Approximate Computing for Biometric Security Systems: A Case Study on Iris Scanning

Author(s):  
Soheil Hashemi ◽  
Hokchhay Tann ◽  
Francesco Buttafuoco ◽  
Sherief Reda
Author(s):  
Mariya Nazarkevych ◽  
Serhii Dmytruk ◽  
Volodymyr Hrytsyk ◽  
Olha Vozna ◽  
Anzhela Kuza ◽  
...  

Background: Systems of the Internet of Things are actively implementing biometric systems. For fast and high-quality recognition in sensory biometric control and management systems, skeletonization methods are used at the stage of fingerprint recognition. The analysis of the known skeletonization methods of Zhang-Suen, Hilditch, Ateb-Gabor with the wave skeletonization method has been carried out and it shows a good time and qualitative recognition results. Methods: The methods of Zhang-Suen, Hildich and thinning algorithm based on Ateb-Gabor filtration, which form the skeletons of biometric fingerprint images, are considered. The proposed thinning algorithm based on Ateb-Gabor filtration showed better efficiency because it is based on the best type of filtering, which is both a combination of the classic Gabor function and the harmonic Ateb function. The combination of this type of filtration makes it possible to more accurately form the surroundings where the skeleton is formed. Results: Along with the known ones, a new Ateb-Gabor filtering algorithm with the wave skeletonization method has been developed, the recognition results of which have better quality, which allows to increase the recognition quality from 3 to 10%. Conclusion: The Zhang-Suen algorithm is a 2-way algorithm, so for each iteration, it performs two sets of checks during which pixels are removed from the image. Zhang-Suen's algorithm works on a plot of black pixels with eight neighbors. This means that the pixels found along the edges of the image are not analyzed. Hilditch thinning algorithm occurs in several passages, where the algorithm checks all pixels and decides whether to replace a pixel from black to white if certain conditions are satisfied. This Ateb-Gabor filtering will provide better performance, as it allows to obtain more hollow shapes, organize a larger range of curves. Numerous experimental studies confirm the effectiveness of the proposed method.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Author(s):  
John R. Regola ◽  
John K. Mitchell III ◽  
Brandon R. Baez ◽  
Syed S. Rizvi

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Jeffrey Kurebwa ◽  
Eunice Magumise

This study investigated the effectiveness of Zimbabwe's cyber security frameworks in combating terrorism. Media reports and scholarly evidence have constantly shown that cybercrime has led to loss of life, money, security, damage to property. There is a lot of concern among citizens of African countries such as Zimbabwe, Kenya, and Nigeria that their governments are not equipped with effective cyber security systems to combat these cyber threats. It is on the basis of these concerns that this study was carried out with the hope of helping to close policy and knowledge gaps affecting the effectiveness of the cyber security frameworks of Zimbabwe. The study used qualitative methodology and a case study research design was utilised. The study was conducted in Harare the capital city of Zimbabwe. Key informant interviews and documentary search were used to collect data. Among the findings of the study were that cyber fraud and theft are some of the significant cyber security threats in Zimbabwe; that Zimbabwe lacks established legislation and other regulatory institutions for cyber-security. Among the recommendations are; that the Ministry of Justice, Legal and Parliamentary Affairs enacts cyber security laws in Zimbabwe to combat cyber terrorism.


Sign in / Sign up

Export Citation Format

Share Document