• Title/Summary/Keyword: fingerprint combination

Search Result 29, Processing Time 0.021 seconds

Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination

  • Zhang, Qiu-yu;Xu, Fu-jiu;Bai, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.522-539
    • /
    • 2021
  • In order to solve the problems of the existing audio fingerprint method when extracting audio fingerprints from long speech segments, such as too large fingerprint dimension, poor robustness, and low retrieval accuracy and efficiency, a robust audio fingerprint retrieval method based on feature dimension reduction and feature combination is proposed. Firstly, the Mel-frequency cepstral coefficient (MFCC) and linear prediction cepstrum coefficient (LPCC) of the original speech are extracted respectively, and the MFCC feature matrix and LPCC feature matrix are combined. Secondly, the feature dimension reduction method based on information entropy is used for column dimension reduction, and the feature matrix after dimension reduction is used for row dimension reduction based on energy feature dimension reduction method. Finally, the audio fingerprint is constructed by using the feature combination matrix after dimension reduction. When speech's user retrieval, the normalized Hamming distance algorithm is used for matching retrieval. Experiment results show that the proposed method has smaller audio fingerprint dimension and better robustness for long speech segments, and has higher retrieval efficiency while maintaining a higher recall rate and precision rate.

Audio Fingerprint Based on Combining Binary Fingerprints (이진 핑거프린트의 결합에 의한 강인한 오디오 핑거프린트)

  • Jang, Dal-Won;Lee, Seok-Pil
    • Journal of Broadcast Engineering
    • /
    • v.17 no.4
    • /
    • pp.659-669
    • /
    • 2012
  • This paper proposes the method to extract a binary audio fingerprint by combining several base binary fingerprints. Based on majority voting of base fingerprints, which are designed by mimicking the fingerprint used in Philips fingerprinting system, the proposed fingerprint is determined. In the matching part, the base fingerprints are extracted from the query, and distance is computed using the sum of them. In the experiments, the proposed fingerprint outperforms the base binary fingerprints. The method can be used for enhancing the existing binary fingerprint or for designing a new fingerprint.

Wifi Fingerprint Calibration Using Semi-Supervised Self Organizing Map (반지도식 자기조직화지도를 이용한 wifi fingerprint 보정 방법)

  • Thai, Quang Tung;Chung, Ki-Sook;Keum, Changsup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.536-544
    • /
    • 2017
  • Wireless RSSI (Received Signal Strength Indication) fingerprinting is one of the most popular methods for indoor positioning as it provides reasonable accuracy while being able to exploit existing wireless infrastructure. However, the process of radio map construction (aka fingerprint calibration) is laborious and time consuming as precise physical coordinates and wireless signals have to be measured at multiple locations of target environment. This paper proposes a method to build the map from a combination of RSSIs without location information collected in a crowdsourcing fashion, and a handful of labeled RSSIs using a semi-supervised self organizing map learning algorithm. Experiment on simulated data shows promising results as the method is able to recover the full map effectively with only 1% RSSI samples from the fingerprint database.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

A Study on the Recognition of Defected Fingerprint Using Chain Code (체인 코드를 이용한 훼손된 지문의 인식에 관한 연구)

  • 조민환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.63-68
    • /
    • 2003
  • Almost the system are usually taken by means of shapes and positions of ridge's end-points and bifurcation in the fingerprint recognition. but we studied about recognition of polluted fingerprint by chain code ridges. the results and sequence of processing are summarized as follows. (1)Capture several kinds of polluted fingerprint image. (2)Preprocessing(median filtering for removing noises, local and global histogram equalization, dilation and erosion, thinning and remove pseudo image), (3)Rebuild ridge line after Least Square Processing, (4)Compute distribution of chain code vector, (5)The results are almost same values of each vector of preprocessed fingerprint images. From the results, we can surmised more successful fingerprints recognition system in combination with other system by singular points

  • PDF

Fingerprint Image Generation using Filter Combination based on the Genetic Algorithm (GA기반 영상필터 조합을 이용한 지문영상생성)

  • Cho, Ung-Keun;Hong, Jin-Hyuk;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.455-464
    • /
    • 2007
  • The construction of a fingerprint database is important to evaluate the performance of an automatic fingerprint recognition system. Due to the cost of collecting fingerprints, there are only few benchmark databases available. Since it is hard to evaluate how robust the system is in various environments with the databases, this paper proposes a novel method that generates fingerprint images automatically from only a few training samples by using the genetic algorithm. Fingerprints generated by the proposed method include similar characteristics of those collected from the corresponding real environment. The proposed method has been verified by comparing with real fingerprint images, showing the usefulness of the method.

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors

  • Bharkad, Sangita;Kokare, Manesh
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.852-862
    • /
    • 2017
  • In this work a Discrete Cosine Transform (DCT)-based feature dimensionality reduced approach for fingerprint matching is proposed. The DCT is applied on a small region around the core point of fingerprint image. The performance of our proposed method is evaluated on a small database of Bologna University and two large databases of FVC2000. A dimensionally reduced feature vector is formed using only approximately 19%, 7%, and 6% DCT coefficients for the three databases from Bologna University and FVC2000, respectively. We compared the results of our proposed method with the discrete wavelet transform (DWT) method, the rotated wavelet filters (RWFs) method, and a combination of DWT+RWF and DWT+(HL+LH) subbands of RWF. The proposed method reduces the false acceptance rate from approximately 18% to 4% on DB1 (Database of Bologna University), approximately 29% to 16% on DB2 (FVC2000), and approximately 26% to 17% on DB3 (FVC2000) over the DWT based feature extraction method.

A Fingerprint Classification Method Based on the Combination of Gray Level Co-Occurrence Matrix and Wavelet Features (명암도 동시발생 행렬과 웨이블릿 특징 조합에 기반한 지문 분류 방법)

  • Kang, Seung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.870-878
    • /
    • 2013
  • In this paper, we propose a novel fingerprint classification method to enhance the accuracy and efficiency of the fingerprint identification system, one of biometrics systems. According to the previous researches, fingerprints can be categorized into the several patterns based on their pattern of ridges and valleys. After construction of fingerprint database based on their patters, fingerprint classification approach can help to accelerate the fingerprint recognition. The reason is that classification methods reduce the size of the search space to the fingerprints of the same category before matching. First, we suggest a method to extract region of interest (ROI) which have real information about fingerprint from the image. And then we propose a feature extraction method which combines gray level co-occurrence matrix (GLCM) and wavelet features. Finally, we compare the performance of our proposed method with the existing method which use only GLCM as the feature of fingerprint by using the multi-layer perceptron and support vector machine.

Fingerprint Classification using Multiple Decision Templates with SVM (SVM의 다중결정템플릿을 이용한 지문분류)

  • Min Jun-Ki;Hong Jin-Hyuk;Cho Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1136-1146
    • /
    • 2005
  • Fingerprint classification is useful in an automated fingerprint identification system (AFIS) to reduce the matching time by categorizing fingerprints. Based on Henry system that classifies fingerprints into S classes, various techniques such as neural networks and support vector machines (SVMs) have been widely used to classify fingerprints. Especially, SVMs of high classification performance have been actively investigated. Since the SVM is binary classifier, we propose a novel classifier-combination model, multiple decision templates (MuDTs), to classily fingerprints. The method extracts several clusters of different characteristics from samples of a class and constructs a suitable combination model to overcome the restriction of the single model, which may be subject to the ambiguous images. With the experimental results of the proposed on the FingerCodes extracted from NIST Database4 for the five-class and four-class problems, we have achieved a classification accuracy of $90.4\%\;and\;94.9\%\;with\;1.8\%$ rejection, respectively.