• Title/Summary/Keyword: Biometrics Recognition

Search Result 219, Processing Time 0.024 seconds

Enter Control System using Tooth Recognition (치아 인식을 이용한 출입 통제 시스템)

  • 조혜진;최연성;김동호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.231-234
    • /
    • 2002
  • This paper considers a system related to biometrics which can control entrance and exit based on pattern and feature of a tooth. It is aimed at research and development of a controling entrance and exit system connected advanced image understanding technique using a tooth recognition that treats a tooth of simple and fixed structure. We think that the system is applied(or utilized) as pre-step or assistance means of face recognition and expect that the system achieves greatly effective results.

  • PDF

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

Face Recognition System for Unattended reception interface (무인 접수 인터페이스를 위한 얼굴인식 시스템)

  • Park, Se-Hyun;Ryu, Jeong-Tak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.1-7
    • /
    • 2012
  • As personal information is utilized as an important user authentication means, a trustable certification means is being required. Recently, a research on the biometrics system using a part of the human body like a password is being attempted a lot. The face recognition technology using characteristics of the personal face among several biometrics technologies is easy in extracting features. In this paper, we implement a face recognition system for unattended reception interface. Our method is performed by two steps. Firstly the face is extracted using Haar-like feature method. Secondly the method combining PCA and LDA for face recognition was used. To assess the effectiveness of the proposed system, it was tested and experimental results show that the proposed method is applicable for unattended reception interface.

Development of a Hybrid Recognition System Using Biometrics to Manage Smart Devices based on Internet of Things

  • Ban, Ilhak;Jo, Seonghun;Park, Haneum;Um, Junho;Kim, Se-Jin
    • Journal of Integrative Natural Science
    • /
    • v.11 no.3
    • /
    • pp.148-153
    • /
    • 2018
  • In this paper, we propose a hybrid-recognition system to obtain the state information and control the Internet of Things (IoT) based smart devices using two recognitions. First, we use a facial recognition for checking the owner of the mobile devices, i.e., smartphones, tablet PCs, and so on, and obtaining the state information of the IoT based smart devices, i.e., smart cars, smart appliance, and so on, and then we use a fingerprint recognition to control them. Further, in the conventional system, the message of the state and control information between the mobile devices and smart devices is only exchanged through the cellar mobile network. Thus, we also propose a direct communication to reduce the total transmission time. In addition, we develop a testbed of the proposed system using smartphones, desktop computers, and Arduino vehicle as one of the smart devices. We evaluate the total transmission time between the conventional and direct communications and show that the direct communication with the proposed system has better performance.

Design and Implementation of Biometrics Security System Using photoplethysmogram (광용적맥파를 이용한 생체인식 보안시스템의 설계 및 구현)

  • Kim, Hyen-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.53-60
    • /
    • 2010
  • Biometrics are methods of recognizing a person based on the physiological or behavioral characteristics of his of her body. They are highly secure with little risk of loss or falsification by others. This paper has designed and implemented a security system of biometrics by precisely measuring heartbeat signals at two fingertips and using a photoplethysmogram, which is applicable to biometrics. A performance evaluation has led to the following result. The security system of biometrics for personal authentication which has been designed and implemented by this study has achieved a recognition rate of 90.5%. The security system of biometrics suggested here has merits of time saving and easy accessibility. The system is touch-based and collects the necessary biometrics information by simply touching the machine with fingers, so anyone can utilize the system without any difficulty.

A Quality Assessment Method of Biometrics for Estimating Authentication Result in User Authentication System (사용자 인증시스템의 인증결과 예측을 위한 바이오정보의 품질평가기법)

  • Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.242-246
    • /
    • 2010
  • In this paper, we propose a quality assessment method of biometrics for estimating an authentication result in an user authentication system. The proposed quality assessment method is designed to compute a quality score called CIMR (Confidence Interval Matching Ratio) as a result by small-sample analysis like T-test. We use the C/MR-based quality assessment method for testing how to well draw a distinction between various biometrics in a multimodal biometric system. We also test a predictability for authentication results of obtained biometrics using the mean $\bar{X}$ and the variance $s^2$ in T-test-based CIMR. As a result, we achieved the maximum 88% accuracy for estimation of user authentication results.

A Novel and Efficient Feature Extraction Method for Iris Recognition

  • Ko, Jong-Gook;Gil, Youn-Hee;Yoo, Jang-Hee;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.399-401
    • /
    • 2007
  • With a growing emphasis on human identification, iris recognition has recently received increasing attention. Iris recognition includes eye imaging, iris segmentation, verification, and so on. In this letter, we propose a novel and efficient iris recognition method which employs a cumulative-sum-based grey change analysis. Experimental results demonstrate that the proposed method can be used for human identification in efficient manner.

  • PDF

Implementation for the Biometric User Identification System Based on Smart Card (SMART CARD 기반 생체인식 사용자 인증시스템의 구현)

  • 주동현;고기영;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.25-31
    • /
    • 2004
  • This paper is research about the improvement of recognition rate of the biometrics user identification system using the data previously stored in the non contact Ic smart card. The proposed system identifies the user by analyzing the iris pattern his or her us. First, after extracting the area of the iris from the image of the iris of an eye which is taken by CCD camera, and then we save PCA Coefficient using GHA(Generalized Hebbian Algorithm) into the Smart Card. When we confirmed the users, we compared the imformation of the biometrics of users with that of smart card. In case two kinds of information was the same, we classified the data by using SVM(Support Vector Machine). The Experimental result showed that this system outperformed the previous developed system.

  • PDF

PC-based Hand-Geometry Verification System

  • Kim Young-Tak;Kim Soo-Jong;Lee Chang-Gyu;Kim Gwan-Hyung;Kang Sung-In;Lee Jae-Hyun;Tack Han-Ho;Lee Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.3
    • /
    • pp.247-254
    • /
    • 2006
  • Biometrics are getting more and more attention in recent years for security and other concerns. So far, only fingerprint recognition has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry can be used for biometric verification and identification because of its acquisition convenience and good performance for verification and identification performance. It could also be a good candidate for online checks. Therefore, this paper proposes a Hand-Geometry recognition system based on geometrical features of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. This paper proposes thirty relevant features for a Hand-Geometry recognition system. This system presents verification results based on hand measurements of 20 individuals. The verification process has been tested on a size of $320{\times}240$ image, and result of the verification process have hit rate of 95% and FAR of 0.020.

Forecast and Present Technology of Hand Vascular Pattern Recognition System (손혈관 인식 시스템의 경쟁기술현황과 전망)

  • Kim, Jae-Woo;Yeo, Woon-Dong;Bae, Sang-Jin;Seong, Kyung-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.114-116
    • /
    • 2004
  • Biometrics consist of technologies that support automatic identification or verification of identity based on behavioral or physical traits. Biometrics can authenticate identities since they measure unique individual characteristics including fingerprints, hand geometry, iris, hand vascular patterns and facial characteristics. we review the state of the hand vascular patterns identification technology and compare other competitive authentication technologies such as cryptography, electronic signature and PKI.

  • PDF