Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








185 Hits in 4.2 sec

Biometric Authentication Using Fused Multimodal Biometric

D. Jagadiswary, D. Saraswady
2016 Procedia Computer Science  
The proposed enhanced multimodal authentication system is based on feature extraction(using fingerprint, retina and fingervein) and key generation (using RSA).  ...  The experimental evaluation implemented using MATLAB 2014, illustrates the significance improvement in the performance of multimodal biometrics with RSA have GAR of 95.3% and FAR of 0.01%.  ...  An image of the fingerprint is captured by an optical scanner, enhanced, and converted into a template as shown in Fig.2(b) .  ... 
doi:10.1016/j.procs.2016.05.187 fatcat:najtvm4zxbe73km74irsgzhtr4

Multimodal Biometrics for Person Authentication using Hand Image

S. Sumathi, R. Rani Hema Malini
2013 International Journal of Computer Applications  
To obtain secure and accurate authentication system using most accepted biometrics Hand geometry in multimodal approach.  ...  In this proposed method Hand geometry and selected window size palm print features computed from same image is used for authentication. Integrating the features increases robustness of the system.  ...  Two different levels of fusion are applied for authentication such as score level fusion for the five finger surface features and decision level fusion for various modalities, based on the majority vote  ... 
doi:10.5120/12218-8400 fatcat:o7qb2ae6mzh3lbbjbusbuojvki

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Hiren D.Joshi
2012 International Journal of Computer Applications  
Multimodal system is developed through fusion of face and fingerprint recognition. The result is significantly improved by using multimodal biometric authentication.  ...  This paper suggests the multimodal biometrics system for identity verification using two traits: face and fingerprint.  ...  1% 14.45% 3.6% 1.53% 0.1% 41.32% 6.9% 4.30% 0.01% 62.5% 9.4% 6.6% 0.001% 66.27% 15.2% 10.33% Table 6 : 6 FRR Vs FAR in a Multimodal Biometric Authentication System  ... 
doi:10.5120/8132-1736 fatcat:ny3nmu3jfrgzfdfhl5pgofoznq

Combining Biometric Evidence for Person Authentication [chapter]

J. Bigun, J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez-Rodriguez
2005 Lecture Notes in Computer Science  
In particular, fingerprint and speech based systems will serve as illustration. A signal adaptive supervisor based on the input biometric signal quality is evaluated.  ...  Humans are excellent experts in person recognition and yet they do not perform excessively well in recognizing others only based on one modality such as single facial image.  ...  Only the index fingers of the first 75 users in the database are used in the experiments. 10 print samples (optical scanner) per user are selected, 3 of them (each one from a different level of control  ... 
doi:10.1007/11493648_1 fatcat:4fge63alsjcp3oqoy5ccvpw6cm

Signature-Based Biometric Authentication [chapter]

Srikanta Pal, Umapada Pal, Michael Blumenstein
2014 Studies in Computational Intelligence  
In a modern, civilized and advanced society, reliable authentication and authorization of individuals are becoming more essential tasks in several aspects of daily activities and as well as many different  ...  In the last few years, substantial efforts have been devoted to the development of biometric-based authentication systems.  ...  [10] fingerprint recognition or fingerprint authentication refers to the automated technique of verifying a match between two individual fingerprints [10] .  ... 
doi:10.1007/978-3-319-05885-6_13 fatcat:g5qrfp47cng3tlgeaa62ddcuqm

Mobile Behavioral Biometrics for Passive Authentication [article]

Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales, Alejandro Acien, Gael Le Lan
2022 arXiv   pre-print
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition have several shortcomings.  ...  In all cases, the fusion of modalities is very beneficial, leading to Equal Error Rates (EER) ranging from 4% to 9% depending on the modality combination in a 3-second interval.  ...  In such case, users would in fact have to repeatedly interrupt their activity to carry out the authentication process, for instance by placing their fingertip on the dedicated scanner or by typing in their  ... 
arXiv:2203.07300v1 fatcat:z2wu5ayjpvcn3owggoh6drbd2e

Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]

Benson-Emenike Mercy E., Sam-Ekeke Doris C.
2017 International Journal of Applied Information Systems  
This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable.  ...  Fusion of outputs from face, fingerprint and iris recognition systems is done at decision level using AND operation.  ...  This is shown in Table 2 . Evaluation Two types of evaluation are considered: System Performance Evaluation and Recognition Performance Evaluation.  ... 
doi:10.5120/ijais2017451699 fatcat:5x73mduy6rcb5b33y4ldfvu37q

Continuous Authentication with Keystroke Dynamics [chapter]
English

Patrick Bours, Soumik Mondal
2015 Gate to Computer Science and Research  
The continuous authentication system will lock out a user if the trust in genuineness of the current user is too low.  ...  We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the results in a new manner.  ...  This implies that a CA system does not depend on specific activities of the user, e.g. a CA system cannot be based on providing a fingerprint because that requires the user to present his finger to a fingerprint  ... 
doi:10.15579/gcsr.vol2.ch3 fatcat:xnosjqjxife6fmxmyz3jz274me

Deep Learning Based Person Authentication System using Fingerprint and Brain Wave

Rasika Deshmukh, Pravin Yannawar
2024 International Journal of Computing and Digital Systems  
In this innovative system, we leverage a combination of brainwave signals and fingerprint images to enhance security.  ...  This fusion results in an algorithm that effectively fine-tunes the DMN for optimal performance.  ...  to its high accuracy, affordability, and portability of fingerprint scanners, leading to numerous applications [7] .  ... 
doi:10.12785/ijcds/150153 fatcat:eokyqcpjg5c25iolgi2rhy7he4

Biometric Matching and Fusion System for Fingerprints from Non-Distal Phalanges [article]

Mehmet Kayaoglu, Berkay Topcu, Umut Uludag
2015 arXiv   pre-print
, and (iii) phalanx-type-based fusion.  ...  Utilizing a medium-size (50 individuals, 400 unique fingers, 1600 distinct images) database collected in our laboratory with a commercial optical fingerprint sensor, and a commercial minutiae extractor  ...  With projected further increases in (i) world population, and percentage of As our results indicate, multifinger (e.g. two fingers) fusion of sequentially obtained non-distal phalanges lead to authentication  ... 
arXiv:1505.04028v2 fatcat:nyruayfimrgslfl74vs5gros5y

Towards Usable and Secure Location-based Smartphone Authentication

Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim
2021 Symposium On Usable Privacy and Security  
To date, however, not much research has been conducted on investigating security and usability requirements for designing such location-based authentication services.  ...  Two participants mentioned "no support for fingerprint scanner." Only one participant mentioned battery drain as the reason. Intentions for future use.  ...  In this paper, we implemented a fully working indoor location-based authentication solution that does not require special hardware or a fingerprinted wireless signal map. Mehrabi et al.  ... 
dblp:conf/soups/ChoKHKLK21 fatcat:de5owmzntzdkjnyoygbl7jfau4

Assessment on Extraction and Matching of Finger Vein and Iris Pattern based Authentication System

2020 International journal of recent technology and engineering  
The finger vein pattern acquired under infrared light is used to design an accurate personal authentication system.  ...  The vein pattern is hidden inside the body and hence the problem of forgery in vein is consequently reduced when compared to fingerprint.  ...  The various steps involved in iris recognition Iris-recognition-scanners-vs-fingerprint-scanners IV.  ... 
doi:10.35940/ijrte.e6642.018520 fatcat:itnhlad3xrd5vf6eaw53ida55u

Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015

Luca Ghiani, David A. Yambay, Valerio Mura, Gian Luca Marcialis, Fabio Roli, Stephanie A. Schuckers
2017 Image and Vision Computing  
Fingerprints Part 2 has held steady at two submissions each competition in 2011 and 2013 and only one for the 2015 edition.  ...  system to determine if a biometric measure is authentic.  ...  LivDet 2013 Consensual vs.  ... 
doi:10.1016/j.imavis.2016.07.002 fatcat:5gry7e7crjcpzorsr6uvx2ozfe

BioPay: A Secure Payment Gateway through Biometrics

Gurpreet Singh.1*, Divyanshi Kaushik2
2021 Zenodo  
two main components, face recognition and fingerprint authentication that is required to be registered in the bank one time, so that registered data can be used as reference data during account fetching  ...  So, in the Second stage detected face is recognized by the fusion of Principle Component Analysis (PCA), Artificial Neural Network (ANN). It provides better accuracy in the face recognition system.  ... 
doi:10.5281/zenodo.5224633 fatcat:nahwaw4e4je67mga55oryes64y

Fingerprint Recognition [chapter]

Fernando Alonso-Fernandez, Josef Bigun, Julian Fierrez, Hartwig Fronthaler, Klaus Kollreider, Javier Ortega-Garcia
2009 Guide to Biometric Reference Systems and Performance Evaluation  
Two research systems are compared within the proposed framework. The evaluated systems follow different approaches for fingerprint processing and are discussed in detail.  ...  First, an overview of the state of the art in fingerprint recognition is presented, including current issues and challenges. Fingerprint databases and evaluation campaigns, are also summarized.  ...  Fig. 4 .1) are: a) fingerprint sensing, in which the fingerprint of an individual is acquired by a fingerprint scanner to produce a raw digital representation; b) preprocessing, in which the input fingerprint  ... 
doi:10.1007/978-1-84800-292-0_4 fatcat:x3a7z7nd2reulgwgwjbdyqpl2a
« Previous Showing results 1 — 15 out of 185 results