scispace - formally typeset
Search or ask a question

Showing papers on "Biometrics published in 2003"


Journal ArticleDOI
TL;DR: This paper addresses the problem of information fusion in biometric verification systems by combining information at the matching score level by combining three biometric modalities (face, fingerprint and hand geometry).

1,611 citations


Journal ArticleDOI
TL;DR: The system consists of a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition, and a robust image coordinate system is defined to facilitate image alignment for feature extraction.
Abstract: Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence, a person's identity. This paper presents a new biometric approach to online personal identification using palmprint technology. In contrast to the existing methods, our online palmprint identification system employs low-resolution palmprint images to achieve effective personal identification. The system consists of two parts: a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition. A robust image coordinate system is defined to facilitate image alignment for feature extraction. In addition, a 2D Gabor phase encoding scheme is proposed for palmprint feature extraction and representation. The experimental results demonstrate the feasibility of the proposed system.

1,416 citations


Journal ArticleDOI
TL;DR: A bank of spatial filters, whose kernels are suitable for iris recognition, is used to capture local characteristics of the iris so as to produce discriminating texture features and results show that the proposed method has an encouraging performance.
Abstract: With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade. Iris recognition, as an emerging biometric recognition approach, is becoming a very active topic in both research and practical applications. In general, a typical iris recognition system includes iris imaging, iris liveness detection, and recognition. This paper focuses on the last issue and describes a new scheme for iris recognition from an image sequence. We first assess the quality of each image in the input sequence and select a clear iris image from such a sequence for subsequent recognition. A bank of spatial filters, whose kernels are suitable for iris recognition, is then used to capture local characteristics of the iris so as to produce discriminating texture features. Experimental results show that the proposed method has an encouraging performance. In particular, a comparative study of existing methods for iris recognition is conducted on an iris image database including 2,255 sequences from 213 subjects. Conclusions based on such a comparison using a nonparametric statistical method (the bootstrap) provide useful information for further research.

1,052 citations


Journal ArticleDOI
01 Mar 2003
TL;DR: In some applications, biometrics can replace or supplement the existing technology and in others, it is the only viable approach.
Abstract: Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. But how secure is biometrics? And what are the privacy implications?.

974 citations


01 Jan 2003
TL;DR: The work presented in this thesis involved developing an ‘open-source’ iris recognition system in order to verify both the uniqueness of the human iris and also its performance as a biometric.
Abstract: A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Most commercial iris recognition systems use patented algorithms developed by Daugman, and these algorithms are able to produce perfect recognition rates. However, published results have usually been produced under favourable conditions, and there have been no independent trials of the technology. The work presented in this thesis involved developing an ‘open-source’ iris recognition system in order to verify both the uniqueness of the human iris and also its performance as a biometric. For determining the recognition performance of the system two databases of digitised greyscale eye images were used. The iris recognition system consists of an automatic segmentation system that is based on the Hough transform, and is able to localise the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region was then normalised into a rectangular block with constant dimensions to account for imaging inconsistencies. Finally, the phase data from 1D Log-Gabor filters was extracted and quantised to four levels to encode the unique pattern of the iris into a bit-wise biometric template. The Hamming distance was employed for classification of iris templates, and two templates were found to match if a test of statistical independence was failed. The system performed with perfect recognition on a set of 75 eye images; however, tests on another set of 624 images resulted in false accept and false reject rates of 0.005% and 0.238% respectively. Therefore, iris recognition is shown to be a reliable and accurate biometric technology.

908 citations


Journal ArticleDOI
TL;DR: Li et al. as discussed by the authors presented a new biometric approach to online personal identification using palmprint technology, which consists of two parts: a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition.
Abstract: —Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence, a person's identity. This paper presents a new biometric approach to online personal identification using palmprint technology. In contrast to the existing methods, our online palmprint identification system employs low-resolution palmprint images to achieve effective personal identification. The system consists of two parts: a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition. A robust image coordinate system is defined to facilitate image alignment for feature extraction. In addition, a 2D Gabor phase encoding scheme is proposed for palmprint feature extraction and representation. The experimental results demonstrate the feasibility of the proposed system.

908 citations


Journal ArticleDOI
01 Dec 2003
TL;DR: The main purpose has been to consider a large scale population, with statistical significance, in a real multimodal procedure, and including several sources of variability that can be found in real environments.
Abstract: The current need for large multimodal databases to evaluate automatic biometric recognition systems has motivated the development of the MCYT bimodal database. The main purpose has been to consider a large scale population, with statistical significance, in a real multimodal procedure, and including several sources of variability that can be found in real environments. The acquisition process, contents and availability of the single-session baseline corpus are fully described. Some experiments showing consistency of data through the different acquisition sites and assessing data quality are also presented.

676 citations


Book
06 Nov 2003
TL;DR: This complete, technical guide details the principles, methods, technologies, and core ideas used in biometric authentication systems and defines and explains how to measure the performance of both verification and identification systems.
Abstract: This complete, technical guide details the principles, methods, technologies, and core ideas used in biometric authentication systems. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. The "Guide to Biometrics:" * Debunks myths and candidly confronts problems associated with biometrics research * Details relevant issues in choosing between biometrics, as well as defining and measuring performance * Defines and explains how to measure the performance of both verification and identification systems * Addresses challenges in managing tradeoffs between security and convenience Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

658 citations


Journal ArticleDOI
TL;DR: It is found that recognition performance is not significantly different between the face and the ear, for example, 70.5 percent versus 71.6 percent in one experiment and multimodal recognition using both the ear and face results in statistically significant improvement over either individual biometric.
Abstract: Researchers have suggested that the ear may have advantages over the face for biometric recognition. Our previous experiments with ear and face recognition, using the standard principal component analysis approach, showed lower recognition performance using ear images. We report results of similar experiments on larger data sets that are more rigorously controlled for relative quality of face and ear images. We find that recognition performance is not significantly different between the face and the ear, for example, 70.5 percent versus 71.6 percent, respectively, in one experiment. We also find that multimodal recognition using both the ear and face results in statistically significant improvement over either individual biometric, for example, 90.9 percent in the analogous experiment.

597 citations


Book ChapterDOI
TL;DR: Experimental results on the image dataset from 100 users confirm the utility of hand geometry features with those from palmprints and achieve promising results with a simple image acquisition setup.
Abstract: A new approach for the personal identification using hand images is presented This paper attempts to improve the performance of palmprint-based verification system by integrating hand geometry features Unlike other bimodal biometric systems, the users does not have to undergo the inconvenience of passing through two sensors since the palmprint and hand geometry features can be are acquired from the same image, using a digital camera, at the same time Each of these gray level images are aligned and then used to extract palmprint and hand geometry features These features are then examined for their individual and combined performance The image acquisition setup used in this work was inherently simple and it does not employ any special illumination nor does it use any pegs to cause any inconvenience to the users Our experimental results on the image dataset from 100 users confirm the utility of hand geometry features with those from palmprints and achieve promising results with a simple image acquisition setup

537 citations



Journal ArticleDOI
TL;DR: Experimental results verify the validity of the proposed approaches in personal authentication using the template-matching and the backpropagation neural network to measure the similarity in the verification stage.

BookDOI
01 Jan 2003
TL;DR: This audio and video based biometric person authentication 5th international conference avbpa 2005 hilton rye town ny usa july 20 22 2005 proceedings lecture notes in computer science tends to be the representative book in this website.
Abstract: Spend your few moment to read a book even only few pages. Reading book is not obligation and force for everybody. When you don't want to read, you can get punishment from the publisher. Read a book becomes a choice of your different characteristics. Many people with reading habit will always be enjoyable to read, or on the contrary. For some reasons, this audio and video based biometric person authentication 5th international conference avbpa 2005 hilton rye town ny usa july 20 22 2005 proceedings lecture notes in computer science tends to be the representative book in this website.

Book ChapterDOI
TL;DR: This work introduces the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme and believes that this concept can become a building block of a public infrastructure for biometrics authentication that nonetheless preserves privacy of the participants.
Abstract: In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method that allows a verifier to check the authenticity of the prover in a way that the verifier does not learn any information about the biometrics of the prover, unless the prover willingly releases these parameters. To this end, we introduce the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme. It is believed that this concept can become a building block of a public infrastructure for biometric authentication that nonetheless preserves privacy of the participants.

Journal ArticleDOI
TL;DR: A new model-based moving feature extraction analysis is presented that automatically extracts and describes human gait for recognition and is shown to be able to handle high levels of occlusion, which is of especial importance in gait as the human body is self-occluding.

Patent
10 Sep 2003
TL;DR: A high security identification card as mentioned in this paper includes an on-board memory for stored biometric data and an onboard sensor for capturing live biometrics, which can be used to enable communication with a transactional network or access into a secure area.
Abstract: A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board processor on the card performs a matching operation to verify that the captured biometric data matches the locally stored biometric data. Only if there is a positive match is any data transmitted from the card for additional verification and/or further processing. Preferably, the card is ISO SmartCard compatible. In one embodiment, the ISO SmartCard functions as a firewall for protecting the security processor used for storing and processing the protected biometric data from malicious external attack via the ISO SmartCard interface. In another embodiment, the security processor is inserted between the ISO SmartCard Interface and an unmodified ISO SmartCard processor and blocks any external communications until the user's fingerprint has been matched with a previously registered fingerprint. Real-time feedback is provided while the user is manipulating his finger over the fingerprint sensor, thereby facilitating an optimal placement of the finger over the sensor. The card may be used to enable communication with a transactional network or to obtain physical access into a secure area.

Journal ArticleDOI
TL;DR: This paper considers the palmprint as a piece of texture and applies texture-based feature extraction techniques to palmprint authentication and the experimental results illustrate the eectiveness of this method.

Journal ArticleDOI
TL;DR: This work introduces two applications of an amplitude modulation-based watermarking method, in which a user's biometric data is hidden in a variety of images and has the ability to increase the security of both the hiddenBiometric data and host images.
Abstract: With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.

Book ChapterDOI
TL;DR: This work uses two different strategies for fusing iris and face classifiers to treat the matching distances of face and iris classifiers as a two-dimensional feature vector and uses a classifier such as Fisher's discriminant analysis and a neural network with radial basis function to classify the vector as being genuine or an impostor.
Abstract: Face and iris identification have been employed in various biometric applications. Besides improving verification performance, the fusion of these two biometrics has several other advantages. We use two different strategies for fusing iris and face classifiers. The first strategy is to compute either an unweighted or weighted sum and to compare the result to a threshold. The second strategy is to treat the matching distances of face and iris classifiers as a two-dimensional feature vector and to use a classifier such as Fisher's discriminant analysis and a neural network with radial basis function (RBFNN) to classify the vector as being genuine or an impostor. We compare the results of the combined classifier with the results of the individual face and iris classifiers.

Journal ArticleDOI
TL;DR: This paper proposes a simple and efficient automatic gait recognition algorithm using statistical shape analysis that implicitly uses the action of walking to capture the structural characteristics of gait, especially the shape cues of body biometrics.
Abstract: Gait recognition has recently gained significant attention from computer vision researchers. This interest is strongly motivated by the need for automated person identification systems at a distance in visual surveillance and monitoring applications. The paper proposes a simple and efficient automatic gait recognition algorithm using statistical shape analysis. For each image sequence, an improved background subtraction procedure is used to extract moving silhouettes of a walking figure from the background. Temporal changes of the detected silhouettes are then represented as an associated sequence of complex vector configurations in a common coordinate frame, and are further analyzed using the Procrustes shape analysis method to obtain mean shape as gait signature. Supervised pattern classification techniques, based on the full Procrustes distance measure, are adopted for recognition. This method does not directly analyze the dynamics of gait, but implicitly uses the action of walking to capture the structural characteristics of gait, especially the shape cues of body biometrics. The algorithm is tested on a database consisting of 240 sequences from 20 different subjects walking at 3 viewing angles in an outdoor environment. Experimental results are included to demonstrate the encouraging performance of the proposed algorithm.

Patent
26 Nov 2003
TL;DR: In this paper, a system for issuing identification documents to a plurality of individuals, comprising a first database, a first server, and a workstation, was proposed, where each digitized image contained a biometric image of an individual seeking an identification document.
Abstract: We provide a system for issuing identification documents to a plurality of individuals, comprising a first database, a first server, and a workstation. The first database stores a plurality of digitized images, each digitized image comprising a biometric image of an individual seeking an identification document. The first server is in operable communication with the first database and is programmed to send, at a predetermined time, one or more digitized images from the first database to a biometric recognition system, the biometric recognition system in operable communication with a second database, the second database containing biometric templates associated with individuals whose images have been previously captured, and to receive from the biometric recognition system, for each digitized image sent, an indicator, based on the biometric searching of the second database, as to whether the second database contains any images of individuals who may at least partially resemble the digitized image that was sent. The a workstation is in operable communication with the first server and is configured to permit a user to review the indicator and to make a determination as to whether the individual is authorized to be issued an identification document or to keep an identification document in the individual's possession.

Patent
14 Oct 2003
TL;DR: In this paper, a computer-implemented method for determining whether a database contains any images that substantially match at least one image provided of an individual is presented, where a probe data set is received, the comprising first and second biometric templates associated with the individual, the first biometric template associated with a different type of biometric than the second type of template.
Abstract: The invention provides a computer-implemented method for determining whether a database contains any images that substantially match at least one image provided of an individual. A probe data set is received, the comprising first and second biometric templates associated with the individual, the first biometric template associated with a different type of biometric than the second type of biometric template. A database of biometric templates is searched using the first biometric template to retrieve a first results set. A first predetermined portion of the first results set is selected. The first predetermined portion of the first results set is searched using the second biometric template to retrieve a second results set. A second predetermined portion of the second results set is selected. The second predetermined portion of the second results is provided for comparison with the image provided of the individual.

Patent
24 Jul 2003
TL;DR: In this article, a method and apparatus for electro-biometric identity recognition or verification was proposed, producing and storing a first biometric signature that identifies a specific individual by forming the difference between a representation of the heartbeat pattern of the specific individual and a stored representation of common features of the heartbeats of a plurality of individuals.
Abstract: A method and apparatus for electro-biometric identity recognition or verification, producing and storing a first biometric signature that identifies a specific individual by forming the difference between a representation of the heartbeat pattern of the specific individual and a stored representation of common features of the heartbeat patterns of a plurality of individuals; after the producing step, obtaining a representation of the heartbeat pattern of a selected individual and producing a second biometric signature by forming the difference between the heartbeat pattern of the selected individual and the stored representation of common features of the heartbeat patterns of the plurality of individuals; and comparing the second biometric signature with the first biometric signature to determine whether the selected individual is the specific individual.

Book ChapterDOI
02 Oct 2003
TL;DR: This work outlines cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability.
Abstract: We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Bio-hashing is based on iterated inner-products between pseudorandom and user-specific eigenprojections, each of which extracts a single-bit from the face data. This discretisation is highly tolerant of data capture offsets, with same-user face data resulting in highly correlated bitstrings. The resultant user identification in terms of a small bitstring-set is then securely reduced to a single cryptographic key via Shamir secret-sharing. Generation of the pseudorandom eigenprojection sequence can be securely parameterised via incorporation of physical tokens. Tokenised bio-hashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factors. Our methodology has several major advantages over conventional biometric analysis ie elimination of false accepts (FA) without unacceptable compromise in terms of more probable false rejects (FR), straightforward key-management, and cryptographically rigorous commitment of biometric data in conjunction with verification thereof.

Journal ArticleDOI
TL;DR: This paper introduces one method to provide fingerprint vitality authentication in order to solve the problem of deceive automatic fingerprint identification systems by presenting a well-duplicated synthetic or dismembered finger.

Proceedings ArticleDOI
13 Oct 2003
TL;DR: A human recognition algorithm by combining static and dynamic body biometrics, fused on the decision level using different combinations of rules to improve the performance of both identification and verification is described.
Abstract: Human identification at a distance has recently gained growing interest from computer vision researchers. This paper aims to propose a visual recognition algorithm based upon fusion of static and dynamic body biometrics. For each sequence involving a walking figure, pose changes of the segmented moving silhouettes are represented as an associated sequence of complex vector configurations, and are then analyzed using the Procrustes shape analysis method to obtain a compact appearance representation, called static information of body. Also, a model-based approach is presented under a condensation framework to track the walker and to recover joint-angle trajectories of lower limbs, called dynamic information of gait. Both static and dynamic cues are respectively used for recognition using the nearest exemplar classifier. They are also effectively fused on decision level using different combination rules to improve the performance of both identification and verification. Experimental results on a dataset including 20 subjects demonstrate the validity of the proposed algorithm.

Patent
14 May 2003
TL;DR: In this paper, a security system that utilizes an identity verification system having a biometrics component, such as but not limited to a face, fingerprint, or iris recognition system, is presented.
Abstract: The present invention is a security system that utilizes an identity verification system having a biometrics component, such as but not limited to a face, fingerprint, or iris recognition system. The system connects a biometric data entry device such as a standard analogue or digital camera to a communication control device which captures, compresses and digitizes the biometric data as well as converts data from data input devices and sends the compressed and digitized biometric data along with the data from a data input device to a central processing unit for processing by a biometric recognition system and comparison to stored biometric data.

Book ChapterDOI
02 Jun 2003
TL;DR: An overview of the factors that affect both human and machine recognition of gaits, data used in gait and motion analysis, evaluation methods, existing gait And quasi gait recognition systems, and uses of gait analysis beyond biometric identification are given.
Abstract: Psychological studies indicate that people have a small but statistically significant ability to recognize the gaits of individuals that they know. Recently, there has been much interest in machine vision systems that can duplicate and improve upon this human ability for application to biometric identification. While gait has several attractive properties as a biometric (it is unobtrusive and can be done with simple instrumentation), there are several confounding factors such as variations due to footwear, terrain, fatigue, injury, and passage of time. This paper gives an overview of the factors that affect both human and machine recognition of gaits, data used in gait and motion analysis, evaluation methods, existing gait and quasi gait recognition systems, and uses of gait analysis beyond biometric identification. We compare the reported recognition rates as a function of sample size for several published gait recognition systems.

Patent
30 Jun 2003
TL;DR: In this paper, a computer-readable medium and a propagated computer data signal transmitted via a propagation medium, with instructions which when executed by a processor, carry out the method of the present invention.
Abstract: A computer based method of biometric analysis which compares a first vector from a first biometric sample with a second vector from a second biometric sample. The vectors have at least one biometric feature. A method which compares two biometric samples. The samples form at least one cluster of at least one vector based on feature similarities between the samples. An apparatus incorporating a means for performing the method taught herein. A computer-readable medium and a propagated computer data signal transmitted via a propagation medium, with instructions which when executed by a processor, carry out the method of the present invention. A method of handwriting analysis which calculates a first metric from a first vector having at least one feature from a sample, calculates a second metric from a second vector having at least one feature from a second sample, and calculates the distance in two-dimensional feature space between metrics.

Book ChapterDOI
TL;DR: The BIOMET multimodal database for person authentication is described, including face, voice, fingerprint, hand and signature data, and details about the acquisition protocols of each modality are given.
Abstract: Information technology innovations involve a constant evolution of man-machine interaction modes. Automated authentication of people could be used to better adapt the machine to the user. Security can also be enhanced through a better people authentication. Biometrics appears as a promising tool in these two situations. Different modalities can be envisaged, such as: fingerprint, human face images, hand shape, voice, handwritten signature... In order to take advantage of the particularities of each modality, and to improve the performance of a person authentication system, multimodality can be applied. This motivated the recording of BIOMET, a biometric database with five different modalities, including face, voice, fingerprint, hand and signature data. In this paper, the BIOMET multimodal database for person authentication is described. Details about the acquisition protocols of each modality are given. Preliminary monomodal verification results, obtained on a subcorpus of the BIOMET fingerprint data, are also presented.