned after the original Colt Single Action Army. Whilst some changes had been made, this firearm possessed, for all intents and purposes, the handling characteristics of the original Colt design. As a result, the safety precaution was as per the original: the revolver should be loaded with five rounds, rather than six, and the hammer positioned such that it rested over an empty chamber. Despite outlining the recommended carry methods in their instruction manual, Ruger became the subject of product liability lawsuits from purchasers who incorrectly loaded and carried the firearm, resulting in negligent discharges. This article explores the history of Colt-type single-action revolvers in the post-World War II period, analyses the availability of historic mechanical safety mechanisms for double-action revolvers in the 19th and 20th centuries, and summarises the patents on single-action safeties that Ruger had received by 1973. That year, the company discontinued their initial line of Single Action Army-style revolvers—known as ‘Old Models’—for a visibly similar, but mechanically different, ‘New Model’ line of single-action revolvers featuring newly developed safety mechanisms.


Author(s):  
Mark Thomas ◽  
Paul Johnson

This chapter focuses on one fundamental aspects of an ageing population — how to pay for old age, individually and collectively. It also presents a study of the history of old age support in the UK and US and concludes that despite the quite different beginnings of the public pension and social security systems, government policy in both countries has become similarly locked in to a set of institutional arrangements which were devised to respond to immediate social and economic problems, but which have acquired a rationale and a dynamic of their own.


Author(s):  
Swati Nigam ◽  
Rajiv Singh ◽  
A. K. Misra

Computer vision techniques are capable of detecting human behavior from video sequences. Several state-of-the-art techniques have been proposed for human behavior detection and analysis. However, a collective framework is always required for intelligent human behavior analysis. Therefore, in this chapter, the authors provide a comprehensive understanding towards human behavior detection approaches. The framework of this chapter is based on human detection, human tracking, and human activity recognition, as these are the basic steps of human behavior detection process. The authors provide a detailed discussion over the human behavior detection framework and discuss the feature-descriptor-based approach. Furthermore, they have provided qualitative and quantitative analysis for the detection framework and demonstrate the results for human detection, human tracking, and human activity recognition.


2008 ◽  
Vol 50 (4) ◽  
pp. 981-1009 ◽  
Author(s):  
Larry Frohman

While the 1834 New Poor Law and the controversies over its reform represent one of the central threads in every narrative of the history of modern Britain, the same can hardly be said of the German poor laws, whose history is far less known. This is due in large part to a historiographical tradition that sees the Bismarckian social insurance programs as the fons et origo of the German welfare state and thus marginalizes all forms of social assistance that can not be neatly fitted into the narrative pre-history or subsequent development of these programs. This contrasts with a British tradition where, as E. P. Hennock has recently argued, national insurance was primarily conceived as a means of poor law reform, and where the poor laws figure prominently in the historiography of the welfare state. On the other hand, this insurance-centered approach to the welfare state is not entirely to blame because, for their part, historians of poor relief have not been able to establish any positive connections between individualized, subsidiary, deterrent relief and social insurance or social security systems based on rights deriving from either contributions or citizenship.


2021 ◽  
Author(s):  
Kezia Bowmaker-Falconer ◽  
Andrea Thiebault ◽  
Maelle Connan ◽  
Thierry Aubin ◽  
Isabelle Charrier ◽  
...  

Vocalisations play a vital role in animal communication, as they are involved in many biological functions. Seabirds often breed in large and dense colonies, making successful recognition between mates or between parents-and offspring crucial for reproductive success. Most seabird species, including Cape gannets (Morus capensis), are monomorphic and likely rely on acoustic signals for mate selection and mate recognition. This study aimed to better understand the use of vocalisations for sex and individual recognition in Cape gannets by describing the acoustic structure of their display calls at the nest. Vocalisations of nesting Cape gannets were recorded and acoustic measurements were extracted in both temporal and frequency domains. Values of the fundamental frequency and the average of Inter-Onset-Interval appeared to be the most important acoustic variables for sex determination. Both temporal and frequency parameters showed a potential for individual identity coding, with the average units Inter-Onset-Interval being the most important variable for individual identification for both sexes. This study provides the first evidence of sex-specific and individual vocal signatures in adult breeding Cape gannets. From an applied perspective, identified sex specific differences could potentially be used as a non-invasive method for field-based sex-determination in research and monitoring projects on Cape gannets.


2021 ◽  
Vol 12 (1) ◽  
pp. 41
Author(s):  
I Made Aris Satia Widiatmika ◽  
I Nyoman Piarsa ◽  
Arida Ferti Syafiandini

Individual recognition using biometric technology can be utilized in creating security systems that are important in modern life. The individuals recognition in hospitals generally done by conventional system so it makes more time in taking identity. A newborn baby will proceed an identity tagging after birth process is complete. This identity using a bracelet filled with names and ink stamps on paper that will be prone to damage or crime. The solution is to store the baby's identity data digitally and carry out the baby's identification process. This system can increase safety and efficiency in storing a baby's footprint image. The implementation of baby's footprint image identification starting from the acquisition of baby's footprint image, preprocessing such as selecting ROI size baby's footprint object, feature extraction using wavelet method and classification process using K-Nearest Neighbor (K-NN) method because this method has been widely used in several studies of biometric identification systems. The test data came from 30 classes with 180 images test right and left baby's footprint. The identification results using 200x500 size ROI with level 4 wavelet decomposition get recognition results with an accuracy of 99.30%, 90.17% precision, and 89.44% recall with a test computation time of 8.0370 seconds.  


2021 ◽  
Vol 3 ◽  
pp. 22-27
Author(s):  
A. Krotov ◽  
◽  
A. Morozov ◽  
S. Sokolov ◽  
◽  
...  

The formation and development fragment of history of human-machine interaction in the operator – central observation panel system of the Non-departmental Security Service of the Federal National Guard Troops Service in terms of technological progress relationship with the formation of human experience and the world picture based on it is considered in the article.


Author(s):  
Simon Szreter

From 1538 the new Protestant church of Henry VIII provided a system of registration of baptisms, marriages, and burials in all parishes of England and Wales. This chapter re-examines the original motives behind the creation of this system, and explores the reasons for its effectiveness and persistence over the ensuing three centuries in Britain by surveying the comparative history of identity registration systems among the British overseas in the early modern period. A review of the variety of measures for registration set up in the North American and Caribbean colonies during the course of the seventeenth century confirms the importance of the security of property-holding in an increasingly commercial world as a motive for creating such systems. However, this review also indicates the importance of whether or not effective social security systems, giving entitlements to relief, accompanied these early identity registration schemes.


Author(s):  
Alexander Terentyev ◽  
Yevhenii Gorbatyuk ◽  
Tamara Lyashchenko ◽  
Oleh Kuzminskyi

Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, which have their pros and cons. To overcome the shortcomings of the traditional firewall, a new generation of firewalls is introduced. The article presents the study of traditional firewalls and their evolution to a new generation firewall and its benefits. New firewalls still belong to the third generation, but are often referred to as the "next generation" or NGFW. This type combines all previously used approaches with an in-depth review of filtered content and its comparison with a database to identify potentially dangerous traffic. Modern firewalls often have built-in additional security systems: virtual private networks (VPNs), intrusion prevention and detection systems (IPS / IDS), authentication management, application management, and web filtering. Their state-of-the-art technology can filter outbound traffic. This helps reduce the likelihood of data theft by attackers. In addition, an important function of the firewall is to reduce the risk of devices becoming part of a botnet (a malicious network with a large group of devices controlled by cybercriminals).


Sign in / Sign up

Export Citation Format

Share Document