scispace - formally typeset
Search or ask a question

Showing papers on "Biometrics published in 2019"


Journal ArticleDOI
TL;DR: Deep-ECG extracts significant features from one or more leads using a deep CNN and compares biometric templates by computing simple and fast distance functions, obtaining remarkable accuracy for identification, verification and periodic re-authentication.

255 citations


Journal ArticleDOI
TL;DR: The results presented in this article show that motion-based biometrics using smartphones and/or smartwatches yield good results, and that these results hold for the eighteen activities, and also demonstrates that certain easy-to-perform activities, such as clapping, may be a viable alternative (or supplement) to gait-basedBiometrics.
Abstract: Smartphones and smartwatches, which include powerful sensors, provide a readily available platform for implementing and deploying mobile motion-based behavioral biometrics. However, the few studies that utilize these commercial devices for motion-based biometrics are quite limited in terms of the sensors and physical activities that they evaluate. In many such studies, only the smartwatch accelerometer is utilized and only one physical activity, walking, is investigated. In this study we consider the accelerometer and gyroscope sensor on both the smartphone and smartwatch, and determine which combination of sensors performs best. Furthermore, eighteen diverse activities of daily living are evaluated for their biometric efficacy and, unlike most other studies, biometric identification is evaluated in addition to biometric authentication. The results presented in this article show that motion-based biometrics using smartphones and/or smartwatches yield good results, and that these results hold for the eighteen activities. This suggests that zero-effort continuous biometrics based on normal activities of daily living is feasible, and also demonstrates that certain easy-to-perform activities, such as clapping, may be a viable alternative (or supplement) to gait-based biometrics.

209 citations


Journal ArticleDOI
TL;DR: A new multi-channel gait template, called period energy image (PEI), and multi-task generative adversarial networks (MGANs), which can leverage adversarial training to extract more discriminative features from gait sequences.
Abstract: Gait recognition is of great importance in the fields of surveillance and forensics to identify human beings since gait is the unique biometric feature that can be perceived efficiently at a distance. However, the accuracy of gait recognition to some extent suffers from both the variation of view angles and the deficient gait templates. On one hand, the existing cross-view methods focus on transforming gait templates among different views, which may accumulate the transformation error in a large variation of view angles. On the other hand, a commonly used gait energy image template loses temporal information of a gait sequence. To address these problems, this paper proposes multi-task generative adversarial networks (MGANs) for learning view-specific feature representations. In order to preserve more temporal information, we also propose a new multi-channel gait template, called period energy image (PEI). Based on the assumption of view angle manifold, the MGANs can leverage adversarial training to extract more discriminative features from gait sequences. Experiments on OU-ISIR, CASIA-B, and USF benchmark data sets indicate that compared with several recently published approaches, PEI + MGANs achieves competitive performance and is more interpretable to cross-view gait recognition.

181 citations


Journal ArticleDOI
TL;DR: A secure multimodal biometric system that uses convolution neural network (CNN) and Q-Gaussian multi support vector machine (QG-MSVM) based on a different level fusion to protect these templates and increase the security of the proposed system.
Abstract: A multimodal biometric system integrates information from more than one biometric modality to improve the performance of each individual biometric system and make the system robust to spoof attacks. In this paper, we propose a secure multimodal biometric system that uses convolution neural network (CNN) and Q-Gaussian multi support vector machine (QG-MSVM) based on a different level fusion. We developed two authentication systems with two different level fusion algorithms: a feature level fusion and a decision level fusion. The feature extraction for individual modalities is performed using CNN. In this step, we selected two layers from CNN that achieved the highest accuracy, in which each layer is regarded as separated feature descriptors. After that, we combined them using the proposed internal fusion to generate the biometric templates. In the next step, we applied one of the cancelable biometric techniques to protect these templates and increase the security of the proposed system. In the authentication stage, we applied QG-MSVM as a classifier for authentication to improve the performance. Our systems were tested on several publicly available databases for ECG and fingerprint. The experimental results show that the proposed multimodal systems are efficient, robust, and reliable than existing multimodal authentication systems.

153 citations


Journal ArticleDOI
TL;DR: A comprehensive review of techniques incorporating ancillary information in the biometric recognition pipeline is presented in this paper, where the authors provide a comprehensive overview of the role of information fusion in biometrics.

151 citations


Journal ArticleDOI
Zhang Rui1, Zheng Yan1
TL;DR: In this article, the authors classify and thoroughly review the existing biometric authentication systems by focusing on the security and privacy solutions and propose a number of criteria with regard to secure and privacy-preserving authentication.
Abstract: In order to overcome the difficulty of password management and improve the usability of authentication systems, biometric authentication has been widely studied and has attracted special attention in both academia and industry. Many biometric authentication systems have been researched and developed, especially for mobile devices. However, the existing biometric authentication systems still have defects. Some biological features have not been deeply investigated. The existing systems could be vulnerable to attacks, such as replay attack and suffer from user privacy intrusion, which seriously hinder their wide acceptance by end users. The literature still lacks a thorough review on the recent advances of biometric authentication for the purpose of secure and privacy-preserving identification. In this paper, we classify and thoroughly review the existing biometric authentication systems by focusing on the security and privacy solutions. We analyze the threats of biometric authentication and propose a number of criteria with regard to secure and privacy-preserving authentication. We further review the existing works of biometric authentication by analyzing their differences and summarizing the advantages and disadvantages of each based on the proposed criteria. In particular, we discuss the problems of aliveness detection and privacy protection in biometric authentication. Based on our survey, we figure out a number of open research issues and further specify a number of significant research directions that are worth special efforts in future research.

146 citations


Journal ArticleDOI
28 Jan 2019-Symmetry
TL;DR: It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases.
Abstract: Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper.

128 citations


Journal ArticleDOI
TL;DR: A more secure way of accessing IoT based on biometrics and fast identity standard by which the authors can expect significant advances in smart healthcare systems is reached.

113 citations


Proceedings ArticleDOI
01 Oct 2019
TL;DR: A camera-based real-time face recognition system and an algorithm is built by developing programming on OpenCV, Haar Cascade, Eigenface, Fisher Face, LBPH, and Python.
Abstract: Face detection and picture or video recognition is a popular subject of research on biometrics. Face recognition in a real-time setting has an exciting area and a rapidly growing challenge. Framework for the use of face recognition application authentication. This proposes the PCA (Principal Component Analysis) facial recognition system. The key component analysis (PCA) is a statistical method under the broad heading of factor analysis. The aim of the PCA is to reduce the large amount of data storage to the size of the feature space that is required to represent the data economically. The wide 1-D pixel vector made of the 2-D face picture in compact main elements of the space function is designed for facial recognition by the PCA. This is called a projection of self-space. The proper space is determined with the identification of the covariance matrix’s own vectors, which are centered on a collection of fingerprint images. I build a camera-based real-time face recognition system and set an algorithm by developing programming on OpenCV, Haar Cascade, Eigenface, Fisher Face, LBPH, and Python.

110 citations


Journal ArticleDOI
TL;DR: An implicit wearable device user authentication mechanism using combinations of three types of coarse-grain minute-level biometrics: behavioral (step counts), physiological (heart rate), and hybrid (calorie burn and metabolic equivalent of task) is presented.
Abstract: The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices, such as wearables. With recent advances in mobile sensing, wearables have become a rich collection of portable sensors and are able to provide various types of services, including tracking of health and fitness, making financial transactions, and unlocking smart locks and vehicles. Most of these services are delivered based on users’ confidential and personal data, which are stored on these wearables. Existing explicit authentication approaches (i.e., PINs or pattern locks) for wearables suffer from several limitations, including small or no displays, risk of shoulder surfing, and users’ recall burden. Oftentimes, users completely disable security features out of convenience. Therefore, there is a need for a burden-free (implicit) authentication mechanism for wearable device users based on easily obtainable biometric data. In this paper, we present an implicit wearable device user authentication mechanism using combinations of three types of coarse-grain minute-level biometrics: behavioral (step counts), physiological (heart rate), and hybrid (calorie burn and metabolic equivalent of task). From our analysis of over 400 Fitbit users from a 17-month long health study, we are able to authenticate subjects with average accuracy values of around .93 (sedentary) and .90 (non-sedentary) with equal error rates of .05 using binary SVM classifiers. Our findings also show that the hybrid biometrics perform better than other biometrics and behavioral biometrics do not have a significant impact, even during non-sedentary periods.

98 citations


Journal ArticleDOI
TL;DR: The definition of gait analysis includes gait recognition and gait-based soft biometrics such as gender and age prediction, and is proposed to investigate these two problems in a joint CNN-based framework which has been seldom reported in the recent literature.

Journal ArticleDOI
TL;DR: This paper presents a novel authentication system using an efficient feature detection algorithm and a convolutional neural network (CNN) based on ECG for human authentication that is highly usable in a real-time authentication system.

Journal ArticleDOI
TL;DR: A new hybrid technique which ensures the authenticity of the user to the system, as well as monitors whether the user has passed the biometric system as a normal or spoofed one is proposed, overcoming the limitations in normal authentication and spoofing practices.

Journal ArticleDOI
TL;DR: The requirements for effective privacy preservation are established, generic cryptography-based solutions are reviewed, followed by specific techniques that are applicable to speaker characterisation and speech characterisation (biometrics and non-biometric applications), and common, empirical evaluation metrics for the assessment of privacy-preserving technologies for speech data are outlined.

Posted Content
TL;DR: This work provides a comprehensive survey of more than 120 promising works on biometric recognition (including face, fingerprint, iris, palmprint, ear, voice, signature, and gait recognition), which deploy deep learning models, and show their strengths and potentials in different applications.
Abstract: Deep learning-based models have been very successful in achieving state-of-the-art results in many of the computer vision, speech recognition, and natural language processing tasks in the last few years. These models seem a natural fit for handling the ever-increasing scale of biometric recognition problems, from cellphone authentication to airport security systems. Deep learning-based models have increasingly been leveraged to improve the accuracy of different biometric recognition systems in recent years. In this work, we provide a comprehensive survey of more than 120 promising works on biometric recognition (including face, fingerprint, iris, palmprint, ear, voice, signature, and gait recognition), which deploy deep learning models, and show their strengths and potentials in different applications. For each biometric, we first introduce the available datasets that are widely used in the literature and their characteristics. We will then talk about several promising deep learning works developed for that biometric, and show their performance on popular public benchmarks. We will also discuss some of the main challenges while using these models for biometric recognition, and possible future directions to which research in this area is headed.

Journal ArticleDOI
TL;DR: Zhang et al. as mentioned in this paper proposed a two-stream convolutional neural network (CNN) which accepts hand images as input and predicts gender information from these hand images, which is then used as a feature extractor to feed a set of support vector machine classifiers for biometric identification.
Abstract: Human hand not only possesses distinctive feature for gender information, it is also considered one of the primary biometric traits used to identify a person. Unlike face images, which are usually unconstrained, an advantage of hand images is they are usually captured under a controlled position. Most state-of-the-art methods, that rely on hand images for gender recognition or biometric identification, employ handcrafted features to train an off-the-shelf classifier or be used by a similarity metric for biometric identification. In this work, we propose a deep learning-based method to tackle the gender recognition and biometric identification problems. Specifically, we design a two-stream convolutional neural network (CNN) which accepts hand images as input and predicts gender information from these hand images. This trained model is then used as a feature extractor to feed a set of support vector machine classifiers for biometric identification. As part of this effort, we propose a large dataset of human hand images, 11K Hands, which contains dorsal and palmar sides of human hand images with detailed ground-truth information for different problems including gender recognition and biometric identification. By leveraging thousands of hand images, we could effectively train our CNN-based model achieving promising results. One of our findings is that the dorsal side of human hands is found to have effective distinctive features similar to, if not better than, those available in the palmar side of human hand images. To facilitate access to our 11K Hands dataset, the dataset, the trained CNN models, and our Matlab source code are available at ( https://goo.gl/rQJndd ).

Journal ArticleDOI
TL;DR: Three state-of-the-art pretrained models, VGG16, InceptionV3, and ResNet50, are introduced and the structure detail of the network is adjusted, and a modified routing algorithm based on the dynamic routing between two capsule layers to make this technique adapt to iris recognition.
Abstract: Iris recognition is one of the most representative identification technologies in biometric recognition, which is widely used in various fields. Recently, many deep learning methods have been used in biometric recognition, owing to their advantages such as automatic learning, high accuracy, and strong generalization ability. The deep convolutional neural network (CNN) is the mainstream method of image processing widely used in many domains, but it has poor anti-noise capacity in image classification and is easily affected by slight disturbances. CNN also needs a large number of samples for training. The recent capsule network not only has high recognition accuracy in classification tasks but can also learn part-whole relationships, increasing the robustness of the model. Furthermore, it can be trained using a small number of samples. In this paper, we propose a deep learning method based on the capsule network architecture in iris recognition. The structure detail of the network is adjusted, and we provide a modified routing algorithm based on the dynamic routing between two capsule layers to make this technique adapt to iris recognition. Migration learning makes the deep learning method available even when the number of samples is limited. Therefore, three state-of-the-art pretrained models, VGG16, InceptionV3, and ResNet50, are introduced. We divide the three networks into a series of subnetwork structures according to the number of their major constituent blocks. They are used as the convolutional part to extract primary features, instead of a single convolutional layer in the capsule network. Our experiments are conducted on three iris datasets, JluIrisV3.1, JluIrisV4, and CASIA-V4 Lamp, to analyze the performance of different network structures. We also test the proposed networks in simulated strong and weak light environments, showing that the networks with capsule architecture are more stable than those without.

Journal ArticleDOI
01 Dec 2019
TL;DR: The proposed algorithm presents the idea of authentication of images in two basic steps of image compression using standard discrete wavelet transform method followed by image encryption using the hybrid method of SHA and blowfish.
Abstract: Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of security. Since the user who has uploaded the image has no control over the security of images, the cloud provider has to ensure maximum security in terms of authentication and prevention from attacks. The main objective of this paper is to provide a method to enhance the safety of images on cloud. This paper presents an idea of securing images on cloud platform using biometric authentication. Different steps involved in biometric authentication and secure upload and access of images are explained, and integration of all the steps is done at the end as a case study which puts light on the whole process in which methods are best-regarding results and compatibility. The proposed algorithm in this paper presents the idea of authentication of images in two basic steps of image compression using standard discrete wavelet transform method followed by image encryption using the hybrid method of SHA and blowfish. This image is then stored into the database of cloud and accessed whenever the user requests it. A structured and comprehensive view of encryption methods, types of biometrics and to secure data as well as images is provided in this paper.

Journal ArticleDOI
TL;DR: A novel model for ongoing EEG biometric identification using EEG collected during a diverse set of tasks is proposed, representing EEG signals as a graph based on within-frequency and cross-frequency functional connectivity estimates, and the use of graph convolutional neural network to automatically capture deep intrinsic structural representations from the EEG graphs for person identification.
Abstract: Highly secure access control requires Swiss-cheese-type multi-layer security protocols. The use of electroencephalogram (EEG) to provide cognitive indicators for human workload and fatigue has created environments where the EEG data are well-integrated into systems, making it readily available for more forms of innovative uses including biometrics. However, most of the existing studies on EEG biometrics rely on resting state signals or require specific and repetitive sensory stimulation, limiting their uses in naturalistic settings. Moreover, the limited discriminatory power of uni-variate measures denies an opportunity to use dependences information inherent in brain regions to design more robust biometric identifiers. In this paper, we proposed a novel model for ongoing EEG biometric identification using EEG collected during a diverse set of tasks. The novelty lies in representing EEG signals as a graph based on within-frequency and cross-frequency functional connectivity estimates, and the use of graph convolutional neural network (GCNN) to automatically capture deep intrinsic structural representations from the EEG graphs for person identification. An extensive investigation was carried out to assess the robustness of the method against diverse human states, including resting states under eye-open and eye-closed conditions and active states drawn during the performance of four different tasks. We compared our method with the state-of-the-art EEG features, classifiers, and models of EEG biometrics. Results show that the representation drawn from EEG functional connectivity graphs demonstrates more robust biometric traits than direct use of uni-variate features. Moreover, the GCNN can effectively and efficiently capture discriminative traits, thus generalizing better over diverse human states.

Proceedings ArticleDOI
01 Jan 2019
TL;DR: A model for implementing an automated attendance management system for students of a class by making use of face recognition technique, by using Eigenface values, Principle Component Analysis (PCA) and Convolutional Neural Network (CNN) will be a successful technique to manage the attendance and records of students.
Abstract: The management of the attendance can be a great burden on the teachers if it is done by hand. To resolve this problem, smart and auto attendance management system is being utilized. But authentication is an important issue in this system. The smart attendance system is generally executed with the help of biometrics. Face recognition is one of the biometric methods to improve this system. Being a prime feature of biometric verification, facial recognition is being used enormously in several such applications, like video monitoring and CCTV footage system, an interaction between computer & humans and access systems present indoors and network security. By utilizing this framework, the problem of proxies and students being marked present even though they are not physically present can easily be solved. The main implementation steps used in this type of system are face detection and recognizing the detected face.This paper proposes a model for implementing an automated attendance management system for students of a class by making use of face recognition technique, by using Eigenface values, Principle Component Analysis (PCA) and Convolutional Neural Network (CNN). After these, the connection of recognized faces ought to be conceivable by comparing with the database containing student's faces. This model will be a successful technique to manage the attendance and records of students.

Journal ArticleDOI
TL;DR: This survey provides interested readers with a reasoned and systematic overview of problems, approaches, and available benchmarks forait biometrics and suggests continuing investigating.
Abstract: Gait is a biometric trait that can allow user authentication, though it is classified as a “soft” one due to a certain lack in permanence and to sensibility to specific conditions. The earliest research relies on computer vision, especially applied in video surveillance. More recently, the spread of wearable sensors, especially those embedded in mobile devices, has spurred a different research line. In fact, they are able to capture the dynamics of the walking pattern through simpler one-dimensional signals. This capture modality can avoid some problems related to computer vision-based techniques but suffers from specific limitations. Related research is still in a less advanced phase with respect to other biometric traits. However, many factors - the promising results achieved so far, the increasing accuracy of sensors, the ubiquitous presence of mobile devices, and the low cost of related techniques - contribute to making this biometrics attractive and suggest continuing investigating. This survey provides interested readers with a reasoned and systematic overview of problems, approaches, and available benchmarks.

Journal ArticleDOI
TL;DR: A secure multimodal biometric system by fusing electrocardiogram (ECG) and fingerprint based on convolution neural network (CNN) and a Q-Gaussian multi support vector machine (QG-MSVM) as a classifier to improve the authentication performance is proposed.

Journal ArticleDOI
02 Sep 2019
TL;DR: In this survey, it is considered how the scientific advances in the field of deep learning are applied to biometrics in order to enhance the protection of the authors' data.
Abstract: Deep learning has been established in the last few years as the gold standard for data processing, achieving peak performance in image, text and audio understanding At the same time, digital security is of utmost importance in this day and age, where everyone could get into our personal devices like cellphones or laptops, where we store our most valuable information One of the possible ways to prevent this is via advanced and personalized security: biometrics In this survey, it is considered how the scientific advances in the field of deep learning are applied to biometrics in order to enhance the protection of our data

Journal ArticleDOI
TL;DR: The Overall Performance (OP) as a newly proposed performance measure is the combined performance metric of multiple authentication measures in this study and it is found that the OP could be maximized by applying a UCL of 0.0028, which indicates 61 accepted samples within 70 samples and ensures that the proposed authentication system achieves 95% accuracy.
Abstract: This paper is targeted in the area of biometric data enabled security by using machine learning for the digital health. The traditional authentication systems are vulnerable to the risks of forgetfulness, loss, and theft. Biometric authentication is has been improved and become the part of daily life. The Electrocardiogram (ECG) based authentication method has been introduced as a biometric security system suitable to check the identification for entering a building and this research provides for studying ECG-based biometric authentication techniques to reshape input data by slicing based on the RR-interval. The Overall Performance (OP) as a newly proposed performance measure is the combined performance metric of multiple authentication measures in this study. The performance of the proposed system using a confusion matrix has been evaluated and it has achieved up to 95% accuracy by compact data analysis. The Amang ECG (amgecg) toolbox in MATLAB is applied to the mean square error (MSE) based upper-range control limit (UCL) which directly affects three authentication performance metrics: the number of accepted samples, the accuracy and the OP. Based on this approach, it is found that the OP could be maximized by applying a UCL of 0.0028, which indicates 61 accepted samples within 70 samples and ensures that the proposed authentication system achieves 95% accuracy.

Journal ArticleDOI
TL;DR: A novel template transformation technique named random distance method is proposed which not only generates discriminative and privacy preserving revocable pseudo-biometric identities, but also reduces their size by 50%.
Abstract: The cancelable biometric-based template protection method proposed in this paper addresses security and privacy concerns emerging from the phenomenal usage of biometric systems. Cancelable biometric transforms the original biometric identity of a user to a pseudo-biometric identity that is used for storage and matching purposes. The use of pseudo-identity mitigates privacy risks and allows revocability in case of compromise. This paper proposes a novel template transformation technique named random distance method which not only generates discriminative and privacy preserving revocable pseudo-biometric identities, but also reduces their size by 50%. Extensive experimentation is performed to analyze recognition and protection performance on unimodal and multimodal pseudo-identities generated with various biometric modalities such as face, thermal face, palmprint, palmvein, and fingervein. It is observed that the matching performance obtained with the proposed cancelable templates in the worst-case is closer to the performance achieved in the original domain. Also, multimodal cancelable biometric templates generated with the proposed method are observed for improved performance. Furthermore, the proposed approach is successfully analyzed for non-invertibilty, unlinkability, as well as its resistance for various types of attacks like attacks via record multiplicity, dictionary, false accepts, and brute force.

Journal ArticleDOI
TL;DR: This paper investigates a new deep learning-based approach for iris recognition and attempts to improve the accuracy using a more simplified framework to more accurately recover the representative features.
Abstract: Iris recognition has emerged as the more accurate, convenient, and low-cost biometric approach to authenticate human subjects. However, the accuracy offered by current popular iris recognition algorithms is below the expectations from the community, and therefore, researchers have recently focused their attention on deep learning-based methods. This paper investigates a new deep learning-based approach for iris recognition and attempts to improve the accuracy using a more simplified framework to more accurately recover the representative features. We consider residual network learning with dilated convolutional kernels to optimize the training process and aggregate contextual information from the iris images. Such an approach also alleviates the need for the down-sampling and up-sampling layers, which not only results in a simplified network but also results in outperforming matching accuracy over several classical and state-of-the-art algorithms for iris recognition, i.e., further improvement in equal error rates by 7.14%, 10.7%, and 27.4% on three test databases. In this paper, our reproducible experimental results are presented on three publicly available datasets that illustrate outperforming results and validate the usefulness of our approach.

Journal ArticleDOI
TL;DR: A detailed survey of the current literature and outline the scientific work conducted on brain biometric systems is provided, including an up-to-date review of state-of-the-art acquisition, collection, processing, and analysis of brainwave signals, publicly available databases, feature extraction and selection, and classifiers.
Abstract: Brainwaves, which reflect brain electrical activity and have been studied for a long time in the domain of cognitive neuroscience, have recently been proposed as a promising biometric approach due to their unique advantages of confidentiality, resistance to spoofing/circumvention, sensitivity to emotional and mental state, continuous nature, and cancelability. Recent research efforts have explored many possible ways of using brain biometrics and demonstrated that they are a promising candidate for more robust and secure personal identification and authentication. Although existing research on brain biometrics has obtained some intriguing insights, much work is still necessary to achieve a reliable ready-to-deploy brain biometric system. This article aims to provide a detailed survey of the current literature and outline the scientific work conducted on brain biometric systems. It provides an up-to-date review of state-of-the-art acquisition, collection, processing, and analysis of brainwave signals, publicly available databases, feature extraction and selection, and classifiers. Furthermore, it highlights some of the emerging open research problems for brain biometrics, including multimodality, security, permanence, and stability.

Journal ArticleDOI
TL;DR: In this paper, an ECG-based authentication system for security checks and hospital environments is presented, which uses the Amang ECG toolbox within MATLAB to analyze the parameters that directly affect the accuracy of authentication.
Abstract: Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require “something you know and something you have”. The disadvantages of these systems include the risks of forgetfulness, loss, and theft. To address these shortcomings, biometric authentication is rapidly replacing traditional authentication methods and is becoming a part of everyday life. The electrocardiogram (ECG) is one of the most recent traits considered for biometric purposes. In this work we describe an ECG-based authentication system suitable for security checks and hospital environments. The proposed system will help investigators studying ECG-based biometric authentication techniques to define dataset boundaries and to acquire high-quality training data. We evaluated the performance of the proposed system and found that it could achieve up to the 92% identification accuracy. In addition, by applying the Amang ECG ( amgecg ) toolbox within MATLAB, we investigated the two parameters that directly affect the accuracy of authentication: the ECG slicing time (sliding window) and the sampling time period, and found their optimal values.

Journal ArticleDOI
TL;DR: A CNN-based framework to accurately match contactless and contact-based fingerprint images and consistently achieve outperforming results over several popular deep learning architectures and over contactless to contact- based fingerprints comparison methods in the literature.
Abstract: Accurate comparison of contactless 2-D fingerprint images with contact-based fingerprints is critical for the success of emerging contactless 2-D fingerprint technologies, which offer more hygienic and deformation-free acquisition of fingerprint features. Convolutional neural networks (CNNs) have shown remarkable capabilities in biometrics recognition. However, there has been almost nil attempt to match fingerprint images using CNN-based approaches. This paper develops a CNN-based framework to accurately match contactless and contact-based fingerprint images. Our framework first trains a multi-Siamese CNN using fingerprint minutiae, respective ridge map and specific region of ridge map. This network is used to generate deep fingerprint representation using a distance-aware loss function. Deep fingerprint representations generated in such multi-Siamese network are concatenated for more accurate cross comparison. The proposed approach for cross-fingerprint comparison is evaluated on two publicly available databases containing contactless 2-D fingerprints and respective contact-based fingerprints. Our experiments presented in this paper consistently achieve outperforming results over several popular deep learning architectures and over contactless to contact-based fingerprints comparison methods in the literature.

Journal ArticleDOI
TL;DR: A multi-biometric algorithm that integrates palmprints and dorsal hand veins (DHV) is explored, and the promising results were obtained where the equal error rates (EERs) of both palmprint recognition andMulti-biometrics equal 0, demonstrating the great superiority of DHN in biometric verification.
Abstract: At present, the fusion of different unimodal biometrics has attracted increasing attention from researchers, who are dedicated to the practical application of biometrics. In this paper, we explored a multi-biometric algorithm that integrates palmprints and dorsal hand veins (DHV). Palmprint recognition has a rather high accuracy and reliability, and the most significant advantage of DHV recognition is the biopsy (Liveness detection). In order to combine the advantages of both and implement the fusion method, deep learning and graph matching were, respectively, introduced to identify palmprint and DHV. Upon using the deep hashing network (DHN), biometric images can be encoded as 128-bit codes. Then, the Hamming distances were used to represent the similarity of two codes. Biometric graph matching (BGM) can obtain three discriminative features for classification. In order to improve the accuracy of open-set recognition, in multi-modal fusion, the score-level fusion of DHN and BGM was performed and authentication was provided by support vector machine (SVM). Furthermore, based on DHN, all four levels of fusion strategies were used for multi-modal recognition of palmprint and DHV. Evaluation experiments and comprehensive comparisons were conducted on various commonly used datasets, and the promising results were obtained in this case where the equal error rates (EERs) of both palmprint recognition and multi-biometrics equal 0, demonstrating the great superiority of DHN in biometric verification.