scholarly journals Cross Models for Twin Recognition

2016 ◽  
Vol 8 (4) ◽  
pp. 26-36 ◽  
Author(s):  
Datong Gu ◽  
Minh Nguyen ◽  
Weiqi Yan

Nowadays, Biometrics has become a popular tool in personal identification as it can use physiological or behavioral characteristics to identify individuals. Recent advances in information technology has increased the accuracy of biometric to another level, there is still a slew of problems existed, such as complex environment, aging and unique problems. Among many classes of identifications, recognizing twins is one of the most difficult tasks as they resemble each other. This affects the use of biometrics in general cases and raises potential risks of biometrics in access control. In this paper, the authors manage to distinguish twins using four different models, namely, face recognition, ear recognition, voice recognition and lip movement recognition. Their results show that voice recognition has the best performance in twin recognition with 100% accuracy. This is much higher than that of face recognition and ear recognition (with 58% and 53% respectively); and lip movement recognition that yields 76% accuracy.

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 1046 ◽  
Author(s):  
Abeer D. Algarni ◽  
Ghada M. El Banby ◽  
Naglaa F. Soliman ◽  
Fathi E. Abd El-Samie ◽  
Abdullah M. Iliyasu

To circumvent problems associated with dependence on traditional security systems on passwords, Personal Identification Numbers (PINs) and tokens, modern security systems adopt biometric traits that are inimitable to each individual for identification and verification. This study presents two different frameworks for secure person identification using cancellable face recognition (CFR) schemes. Exploiting its ability to guarantee irrevocability and rich diversity, both frameworks utilise Random Projection (RP) to encrypt the biometric traits. In the first framework, a hybrid structure combining Intuitionistic Fuzzy Logic (IFL) with RP is used to accomplish full distortion and encryption of the original biometric traits to be saved in the database, which helps to prevent unauthorised access of the biometric data. The framework involves transformation of spatial-domain greyscale pixel information to a fuzzy domain where the original biometric images are disfigured and further distorted via random projections that generate the final cancellable traits. In the second framework, cancellable biometric traits are similarly generated via homomorphic transforms that use random projections to encrypt the reflectance components of the biometric traits. Here, the use of reflectance properties is motivated by its ability to retain most image details, while the guarantee of the non-invertibility of the cancellable biometric traits supports the rationale behind our utilisation of another RP stage in both frameworks, since independent outcomes of both the IFL stage and the reflectance component of the homomorphic transform are not enough to recover the original biometric trait. Our CFR schemes are validated on different datasets that exhibit properties expected in actual application settings such as varying backgrounds, lightings, and motion. Outcomes in terms standard metrics, including structural similarity index metric (SSIM) and area under the receiver operating characteristic curve (AROC), suggest the efficacy of our proposed schemes across many applications that require person identification and verification.


1994 ◽  
Vol 78 (1) ◽  
pp. 304-306 ◽  
Author(s):  
Gregory W. Z. Brachacki ◽  
Angela J. Fawcett ◽  
Roderick I. Nicolson

A group of 7 dyslexic students and 8 nondyslexic students matched for age and IQ were tested on recognition of computer-presented voices and faces. Although face recognition showed a ceiling effect which prevented any solid conclusions being drawn from this task, the dyslexic group were significantly impaired on the recognition of voices.


Face is the easiest way to penetrate each other's personal identity. Face recognition is a method of personal identification using the personal characteristics of an individual to decide the identification of a person. The method of human face recognition consists basically of two levels, namely face detection and face recognition. There are three types of methods that are currently popular in the developed face recognition pattern, those are Eigen faces algorithm, Fisher faces algorithm and CNN neural network for face recognition


Author(s):  
Mohamed Tayeb Laskri ◽  
Djallel Chefrour

International audience Although human face recognition is a hard topic due to many parameters involved (e.g. variability of the position, lighting, hairstyle, existence of glasses, beard, moustaches, wrinkles...), it becomes of increasing interest in numerous application fields (personal identification, video watch, man machine interfaces...). In this work, we present WHO_IS, a system for person identification based on face recognition. A geometric model of the face is definedfrom a set of characteristic points which are extracted from the face image. The identification consists in calculating the K nearest neighbors of the individual test by using the City-Block distance. The system is tested on a sample of 100 people with a success rate of 86 %. Bien que la reconnaissance des visages humains soit un domaine difficile à cause de la multitude des paramètres qu'il faut prendre en compte (variation de posture, éclairage, style de coiffure, port de lunettes, de barbes, de moustaches, vieillesse…), il est très important de s'en intéresser vu les nombreux champs d'applications (vérification de personnes, télésurveillance, interfaces homme-machine …). Dans ce travail nous présentons la mise en œuvre de WHO_IS, un système d'identification de personnes par reconnaissance des visages humains. Nous avons développé un modèle géométrique du visage basé sur un ensemble de points caractéristiques extraits à partir de l'image du visage. La procédure d'identification consiste à calculer les K plus proches voisins de l'individu test dans le sens de la distance City-Block. Le système WHO_IS a été testé sur un échantillon de 100 personnes. Un taux de reconnaissance correcte de 86% a été obtenu


Author(s):  
Henny Hendarti ◽  
Maryani Maryani

The purpose of this paper is to measure risks to identify company's assets and analyze risks, and to do strategic planning of security protection and minimize risk. Research used case study by reading materials dealing with the OCTAVE-S method. Observation was done directly to the relating parties through an interview, as well as using a questionnaire based on the OCTAVE-S method. The result obtained from this research is risk management of information technology in order to minimize the risks. Based on the findings obtained, it is expected company can identify potential risks and mitigate them efficiently and effectively.


Now a day, in every single person households it is important to check regularly regarding their safety. Especially for elderly people it is mandatory, because they have become a target for certain burglars which leads to higher accidents/robberies in almost all the areas. To decrease the risk of such unwanted happenings in living space for single-person households, the hybrid security system should be adopted. The automatic personal identification has become the popular instead of using passwords or pattern in this days. This paper addresses the development of a face recognition technique for the above mentioned purpose.


2019 ◽  
Vol 295 ◽  
pp. 01006
Author(s):  
Jingfeng Wang ◽  
Guang Liu ◽  
Zhaodong Ding ◽  
Hanbing Bian ◽  
Huayan Yao

China is currently at an important stage of urbanization. In recent years, the number and scale of under-lake tunnels in southern cities of China are growing consistently, which brings opportunities and challenges in intelligent construction and operation maintenance. Due to the long length of the under-lake tunnel, the large volume of concrete to be cast, the complex environment of the buried section and the underground environment of the lake bottom, the hydration heat and stress crack have been the main challenges of the under-lake tunnel engineering in crack control and waterproofing aspect. Simultaneously, with the development of big data, intelligent construction, information technology, and other techniques, these techniques are gradually applied to the whole life cycle of tunnel engineering including survey, design, construction, operation, and maintenance. The construction of the lake tunnel project is setting off a new round of technological innovation. This paper systematically summarizes the technical breakthroughs and application of technologies such as intelligent construction and information technology in the construction of under-lake tunnels in China, and puts forward reasonable suggestions on the key technologies of intelligent construction and operation maintenance for urban under-lake tunnel engineering.


Sign in / Sign up

Export Citation Format

Share Document