scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Proceedings ArticleDOI
05 Oct 2001
TL;DR: The architecture of a system that integrates both the high security of Notes with conveniences of fingerprints for client authentication for secure authentication applications is described.
Abstract: Fingerprints have been used to recognize people for several decades. The advent of low cost inkless fingerprint scanners coupled with extra compute power available in client workstations, biometrics in general and fingerprints in particular are being considered for many secure authentication applications. Lotus Notes is a groupware supporting email access and other activities such as calendar management included in it. In this paper, we describe the architecture of a system that integrates both the high security of Notes with conveniences of fingerprints for client authentication. Several design challenges have been addressed that have led to a successful system design and development.
Patent
07 Nov 2019
TL;DR: In this paper, a collection of robot plans in various languages is analyzed in candidate pairings to see if any two plans are directed to the same task, and if so, verbal instructions in different languages from the two plans (such as plan names) are assumed to have the same meaning, and are stored in association as part of the bilingual corpus.
Abstract: Parallel linguistic corpora used to train cognitive translation systems are built from robot plans. A collection of robot plans in various languages is analyzed in candidate pairings to see if any two plans are directed to the same task. If so, verbal instructions in different languages from the two plans (such as plan names) are assumed to have the same meaning, and are stored in association as part of the bilingual corpus. If each plan has multiple steps, the corresponding steps from the two plans can also be stored in association as part of the corpus. Robot plans are modeled as finite state automata having a plurality of links representing sensory states and a plurality of nodes representing motor actions, and the determination of plan similarity is based on a comparison of the two FSAs.
Patent
26 Sep 2016
TL;DR: In this paper, the authors describe methods, systems, and computer program products for treating skin lesions, which include receiving an indication that a patient is oriented, acquiring data concerning an area of the patient, the area including a skin lesion, and analyzing the data to distinguish between an affected region and an unaffected region.
Abstract: Embodiments include methods, systems, and computer program products for treating skin lesions. Aspects include receiving an indication that a patient is oriented. Aspects also include acquiring data concerning an area of the patient, the area including a skin lesion. Aspects also include analyzing the data to distinguish between an affected region and an unaffected region of the area of the patient. Aspects also include excising the affected area.
Patent
30 Jul 2010
TL;DR: A system and method for generating compact iris images on the basis of a database of Iris images including the provision of iris codes full length and a subset of code portions with low correlations within the subset is formed to produce a compact representation of the iris.
Abstract: A system and method for generating compact iris images on the basis of a database (502) of iris images include the provision of iris codes full length (504) for iris images in a database, the iris full length code includes a plurality of parts, the circumferential rings in an associated Iris image correspond. For the iris codes full length distributions of the true value and the false value are with the aid of a processor (512) is calculated, and the code portions (514) are identified that have a contribution that a separation between the false and truth providing distributions with respect to a threshold value. A correlation between the remaining pieces of code is measured. A subset of code portions with low correlations within the subset is formed to produce a compact representation of the iris.
Proceedings ArticleDOI
01 Jan 2023
TL;DR: In this article , the authors presented a rigorous study on gender bias in iris presentation attack detection algorithms using a large-scale and gender-balanced database, which can help in building future presentation attacks detection algorithms with the aim of fair treatment of each demography.
Abstract: One of the critical steps in biometrics pipeline is detection of presentation attacks, a physical adversary. Several presentation (adversary) attack detection (PAD) algorithms, including iris PAD, have been proposed and have shown superlative performance. However, a recent study, on a small-scale database, has highlighted that iris PAD may have gender biases. In this research, we present a rigorous study on gender bias in iris presentation attack detection algorithms using a large-scale and gender-balanced database. The paper provides several interesting observations which can help in building future presentation attack detection algorithms with aim of fair treatment of each demography. In addition, we also present a robust iris presentation attack detection algorithm by combining gender-covariate based classifiers. The proposed robust classifier not only reduces the difference in accuracy between different genders but also improves the overall performance of the PAD system.

Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations