scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Patent
30 Apr 2014
TL;DR: In this article, a method, system and computer program for categorizing heart diseases is presented, which is based on segmentation of the myocardium and the interior fibrous muscle.
Abstract: A method, system and computer program for categorizing heart diseases is presented. An example method includes receiving a series of cardiac images of a heart, the cardiac images including a myocardium, and interior fibrous muscles of the heart. Cardiac images are segmented, into a myocardium segmentation showing an anatomical shape and a motion of the myocardium, and an interior fibrous muscles segmentation showing an anatomical shape and a motion of the interior fibrous muscles. The myocardium segmentation is converted into a regional characterization of the anatomical shape and motion of the myocardium. The interior fibrous muscles segmentation is converted to a regional characterization of the anatomical shape and motion of the interior fibrous muscles. Heart, conditions are characterized based on the regional characterizations of the anatomical shape and the motion of the myocardium and the interior fibrous muscles.

1 citations

Patent
20 Jun 2019
TL;DR: In this paper, a data management system for periodically collecting and storing signature data from each of a set of registered devices, wherein the signature data includes a plurality of data points, and wherein at least one of the data points includes a device usage characteristic.
Abstract: A system, method and program product for authenticating a device. An authentication service is provided having: a data management system for periodically collecting and storing signature data from each of a set of registered devices, wherein the signature data includes a plurality of data points, and wherein at least one of the data points includes a device usage characteristic; a system for obtaining a temporal signature state (TSS) vector of a device in response to a transaction request from the device, wherein the TSS vector includes values for a selected subset of the data points forming the signature data; and an authenticator for comparing the TSS vector of the device with stored signature data in order to authenticate the device.

1 citations

Patent
18 Nov 2015
TL;DR: In this article, a real-time harm prevention method for wearable mobile technology, such as a smartwatch, is presented. But, the method is limited to the use of wearable devices and requires the user to wear at least one smartwatch.
Abstract: The present invention provides techniques for leveraging the sensing capabilities of wearable mobile technology, such as a smartwatch, to provide real-time harm prevention. In one aspect of the invention, a method for harm prevention is provided. The method includes the steps of: collecting real-time data from at least one user, wherein the data is collected via a mobile device worn by the user (e.g., a smartwatch); analyzing the real-time data collected from the user to determine whether the real-time data indicates an emergency situation exists; and undertaking an appropriate action if the real-time data indicates that an emergency situation exists, otherwise continuing to collect data from the user in real-time. Third party data relating to potential source of harm to the user may also be obtained (e.g., from a weather service, newsfeeds, etc.)

1 citations

Patent
16 Nov 2015
TL;DR: In this article, a method for secure biometrics matching with split phase client-server matching protocol, wherein a first biometric input is received in an electronic device, the first biomet input is stored in the electronic device as a biometric profile; and, the biometric profiles are sent to a server, and the additional biometric inputs are compared to the profile stored on the server to generate a local matching score.
Abstract: An embodiment of the invention provides a method for secure biometrics matching with split phase client-server matching protocol, wherein a first biometric input is received in an electronic device The first biometric input is stored in the electronic device as a biometric profile; and, the biometric profile is sent to a server An additional biometric input is received from a user in the electronic device; and, the additional biometric input is compared to the biometric profile stored in the electronic device to generate a local matching score The additional biometric input is sent to the server The local matching score and a remote matching score generated by the at least one server are compared; and, it is determined whether to authenticate the user based on the comparison of the local matching score and the remote matching score

1 citations

Patent
25 May 2016
TL;DR: In this paper, a plurality of images of an object is used to construct a panorama of the object from the images using the geometric transformations, replacing a portion in the panorama with a corresponding replacement portion from the image set.
Abstract: Embodiments include method, systems and computer program products for reducing surface reflectance, for example in a photograph. Aspects include receiving an image set containing a plurality of images of an object. Aspects also include determining geometric transformations for the images and constructing a panorama of the object from the images using the geometric transformations. Aspects also include replacing a portion in the panorama with a corresponding replacement portion from the image set.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations