scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Patent
14 Sep 2015
TL;DR: In this paper, a similarity detection system receiving a plurality of input entities, including a cohesive subgraph identification device configured to calculate, based on attributes of the plurality of entities, a first parameter and a second parameter based on the first parameter, was presented.
Abstract: A similarity detection system receiving a plurality of input entities, the system including a cohesive subgraph identification device configured to calculate, based on attributes of the plurality of input entities, a first parameter and a second parameter based on the first parameter, and further configured to identify a plurality of subgraphs from the second parameter and a subgraph correlation tracking and clustering device configured to determine a relationship between different subgraphs based on a similarity factor between the second parameter and the plurality of subgraphs.

4 citations

Proceedings ArticleDOI
12 May 2008
TL;DR: The proposed approach allows for using any available face matcher to perform verification or recognition in the transformed domain, a capability missing from most existing works on cancelable face matching.
Abstract: We present a face reconstruction approach for revocable face matching. The proposed approach generates photometrically valid cancelable face images by following the image formation process. Given a face image, the approach estimates facial albedo followed by a subject-specific key based photometric deformation to generate a cancelable face image. The proposed approach allows for using any available face matcher to perform verification or recognition in the transformed domain, a capability missing from most existing works on cancelable face matching. Experiments are performed to evaluate the performance, privacy and cancelable aspects of the face images reconstructed using the approach. Results obtained are very promising and make a strong case for such backward compatible cancelable face representations that can seamlessly make use of advancements in automatic face recognition research.

4 citations

Book ChapterDOI
Ruud M. Bolle1, Jonathan H. Connell1, Sharath Pankanti1, Nalini K. Ratha1, Andrew W. Senior1 
01 Jan 2004
TL;DR: Biometric identifiers, systems, and databases are really put to the test when 1:many searches of large biometric databases are part of the enrollment policy or authentication protocol.
Abstract: Biometric identifiers, systems, and databases are really put to the test when 1:many searches of large biometric databases are part of the enrollment policy or authentication protocol. In such identification problems, not only are low error rates desired, high 1:1 match rates are quite often also required.

3 citations

Journal ArticleDOI
TL;DR: The 12 regular papers and three correspondences in this special issue focus on human detection and recognition of biometrics and protection against the spoof attacks.
Abstract: The 12 regular papers and three correspondences in this special issue focus on human detection and recognition. The papers represent gait, face (3-D, 2-D, video), iris, palmprint, cardiac sounds, and vulnerability of biometrics and protection against the spoof attacks.

3 citations

Proceedings ArticleDOI
Vivek Tyagi1, Nalini K. Ratha1
20 Jun 2011
TL;DR: The test results using the proposed discriminative method on the NIST-BSSRI multimodal dataset indicate improved verification performance over a very competitive maximum likelihood (ML) trained system proposed in [1].
Abstract: In the multibiometric systems, various matcher/modality scores are fused together to provide better performance than the individual matcher scores. In [1] the authors have proposed a likelihood ratio test (LRT) based fusion technique for the biometric verification task that outperformed several other classifiers. They model the genuine and the imposter densities by the finite Gaussian mixture models (GMM, a generative model) whose parameters are estimated using the maximum likelihood (ML) criteria. Lately, the discriminative training methods and models have been shown to provide additional accuracy gains over the generative models, in multiple applications such as the speech recognition, verification and text analytics[5, 7]. These gains are based on the fact that the discriminative models are able to partially compensate for the unavoidable mismatch, which is always present between the specified statistical model (GMM in this case) and the true distribution of the data which is unknown. In this paper, we propose to use a discriminative method to estimate the GMM density parameters using the maximum accept and reject (MARS) criteria[8]. The test results using the proposed method on the NIST-BSSRI multimodal dataset indicate improved verification performance over a very competitive maximum likelihood (ML) trained system proposed in [1].

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations