scispace - formally typeset
Search or ask a question
Book ChapterDOI

Multi-faceted and Multi-algorithmic Framework (MFMA) for Finger Knuckle Biometrics

29 Nov 2018-pp 1681-1699
TL;DR: In this paper, an integrated approach known as Multi-Faceted and Multi-Algorithmic Framework (MFMA) was proposed for authentication using finger knuckle surface. But, there exist a number of unresolved issues for the biometric systems related to data, system design and algorithms.
Abstract: Reliable personal authentication system is essential for social, financial and political structures of today’s human life style. The advent of biometric technology has revolutionized personal authentication system to meet the current requirements through biometric modalities in a reliable, accurate, rapid and user-friendly way. However, there exist a number of unresolved issues for the biometric systems related to data, system design and algorithms. This work focuses on exploring features from dorsal side of the hand region known as finger knuckle surface for reliable personal authentication. This paper illustrates design and development of an integrated finger knuckle biometric framework using multiple units of finger knuckle surface and multi-algorithmic parameters for robust and accurate personal identification. This novel integrated approach known as Multi-Faceted and Multi-Algorithmic Framework (MFMA) for authentication using finger knuckle surface. This MFMA framework simultaneously acquires multiple instances of finger back knuckle surface, extracts multiple features using three different categories of algorithms, viz., angular geometric analysis, transform based texture analysis, statistical analysis and integrates the information derived from multiple algorithms using decision level fusion implemented based on Bayesian approach.
References
More filters
Journal ArticleDOI
TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Abstract: A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or, simply, biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on "who she is", rather than by "what she possesses" (e.g., an ID card) or "what she remembers" (e.g., a password). We give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.

4,678 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

BookDOI
01 Oct 2007
TL;DR: This book addresses the void in biometrics research by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.
Abstract: Biometrics is a rapidly evolving field with applications ranging from accessing ones computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.

1,174 citations

Journal ArticleDOI
TL;DR: A palmprint recognition method based on eigenspace technology by means of the Karhunen-Loeve transform, where the original palmprint images are transformed into a small set of feature space, called "eigenpalms", which are the eigenvectors of the training set and can represent the principle components of the palmprints quite well.

525 citations

Book
31 May 2000
TL;DR: The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.
Abstract: Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on `something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.

395 citations