biometric verification
Recently Published Documents


TOTAL DOCUMENTS

245
(FIVE YEARS 19)

H-INDEX

20
(FIVE YEARS 0)

Author(s):  
Ram Khanna

Out of the numerous confirmations conspires in this paper, we are attempting to focus on the exhibition and grouping of one of the validation strategies, biometric verification. Even though endeavours of the whole global biometric local area, the estimation of the precision of a biometric framework is far to be totally examined and, ultimately, normalized. The paper presents a basic examination of the analysis of accuracy and execution of a biometric framework.


Author(s):  
Xingbo Dong ◽  
Soohyong Kim ◽  
Zhe Jin ◽  
Jung Yeon Hwang ◽  
Sangrae Cho ◽  
...  

Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity credentials and biometrics. Several practical questions related to the implementation of biometric cryptosystems remain open, especially in regard to biometric template protection. In this article, we propose a face cryptosystem for identification (FCI) in which only biometric input is needed. Our FCI is composed of a one-to-N search subsystem for template protection and a one-to-one match chaff-less fuzzy vault (CFV) subsystem for secret protection. The first subsystem stores N facial features, which are protected by index-of-maximum (IoM) hashing, enhanced by a fusion module for search accuracy. When a face image of the user is presented, the subsystem returns the top k matching scores and activates the corresponding vaults in the CFV subsystem. Then, one-to-one matching is applied to the k vaults based on the probe face, and the identifier or secret associated with the user is retrieved from the correct matched vault. We demonstrate that coupling between the IoM hashing and the CFV resolves several practical issues related to fuzzy vault schemes. The FCI system is evaluated on three large-scale public unconstrained face datasets (LFW, VGG2, and IJB-C) in terms of its accuracy, computation cost, template protection criteria, and security.


Author(s):  
A. A. Kulikov

The paper presents an analytical review of the application of biometric recognition systems in relation to facial image identification technologies. The classification of biometric systems is presented. The trends of technological progress in the field of biometrics and facial recognition capabilities are considered. It is determined that in 2020 there is a trend of transition from the use of biometric recognition technologies in traditional state security systems to the sphere of commercial and user applications. The process of «linking» encryption keys and passwords with the biometric parameters of the data subject is described. It is proposed that a biometric feature and a biometrics parameter mean a certain value that has a physical meaning that characterizes the subject itself. The possibility of using circular neighborhood and bilinear interpolation of pixel intensity values in biometrics is also presented. This will make it possible to build a local binary template. In order to solve the problem of identification of persons, it is advisable to investigate the essence of biometric systems in the technologies of identification of persons, their types, identifying the shortcomings of each of them, on the basis of which to present the directions of elimination and search for the most reliable technologies. The essence of the use of biometric systems in the technologies of identification of persons is, for example, that the user can provide the bank or other counterparty with evidence that it is he who wants to use the services on his accounts. At the same time, the demand has increased for contactless biometric solutions. These technologies are implemented in order to conduct additional biometric verification of users. This allows to minimize possible fraud or violation of the internal rules of the service, for example, the transfer of accounts of some registered users to others.


2021 ◽  
Author(s):  
Syed Sadaf Ali ◽  
Vivek Singh Baghel ◽  
Iyyakutti Iyappan Ganapathi ◽  
Surya Prakash ◽  
Ngoc-Son Vu ◽  
...  

2021 ◽  
Vol 1 (2) ◽  
pp. 156-164
Author(s):  
Basna Mohammed Salih ◽  
Adnan Mohsin Abdulazeez ◽  
Omer Mohammed Salih Hassan

Biometric authentication is one of the most quickly increasing innovations in today's world; this promising technology has seen widespread use in a variety of fields, including surveillance services, safe financial transfers, credit-card authentication. in biometric verification processes such as gender, age, ethnicity is iris recognition technology is considered the most accurate compared to other vital features such as face, hand geometry, and fingerprints.  Because the irises in the same person are not similar. In this work, the study of gender classification using Artificial Neural Networks (ANN) based on iris recognition. The eye image data were collected from the IIT Delhi IRIS Database. All datasets of images were processed using various image processing techniques using the neural network. The results obtained showed high performance in training and got good results in testing. ANN's training and testing process gave a maximum performance at 96.4% and 97% respectively.


2021 ◽  
Vol 7 ◽  
pp. e549
Author(s):  
Mariana R.F. Mota ◽  
Pedro H.L. Silva ◽  
Eduardo J.S. Luz ◽  
Gladston J.P. Moreira ◽  
Thiago Schons ◽  
...  

Due to the application of vital signs in expert systems, new approaches have emerged, and vital signals have been gaining space in biometrics. One of these signals is the electroencephalogram (EEG). The motor task in which a subject is doing, or even thinking, influences the pattern of brain waves and disturb the signal acquired. In this work, biometrics with the EEG signal from a cross-task perspective are explored. Based on deep convolutional networks (CNN) and Squeeze-and-Excitation Blocks, a novel method is developed to produce a deep EEG signal descriptor to assess the impact of the motor task in EEG signal on biometric verification. The Physionet EEG Motor Movement/Imagery Dataset is used here for method evaluation, which has 64 EEG channels from 109 subjects performing different tasks. Since the volume of data provided by the dataset is not large enough to effectively train a Deep CNN model, it is also proposed a data augmentation technique to achieve better performance. An evaluation protocol is proposed to assess the robustness regarding the number of EEG channels and also to enforce train and test sets without individual overlapping. A new state-of-the-art result is achieved for the cross-task scenario (EER of 0.1%) and the Squeeze-and-Excitation based networks overcome the simple CNN architecture in three out of four cross-individual scenarios.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2859
Author(s):  
Seong-Yun Jeon ◽  
Mun-Kyu Lee

With the recent advances in mobile technologies, biometric verification is being adopted in many smart devices as a means for authenticating their owners. As biometric data leakage may cause stringent privacy issues, many proposals have been offered to guarantee the security of stored biometric data, i.e., biometric template. One of the most promising solutions is the use of a remote server that stores the template in an encrypted form and performs a biometric comparison on the ciphertext domain, using recently proposed functional encryption (FE) techniques. However, the drawback of this approach is that considerable computation is required for the inner-pairing product operation used for the decryption procedure of the underlying FE, which is performed in the authentication phase. In this paper, we propose an enhanced method to accelerate the inner-pairing product computation and apply it to expedite the decryption operation of FE and for faster remote biometric verification. The following two important observations are the basis for our improvement—one of the two arguments for the decryption operation does not frequently change over authentication sessions, and we only need to evaluate the product of multiple pairings, rather than individual pairings. From the results of our experiments, the proposed method reduces the time required to compute an inner-pairing product by 30.7%, compared to the previous best method. With this improvement, the time required for biometric verification is expected to decrease by up to 10.0%, compared to a naive method.


Sign in / Sign up

Export Citation Format

Share Document