• Title/Summary/Keyword: Vein-recognition

Search Result 58, Processing Time 0.024 seconds

A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition

  • Zhong, Zhen;Gao, Wanlin;Wang, Minjuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.131-146
    • /
    • 2021
  • Multimodal biometric-based recognition has been an active topic because of its higher convenience in recent years. Due to high user convenience of finger, finger-based personal identification has been widely used in practice. Hence, taking Finger-Print (FP), Finger-Vein (FV) and Finger-Knuckle-Print (FKP) as the ingredients of characteristic, their feature representation were helpful for improving the universality and reliability in identification. To usefully fuse the multimodal finger-features together, a new robust representation algorithm was proposed based on hierarchical model. Firstly, to obtain more robust features, the feature maps were obtained by Gabor magnitude feature coding and then described by Local Binary Pattern (LBP). Secondly, the LGBP-based feature maps were processed hierarchically in bottom-up mode by variable rectangle and circle granules, respectively. Finally, the intension of each granule was represented by Local-invariant Gray Features (LGFs) and called Hierarchical Local-Gabor-based Gray Invariant Features (HLGGIFs). Experiment results revealed that the proposed algorithm is capable of improving rotation variation of finger-pose, and achieving lower Equal Error Rate (EER) in our homemade database.

A Study on Eyelid and Eyelash Localization for Iris Recognition (홍채 인식에서의 눈꺼풀 및 눈썹 추출 연구)

  • Kang, Byung-Joon;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.898-905
    • /
    • 2005
  • Iris recognition Is that identifies a user based on the unique iris muscle patterns which has the functionalities of dilating or contracting pupil region. Because it is reported that iris recognition is more accurate than other biometries such as face, fingerprint, vein and speaker recognition, iris recognition is widely used in the high security application domain. However, if unnecessary information such as eyelid and eyelash is included in iris region, the error for iris recognition is increased, consequently. In detail, if iris region is used to generate iris code including eyelash and eyelid, the iris codes are also changed and the error rate is increased. To overcome such problem, we propose the method of detecting eyelid by using pyramid searching parabolic deformable template. In addition, we detect the eyelash by using the eyelash mask. Experimental results show that EER(Equal Error Rate) for iris recognition using the proposed algorithm is lessened as much as $0.3\%$ compared to that not using it.

  • PDF

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF

Arteriovenous Fistula following Lumbar Laminectomy - A Case - (요추궁 절제술 후 발생한 동정맥루)

  • 오중환
    • Journal of Chest Surgery
    • /
    • v.24 no.6
    • /
    • pp.605-609
    • /
    • 1991
  • The formation of postlaminectomy arteriovenous fistula is unusual and the rongeur during discectomy with resultant simultaneous damage to artery and vein is causative. The delay in diagnosis is particularly distressing. The presence of a palpable abdominal thrill or bruit with or without congestive heart failure should results in a high index of suspicion of this entity. Prompt recognition and surgical closure of the post-laminectomy arteriovenous iliac fistula are most important in successful management.

  • PDF

User Recognition of Each Personal Identification Technique based on the Biometrics (생체인식기술 기반 개인인증수단에 따른 사용자 인식)

  • Yook, Moses;Kim, Hee-Yeon;Shim, Hye-Rin
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.11-19
    • /
    • 2016
  • The personal identification based on the biometrics has emerged as one of the new trend. This study attempted to explore and examine the user recognition in the use of the personal identification based on the biometrics in the respect of self-efficacy, trustiness, security, and safety alongside the effect of the recognition on the future use intention through survey. The result of this study demonstrated the effect on the use intention of the perceived trustiness and ease of the fingerprint identification, perceived ease of the iris identification and the perceived trustiness of the vein identification. The result of this study is expected to suggest direction on the application of the biometrics considering user recognition.

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor (광학식 지문센서에서의 위조 지문 검출 방법)

  • Lee, Ji-Sun;Kim, Jae-Hwan;Chae, Jin-Seok;Lee, Byoung-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.492-503
    • /
    • 2008
  • With the recent development and increasing importance of personal identification systems, biometric technologies with less risk of loss or unauthorized use are being popularized rapidly. In particular, because of their high identification rate and convenience, fingerprint identification systems are being used much more commonly than other biometric systems such as iris recognition, face recognition and vein pattern recognition. However, a fingerprint identification system has the problem that artificially forged finger-prints can be used as input data. Thus, in order to solve this problem, the present study proposed a method for detecting forged fingerprints by measuring the degree of attenuation when the light from an optical fingerprint sensor passes through the finger and analyzing changes in the transmission of light over stages at fixed intervals. In order to prove improvement in the performance of the proposed system, we conducted an experiment that compared the system with an existing multi-sensor recognition system that measures also the temperature of fingerprint. According to the results of the experiment, the proposed system improved the forged fingerprint detection rate by around 32.6% and this suggests the possibility of solving the security problem in fingerprint identification systems.

  • PDF

Lemierre Syndrome in Adolescent with Active Ulcerative Colitis

  • Unic, Josipa;Kovacic, Matea;Jakovljevic, Gordana;Batos, Ana Tripalo;Grmoja, Tonci;Hojsak, Iva
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.21 no.3
    • /
    • pp.214-217
    • /
    • 2018
  • Inflammatory bowel disease (IBD) is a well-recognized risk factor for thrombotic events in adults but data on children are scarce. In the great majority of adult patients, thrombotic events are usually deep vein thrombosis and pulmonary embolism. Other sites such as jugular veins are extremely rare. We present a case of Lemierre syndrome in an adolescent girl with active ulcerative colitis and discuss possible risk factors. This is the first reported case of severe Lemierre syndrome with thrombus extension to cranial veins in a patient with ulcerative colitis. Early recognition of Lemierre syndrome in patients who present with rapidly worsening symptoms of neck pain, fever and signs of pharyngitis is imperative because it increases a chance of favorable prognosis. It is important for pediatricians treating IBD patients not to underestimate possible thrombotic events in children with IBD. Recognition of additional risk factors is crucial for prompt diagnosis and adequate treatment.

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.