scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Proceedings ArticleDOI
01 Jun 2000
TL;DR: This paper presents a novel approach to detect and estimate distortion occurring in fingerprint video streams, and directly works on MPEG-{1, 2} encoded fingerprint video bitstreams to estimate interfield flow without decompression, and uses flow characteristics to investigate temporal behaviour of the fingerprints.
Abstract: Distortions in fingerprint images arising from the elasticity of finger skin and the pressure and movement of fingers during image capture lead to great difficulties in establishing a match between multiple images acquired from a single finger. In a single fingerprint image depicting a finger at some given instant of time, it is difficult to get any distortion information. Further, static two-dimensional or three-dimensional (electronic) copies of fingerprints can be fabricated and used to spoof remote biometric security systems since the input required by the systems is not a function of time. This paper addresses these issues, by proposing the novel use of fingerprint video sequences to investigate and exploit dynamic behaviors manifested by fingers over time during image acquisition. In particular, we present a novel approach to detect and estimate distortion occurring in fingerprint video streams. Our approach directly works on MPEG-{1, 2} encoded fingerprint video bitstreams to estimate interfield flow without decompression, and uses flow characteristics to investigate temporal behaviour of the fingerprints. The joint temporal and motion analysis leads to a novel technique to detect and characterize distortion reliably. The proposed method has been tested on the NIST 24 database and the results are very promising.

45 citations

Proceedings ArticleDOI
26 May 2013
TL;DR: A novel method to detect the presence of fake iris patterns, such as designer contact lenses, during the image acquisition stage to further enhance the basic security value of iris biometrics.
Abstract: Iris recognition has gained popularity due to factors such as its perceived high accuracy, significant usability advantages attributed to its non-contact acquisition method, and the availability of low cost sensors due to improvements in technology. However, non-contact biometrics authentication systems are vulnerable to different types of attacks than contact-type biometrics, such as fingerprints, for which there are a number of simple techniques to guard against attacks. In particular, the fashion industry has developed designer contact lenses with patterns that range from a simple change in eye color to the imposition of stars or other festive decorations. As these lenses are readily available and can be personalized at a very affordable price, their use in thwarting or spoofing iris-based authentication systems becomes plausible. Given the high security nature of many of these systems, there is a urgent need for a some countermeasure to this type of attack. In this paper, we describe a novel method to detect the presence of fake iris patterns, such as designer contact lenses, during the image acquisition stage to further enhance the basic security value of iris biometrics. Exploiting the anatomy and geometry of the human eye, we present a structured light projection method to detect the presence of artificial items obscuring the real iris. The detection principle has been verified using an inexpensive experimental setup consisting of a miniature projector and an offset camera. We also describe a novel algorithm to process the acquired images to find patterned contact lenses, and measure its performance using data collected with our apparatus. We argue that the addition of the proposed system and algorithm to existing iris biometrics based authentication systems will significantly improve their security.

43 citations

Book ChapterDOI
01 Jun 2002
TL;DR: This work provides a formal definition of a minutia based on the gray scale image, which is constructive, in that, given aminutia image, the minutian location and orientation can be uniquely determined.
Abstract: The flow pattern of ridges in a fingerprint is unique to the person in that no two people with the same fingerprints have yet been found. Fingerprints have been in use in forensic applications for many years and, more recently, in computer-automated identification and authentication. For automated fingerprint image matching, a machine representation of a fingerprint image is often a set of minutiae in the print; a minimal, but fundamental, representation is just a set of ridge endings and bifurcations. Oddly, however, after all the years of using minutiae, a precise definition of minutiae has never been formulated. We provide a formal definition of a minutia based on the gray scale image. This definition is constructive, in that, given a minutia image, the minutia location and orientation can be uniquely determined.

41 citations

Proceedings ArticleDOI
17 Jun 2006
TL;DR: Accuracy can be significantly improved at the expense of few extra matches in the fingerprint verification procedure using a publicly available database and matcher and a Support Vector Machine (SVM)-based classifier.
Abstract: Most biometric verification techniques make decisions based solely on a score that represents the similarity of the query template with the reference template of the claimed identity stored in the database. When multiple templates are available, a fusion scheme can be designed using the similarities with these templates. Combining several templates to construct a composite template and selecting a set of useful templates has also been reported in addition to usual multi-classifier fusion methods when multiple matchers are available. These commonly adopted techniques rarely make use of the large number of non-matching templates in the database or training set. In this paper, we highlight the usefulness of such a fusion scheme while focusing on the problem of fingerprint verification. For each enrolled template, we identify its cohorts (similar fingerprints) based on a selection criterion. The similarity scores of the query template with the reference template and its cohorts from the database are used to make the final verification decision using two approaches: a likelihood ratio based normalization scheme and a Support Vector Machine (SVM)-based classifier. We demonstrate the accuracy improvements using the proposed method with no a priori knowledge about the database or the matcher under consideration using a publicly available database and matcher. Using our cohort selection procedure and the trained SVM, we show that accuracy can be significantly improved at the expense of few extra matches.

40 citations

Proceedings ArticleDOI
12 May 2008
TL;DR: Experimental results are provided to show the usefulness of a cohort-based fusion of face and fingerprint biometrics in a cohort analysis framework.
Abstract: Biometric matching decisions have traditionally been made based solely on a score that represents the similarity of the query biometric to the enrolled biometric(s) of the claimed identity. Fusion schemes have been proposed to benefit from the availability of multiple biometric samples (e.g., multiple samples of the same fingerprint) or multiple different biometrics (e.g., face and fingerprint). These commonly adopted fusion approaches rarely make use of the large number of non-matching biometric samples available in the database in the form of other enrolled identities or training data. In this paper, we study the impact of combining this information with the existing fusion methodologies in a cohort analysis framework. Experimental results are provided to show the usefulness of such a cohort-based fusion of face and fingerprint biometrics.

40 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations