1. Introduction
The process of verifying a person’s identity, also called authentication, plays an important role in various areas of everyday life. Any situation with user interaction where the identity is required needs a means to verify the claimed identity. One of the more obvious and commonly known application areas for identity verifying technologies, i.e. authentication, is the Logical Access Control to computer systems, where authenticity is normally established by confirming aclaimed identity with a secret password or PIN code.Traditional methods of confirming the identity of an unknown person rely either upon some secret knowledge (such as a PIN or password) or upon an object the person possesses (such as a key or card). But testing for secret knowledge or the possession of special objects can only confirm the knowledge or presence, and not, that the rightful owner is present. In fact, both could be stolen. Conversely, biometric technology is capable of establishing a much closer relationship between the user’s identity and a particular body, through its unique features or behavior.
Biometric verification performs comparison of biometric template with the one it has on records. Face recognition is one of the techniques used in biometric verification. While performing face recognition on mobile platform it does not only suffer from the same problems of a computer based system, such as illumination, occlusion and pose variations,
but is also limited by other factors: Limited Processing Power, Limited Memory [1]. To implement face recognition based authentication for incoming calls on mobile, existing algorithms suffers from recognition time and Accuracy Tradeoff i.e. increasing robustness will increase the time of reco...
... middle of paper ...
...a, M. Pietikainen and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns”, IEEE Trans. PAMI, vol.24, no.7, pp.971-987, Jul 2002.
[4] T.Ahonen, A.Hadid,“Face Recognition with Local Binary Patterns”, Computer Vision-ECCV 2004-Springer, Volume 3021/2004, 469-481.
[5] W.Zhang, S.Shan, ”Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition,” ICCV, vol. 1, pp.786-791, 2005.
[6]E.Vazquez-Fernandez, H.Garcia-Pardo, “Built-inface recognitionfor smart photo sharing in mobile devices”, IEEE 2011.
[7] OpenCV - Android Website, http://opencv.willowgarage.com/wiki/Android.
[8] L.Meylan, D.Alleysson, “Model of retinal local adaptation for the tone mapping of color filter array images”, Vol. 24,No. 9/September 2007/ J. Opt. Soc. Am. A, pp 2807-2816.
Martin, K. A. (1994). A brief history of the "feature detector". Cerebral Cortex, 4, 1-7.
(f) Spoof attacks and Template security: Spoof attack refers to the deliberate attempt to manipulate one’s biometric template in order to avoid recognition, or generate biometric artifacts in order to take someone’s identity. And still biometric systems are susceptible to attacked in a number of ways (Ratha et al., 2001). For example, a fingerprint recognition system can be circumvented by using fake or spoof fingers (Nandakumar et al., 2007, Nandakumar et al., 2007a). Behavioral traits like voice (Eriksson et al., 1997) and signature (Harrison et al., 1981) are more susceptible to such attacks than physiological traits. Security of biometric templates is also another critical issues in biometric systems. The stolen biometric template can be used to gain unauthorized access to the system (Adler, 2003, Cappelli et al., 2007, Ross et al., 2007).
Three dimensional motion capture requires more than one camera to create depth in the motion being performed. A good example is eyesight. If someone where unfortunate enough to only have one eye they would be unable to see the 3-D depth in motion. Having two eyes allows for depth in motion when seeing, which is similar to the idea of using two cameras in order to fully capture the depth in motion. One of the few techniques discovered and used in 3-D motion capture is Direct Linear Transform (DLT). Using the idea that, images from the cameras are determined by their placement to discover their distances, equations could be formed and used. Test subjects wear reflective markers to allow the cameras to follow their movement and motion through space. These reflective markers are placed on certain joins and parts of the body the researcher would like to study. The reflective markers ca...
SecurID is based on password and pin, a double layered access authentication principle. This technology is noted to have a more reliable level of user passwords. The cryptographic technology has the ability to automatically changes passwords every 60 seconds. The top benefit of SecurID helps positively identify users before they access critical confidential data systems. Each authenticator possesses a special symmetric key that is combined with an algorithm to create rapid one-time passwords (OTP). The OTP’s are stored in the Authentication Manager server for optimal security. OTP’s are established and known to the user – the PIN acts as a back-up layer which makes it extremely difficult for hackers to exploit. Strengthening vulnerabilities in access control mechanism with a layered technology, makes SecurID access keys a worthwhile product.
This paper will cover all of the information that is necessary to learn about the background information of chromatic adaptation and how it has come so far to this day. Chromatic adaptation is one aspect of vision that may trick your eyes in seeing things differently than they really are. There are many things in your daily life where chromatic adaptation occurs and you most likely won’t even realize it. For example “when you see a white piece of paper inside away from the natural sunlight the paper should look white, but once you view the paper outside in the natural sunlight the paper may seem bluish due to the sky’s waves hitting that piece of paper”( Sabine Süsstrunk, 2011)
The retina is the eye’s sensor. The purpose of the retina is to receive light focused from the lens, convert the light into nerve signals, and then to send these signals on to the brain (“Retina”). The retina processes the light through light-sensitive cells called rods and cones converting the signals into colors for the brain. Rods, in which there are many of one kind, are used for low-light (night vision) and do not sense color. Cones, however, have three different kinds corresponding to red, green and blue. The different light frequencies activate the appropriate colored cell or cells to interpret infinite numbers of colors. The photoreceptors converge on the optic nerve. Images are actually perceived by the brain, not seen by the eye. It can be compared to a camera as the image is seen with film or a memory card (Richards, 2014). Additionally, the image is reflected upside down, but the brain inverts it to be right-side up. This can also be compared to the function of the camera.
...hniques such as correlation-based matching, minutiae-based matching, and pattern-based (or image-based) matching uses standard dataset for testing purpose. But Practically due to some physical changes in finger during verification ,system gets failed. Various fingerprint matching techniques do not authenticate wrinkled fingers. Thus error rate gets increased when matching is done between dry and wet-wrinkled fingers .Thus proposed system will extract features which will not change even after wrinkling. The proposed system will use minutiae based matching due to which error rate can be reduced. The Wet and Wrinkled Fingerprint (WWF) dataset is used to check the performance of proposed system. In this dataset there are wrinkled fingers due to wetness also some samples of dry fingers. Thus proposed matching algorithm will improve fingerprint recognition for wet fingers.
Lyons et al. [6] Classifying facial attributes using a 2-D Gabor wavelet representation and discriminant analysis used a set of multi scale, multi orientation Gabor filters to transform the images first. The Gabor coef...
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
The invention of biometrics has revolutionized 21st century cyber security like never before and has become an integral part of modern society. Biometrics recognizes an individual’s physical and behavioral characteristics through fingerprint scanning, handprint scanning, voice recognition, etc. However, the problem with biometrics is often times its reliability can be questionable. This issue comes with plenty of symptoms because it can be unreliable in a variety of ways. Previous attempts in finding solutions fail to recognize the replication of data is possible. By solving this problem, security can be ensured more than it is now. Therefore, the advancement of biometrics can only be beneficial. Action does not have to be taken immediately,
2. Face recognition: Face recognition is based on both the shape and location of the eyes, eyebrows, nose, lips and chin. It is non intrusive method and very popular also. Facial recognition is carried out in two ways ...
Dina EL Menshawy, Hoda M. O. Mokhtar, Osman Hegazy, 2012, “Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.10, 58 - 92.
Biometrics can be used as a method of identification for accessing a computer, room, or anything where identity needs to be provided to access information or equipment. Some people resist biometrics because of the concerns in which their privacy will be invaded or they think technology is getting too intrusive on people personal lives. Biometrics is not flawless and does have some privacy related issues. There are mechanism that can be put in place which could mitigate these problems and concerns. Some biometrics may not meet due to undue resistance from potential users and may be recommended to the manager to use password-based access controls instead.
As one of the feature of biometric, signature verification is used to find the authenticity of a person to give the access the most valued and important documents and shelf. Firstly the signature of a person are taken as a reference in database. To generate the database, number of attempts from the same person has been taken, as it would permit minute deviations in signatures that generates due to environmental conditions. Once it is done, then the signatures at other times are every time then verified with the existing database. Because of confidentially of the file/document/transaction giving access is the crucial process that should be monitored with perfection. The same happens with offline signature verification. Computerized process and verification algorithm (thus software) takes fully care of signature under test, generate results that are 100% authentic, and advocates credibility of the concerned person .However, there might raise issue of authenticity even if the same person performs the signature. Or, at times a forge person may duplicate the exact signature. Many research have been done to find the accuracy of result so as to prevent from forgery. Forgery is also divided into different categories depending upon their severity as