biometric security
Recently Published Documents


TOTAL DOCUMENTS

242
(FIVE YEARS 56)

H-INDEX

14
(FIVE YEARS 2)

Author(s):  
Snigdha Srivastva ◽  
Yashika Kalra ◽  
Akshay Chavan ◽  
Gaurav Jagtap

Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 1056-1069
Author(s):  
Mohammed Iqbal Dohan ◽  
Nora Ahmed Mohammed ◽  
Mohammed Rajeh Mohammed

Digital imaging has significantly influenced the outcome of research in various disciplines. For example, artificial intelligence and robotics, biometric security, multimedia and image processing, etc. Technically, image processing and the Human Visual System (HVS) relies heavily on image enhancement to improve the content of the image. One of the biggest challenges in image processing is detail enhancement due to halo artefacts and gradient inversion artefacts at edges. It has been used to enhance the visual quality of an image. Most algorithms that used to enhance the detail of an image essentially depend on edge-preserving decomposition techniques. in general, the image consist of two major elements are a base layer and a detail layer, which extracted by edge-preserving decomposition algorithms. The detail layer is enhanced to improve the details of the generated image. we propose in this paper, a new model to preserve the sharp edges and achieve better visual quality than the existing norm-based algorithm to enhance the details of the image. Experiments show that the proposed method reduces the distortion at the edges. It improves the details of the generated image significantly.


Author(s):  
Hayam A. Abd El-Hameed ◽  
Noha Ramadan ◽  
Walid El-Shafai ◽  
Ashraf A. M. Khalaf ◽  
Hossam Eldin H. Ahmed ◽  
...  

2021 ◽  
Vol 11 (4) ◽  
pp. 3758-3768
Author(s):  
Tushar Sharma ◽  
Upinder Kaur

This paper presents the different biometric with their limitations and introduces their alternative in form of brain biometric, Breath biometrics, and Tongue biometrics. Brain biometric uses brain wave while breath biometric uses one’s breath and tongue biometric uses a tongue’s shape and variation to distinguish them and present a good alternative for the presently used biometric like fingerprint, iris recognition, face recognition.


Author(s):  
S. Sesha Vidhya ◽  
K.G. Shanthi ◽  
S. Keerthana ◽  
P. Nisha ◽  
H. Monisha ◽  
...  

2021 ◽  
pp. 154-165
Author(s):  
Pavel Lozhnikov ◽  
◽  
Samal Zhumazhanova ◽  

Existing asymmetric encryption algorithms involve the storage of a secret private key, authorized access to which, as a rule, is carried out upon presentation of a password. Passwords are vulnerable to social engineering and human factors. Combining biometric security techniques with cryptography is seen as a possible solution to this problem, but any biometric cryptosystem should be able to overcome the small differences that exist between two different implementations of the same biometric parameter. This is especially true for dynamic biometrics, when differences can be caused by a change in the psychophysiological state of the subject. The solution to the problems is the use of a system based on the "biometrics-code" converter, which is configured to issue a user key after presentation of his/her biometric image. In this case, the key is generated in advance in accordance with accepted standards without the use of biometric images. The work presents results on using thermal images of a user for reliable biometric authentication based on a neural network "biometrics-code" converter. Thermal images have recently been used as a new approach in biometric identification systems and are a special type of biometric images that allow us to solve the problem of both the authentication of the subject and the identification of his psychophysiological state. The advantages of thermal imaging are that this technology is now becoming available and mobile, allowing the user to be identified and authenticated in a non-contact and continuous manner. In this paper, an experiment was conducted to verify the images of thermograms of 84 subjects and the following indicators of erroneous decisions were obtained: EER = 0.85 % for users in the "normal"state.


2021 ◽  
Vol 8 ◽  
Author(s):  
Shivanand S. Gornale ◽  
Sathish Kumar ◽  
Abhijit Patil ◽  
Prakash S. Hiremath

Biometric security applications have been employed for providing a higher security in several access control systems during the past few years. The handwritten signature is the most widely accepted behavioral biometric trait for authenticating the documents like letters, contracts, wills, MOU’s, etc. for validation in day to day life. In this paper, a novel algorithm to detect gender of individuals based on the image of their handwritten signatures is proposed. The proposed work is based on the fusion of textural and statistical features extracted from the signature images. The LBP and HOG features represent the texture. The writer’s gender classification is carried out using machine learning techniques. The proposed technique is evaluated on own dataset of 4,790 signatures and realized an encouraging accuracy of 96.17, 98.72 and 100% for k-NN, decision tree and Support Vector Machine classifiers, respectively. The proposed method is expected to be useful in design of efficient computer vision tools for authentication and forensic investigation of documents with handwritten signatures.


Author(s):  
Mrs. G. Ananthi ◽  
Dr. J. Raja Sekar ◽  
D. Apsara ◽  
A. K. Gajalakshmi ◽  
S. Tapthi

Palm print identification has been used in various applications in several years. Various methods have been proposed for providing biometric security through palm print authentication. One such a method was feature level fusion which used multiple feature extraction and gives higher accuracy. But it needed to design a new matcher and acquired many training samples. However, it cannot adapt to scenarios like multimodal biometric, regional fusion, contactless and complete direction representation. This problem will be overcome by score level fusion method. In this article, we propose a salient and discriminative descriptor learning method (SDDLM) and gray-level co-occurrence matrix (GLCM).The score values of SDDLM and GLCM are integrated using score level fusion to provide enhanced score. Experiments were conducted on IITD palm print V1 database. The combination of SDDLM AND GLCM methods will be useful in achieving higher performance. It provides good recognition rate and reduces computation burden.


Sign in / Sign up

Export Citation Format

Share Document