دانلود و نمایش مقالات مرتبط با Biometrics::صفحه 1
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - Biometrics

تعداد مقالات یافته شده: 108
ردیف عنوان نوع
1 Adaptive Management of Multimodal Biometrics—A Deep Learning and Metaheuristic Approach
مدیریت تطبیقی بیومتریک چند حالته - یادگیری عمیق و رویکرد فرا مکاشفه ای-2021
This paper introduces the framework for adaptive rank-level biometric fusion: a new approach towards personal authentication. In this work, a novel attempt has been made to identify the optimal design parameters and framework of a multibiometric system, where the chosen biometric traits are subjected to rank-level fusion. Optimal fusion parameters depend upon the security level demanded by a particular biometric application. The proposed framework makes use of a metaheuristic approach towards adaptive fusion in the pursuit of achieving optimal fusion results at varying levels of security. Rank-level fusion rules have been employed to provide optimum performance by making use of Ant Colony Optimization technique. The novelty of the reported work also lies in the fact that the proposed design engages three biometric traits simultaneously for the first time in the domain of adaptive fusion, so as to test the efficacy of the system in selecting the optimal set of biometric traits from a given set. Literature reveals the unique biometric characteristics of the fingernail plate, which have been exploited in this work for the rigorous experimentation conducted. Index, middle and ring fingernail plates have been taken into consideration, and deep learning feature-sets of the three nail plates have been extracted using three customized pre-trained models, AlexNet, ResNet-18 and DenseNet-201. The adaptive multimodal performance of the three nail plates has also been checked using the already existing methods of adaptive fusion designed for addressing fusion at the score-level and decision- level. Exhaustive experiments have been conducted on the MATLAB R2019a platform using the Deep Learning Toolbox. When the cost of false acceptance is 1.9, experimental results obtained from the proposed framework give values of the average of the minimum weighted error rate as low as 0.0115, 0.0097 and 0.0101 for the AlexNet, ResNet-18 and DenseNet-201 based experiments respectively. Results demonstrate that the proposed system is capable of computing the optimal parameters for rank-level fusion for varying security levels, thus contributing towards optimal performance accuracy.© 2021 Elsevier B.V. All rights reserved.
Keywords: Adaptive Biometric Fusion | Ant Colony Optimization | Deep Learning | Fingernail Plate | Multimodal Biometrics | Rank-level Adaptive Fusion
مقاله انگلیسی
2 Efficient biometric-based identity management on the Blockchain for smart industrial applications
مدیریت هویت مبتنی بر بیومتریک کارآمد در Blockchain برای کاربردهای صنعتی هوشمند-2021
In this work, we propose a new Blockchain-based Identity Management system for smart industry. First, we describe an efficient biometric-based anonymous credential scheme, which supports selective disclosure, suspension/thaw and revocation of credentials/entities. Our system provides non-transferability through a freshly computed hidden biometric attribute, which is generated using a secure fuzzy extractor during each authentication. This mechanism combined with offchain storage guarantees GDPR compliance, which is required for protecting user’s data. We define blinded (Brands) DLRep scheme to provide multi-show unlinkability, which is a lacking feature in Brands’ credential based systems. For larger organizations, we re-design the system by replacing the Merkle Tree with an accumulator to improve scalability. The new system enables auditing by adapting the standard Industrial IoT (IIoT) Identity Management Lifecycle to Blockchain. Finally, we show that the new proposal outperforms BASS, i.e. the most recent blockchain-based anonymous credential scheme designed for smart industry. The computational cost at the user-side (can be a weak IoT device) of our scheme is 8-times less than that of BASS. Thus, our system is more suitable for IIoT.© 2020 Elsevier B.V. All rights reserved.
Keywords: Identity management | Smart industry | Blockchain | Non-transferability | Biometrics | DLRep | Multi-show unlinkability | Selective disclosure | Accumulators
مقاله انگلیسی
3 Person-identification using familiar-name auditory evoked potentials from frontal EEG electrodes
شناسایی فرد با استفاده از پتانسیل نام-آشنا شنوایی الکترودهای EEG جلو برانگیخته-2021
Electroencephalograph (EEG) based biometric identification has recently gained increased attention of re- searchers. However, state-of-the-art EEG-based biometric identification techniques use large number of EEG electrodes, which poses user inconvenience and consumes longer preparation time for practical applications. This work proposes a novel EEG-based biometric identification technique using auditory evoked potentials (AEPs) acquired from two EEG electrodes. The proposed method employs single-trial familiar-name AEPs extracted from the frontal electrodes Fp1 and F7, which facilitates faster and user-convenient data acquisition. The EEG signals recorded from twenty healthy individuals during four experiment trials are used in this study. Different com- binations of well-known neural network architectures are used for feature extraction and classification. The cascaded combinations of 1D-convolutional neural networks (1D-CNN) with long short-term memory (LSTM) and with gated recurrent unit (GRU) networks gave the person identification accuracies above 99 %. 1D-convolutional, LSTM network achieves the highest person identification accuracy of 99.53 % and a half total error rate (HTER) of 0.24 % using AEP signals from the two frontal electrodes. With the AEP signals from the single electrode Fp1, the same network achieves a person identification accuracy of 96.93 %. The use of familiar-name AEPs from frontal EEG electrodes that facilitates user convenient data acquisition with shorter preparation time is the novelty of this work.
Keywords: Auditory evoked potential | Biometrics | Deep learning | Electroencephalogram | Familiar-name | Person identification
مقاله انگلیسی
4 A novel multi-lead ECG personal recognition based on signals functional and structural dependencies using time-frequency representation and evolutionary morphological CNN
تشخیص شخصی نوار قلب ECG مبتنی بر وابستگی های عملکردی و ساختاری سیگنالها با استفاده از نمایش فرکانس زمان و CNN مورفولوژیکی تکاملی-2021
Biometric recognition systems have been employed in many aspects of life such as security technologies, data protection, and remote access. Physiological signals, e.g. electrocardiogram (ECG), can potentially be used in biometric recognition. From a medical standpoint, ECG leads have structural and functional dependencies. In fact, precordial ECG leads view the heart from different axial angles, whereas limb leads view it from various coronal angles. This study aimed to design a personal biometric recognition system based on ECG signals by estimating these latent medical variables. To estimate functional dependencies, within-correlation and cross- correlation in time-frequency domain between ECG leads were calculated and represented in the form of extended adjacency matrices. CNN trees were then introduced through genetic programming for the automated estimation of structural dependencies in extended adjacency matrices. CNN trees perform the deep feature learning process by using structural morphology operators. The proposed system was designed for both closed-set identification and verification. It was then tested on two datasets, i.e. PTB and CYBHi, for performance evaluation. Compared with the state-of-the-art methods, the proposed method outperformed all of them.
Keywords: Biometrics | Electrocardiogram | Functional dependencies | Structural dependencies | Genetic programming | Convolutional neural networks
مقاله انگلیسی
5 Evaluation of infrared thermography combined with behavioral biometrics for estrus detection in naturally cycling dairy cows
ارزیابی ترموگرافی مادون قرمز همراه با بیومتریک رفتاری برای تشخیص فحلی در گاوهای شیری دوچرخه سواری طبیعی-2021
Low estrus detection rates (>50%) are associated to extended calving intervals, low economic profit and reduced longevity in Holstein dairy cows. The objective of this study was to evaluate the accuracy of infrared thermography and behavioral biometrics combined as potential estrus alerts in naturally (not induced) cycling dairy cows housed in a tie-stall barn. Eighteen first lactation cows were subjected to transrectal ultrasonography to determine spontaneous ovulation. The dominant follicle (DF) disappearance was used retrospectively as an indirect indicator of ovulation, and to establish the estrus period (48–24 h prior the DF disappearance). Raw skin temperature (Raw IR) and residual skin temperature (Res IR) were recorded using an infrared camera at the Vulva area with the tail (Vtail), Vulva area without the tail (Vnotail), and Vulva’s external lips (Vlips) at AM and PM milking from Day 14 until two days after ovulation was confirmed. Behavioral biometrics were recorded on the same schedule as infrared scan. Behavioral biometrics included large hip movements (L-hip), small hip movements (S-hip), large tail movements and small tail movements to compare behavioral changes between estrus and nonestrus periods. Significant increases in Raw IR skin temperature were observed two days prior to ovulation (Vtail; 35.93 ± 0.27 C, Vnotail; 35.59 ± 0.27 C, and Vlips; 35.35 ± 0.27 C) compared to d 5 (Proestrus; Vtail; 35.29 ± 0.27 C, Vnotail; 34.93 ± 0.31 C, and Vlips; 34.68 ± 0.27 C). No significant changes were found for behavioral parameters with the exception of S-hip movements, which increased at two days before ovulation (d 2; 11.13 ± 1.44 Events/5min) compared to d 5 (7.30 ± 1.02 Events/5min). To evaluate the accuracy of thermal and behavioral biometrics, receiver operating characteristic curve analysis was performed using Youden index (YJ), diagnostic odds ratio, positive likelihood ratio (LR+), Sensitivity, Specificity and Positive predicted value to score the estrus alerts. The greatest accuracy achieved using thermal parameters was for Res IR Vtail PM (YJ = 0.34) and L-hip PM (YJ = 0.27) for behavioral biometrics. Combining thermal and behavioral parameters did not improve the YJ index score but reduced the false-positive occurrence observed by increasing the diagnostic odds ratio (26.62), LR+ (12.47), Specificity (0.97) and positive predicted value (0.90) in a Res IR Vtail PM, S-hip AM, S-hip PM combination. The combination of thermal and behavioral parameters increased the accuracy of estrus detection compared to either thermal or behavioral biometrics, independently in naturally cycling cows during milking.
Keywords: Combined-parameters | First-lactating | Movement-frequency | Preovulation | Skin temperature
مقاله انگلیسی
6 Open code biometric tap pad for smartphones
باز کردن کد ضربه گیر بیومتریک برای تلفن های هوشمند-2021
Poor security practices among smartphone users, such as the use of simple, easily guessed passcodes for logins, are a result of the effort required to memorize stronger ones. In this paper, we devise a concept of ‘‘open code’’ biometric tap pad to authenticate smartphone users, which eliminates the need of memorizing secret codes. A biometric tap pad consists of a grid of buttons each labeled with a unique digit. The user attempting to log into the phone will tap these buttons in a given sequence. He/she will not memorize this tap sequence. Instead, the sequence will be displayed on the screen. The focus here is how the user types the sequence. This typing behavior is used for authentication. An open code biometric tap pad has several advantages, such as(1) users do not need to memorize passcodes, (2) manufacturers do not need to include extra sensors, and (3) onlookers have no chance to practice shoulder-surfing. We designed three tap pads and incorporated them into an Android app. We evaluated the performance of these tap pads by experimenting with three sequence styles and five different fingers: two thumbs, two index fingers, and the ‘‘usual’’ finger. We collected data from 33 participants over two weeks. We tested three machine learning algorithms: Support Vector Machine, Artificial Neural Network, and Random Forest. Experimental results show significant promise of open code biometric tap pads as a solution to the problem of weak smartphone security practices used by a large segment of the population.
Keywords: Smartphone security | Behavioral biometrics | Touchscreen behavior | Open code | Biometric tap pad
مقاله انگلیسی
7 Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources
استخراج کننده فازی بدون تلفات ، احراز هویت ایمن را با استفاده از منابع پر سر و صدا کم آنتروپی فعال کرد-2021
Fuzzy extractor provides a way for key generation from biometrics and other noisy data. It has been widely applied in biometric authentication systems that provides natural and passwordless user authentication. In general, given a random sample, a fuzzy extractor extracts a nearly uniform random string, and subsequently regenerates the string using a different yet similar noisy sample. However, due to error tolerance between the two samples, fuzzy extractor imposes high information loss (entropy) and thus, it only works for an input with high enough entropy. In this work, we propose a lossless fuzzy extractor for a large family of sources. The proposed lossless fuzzy extractor can be adopted for a wider range of random sources to extract an arbitrary number of nearly uniform random strings. Besides, we formally defined a new entropy measurement, named as equal error entropy, to measure the entropy loss in reproducing a bounded number of random strings. When the number of random strings is large enough, the equal error entropy is minimized and necessary for performance evaluation on the authentication using the extracted random strings.
Keywords: Authentication | Biometric | Fuzzy extractor | Secure sketch
مقاله انگلیسی
8 A cancelable biometric authentication system based on feature-adaptive random projection
یک سیستم احراز هویت بیومتریک قابل لغو بر اساس طرح تصادفی سازگار با ویژگی-2021
Biometric template data protection is critical in preventing user privacy and identity from leakage. Random projection based cancelable biometrics is an efficient and effective technique to achieve biometric template protection. However, traditional random projection based cancelable template design suffers from the attack via record multiplicity (ARM), where an adversary obtains multiple transformed templates from different applica- tions and the associated parameter keys so as to assemble them into a full-rank linear equation system, thereby retrieving the original feature vector. To address this issue, in this paper we propose a feature-adaptive random projection based method, in which the projection matrixes, the key to the ARM, are generated from one basic matrix in conjunction with local feature slots. The generated projection matrixes are discarded after use, thus making it difficult for the adversary to launch the ARM. Moreover, the random projection in the proposed method is performed on a local-feature basis. This feature-adaptive random projection can mitigate the negative impact of biometric uncertainty on recognition accuracy, as it limits the error to part of the transformed feature vector rather than the entire vector. The proposed method is evaluated on four public available databases FVC2002 DB1-DB3 and FVC2004 DB2. The experimental results and security analysis show the validity of the proposed method.
Keywords: Biometric authentication | Template protection | Random projection | Cancelable biometrics
مقاله انگلیسی
9 Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications
مدل ترکیبی مبتنی بر باور عمیق برای سیستم بیومتریک چند حالته برای برنامه های امنیتی آینده-2021
Biometrics is the technology to identify humans uniquely based on face, iris, and fingerprints, etc. Biometric authentication allows the person recognition automatically on the basis of behavioral or physiological charac- teristics. Biometrics are broadly employed in several commercial as well as the official identification systems for automatic access control. This paper introduces the model for multimodal biometric recognition based on score level fusion method. The overall procedure of the proposed method involves five steps, such as pre-processing, feature extraction, recognition score using Multi- support vector neural network (Multi-SVNN) for all traits, score level fusion, and recognition using deep belief neural network (DBN). The first step is to input the training images into pre-processing steps. Thus, the pre-processing of three traits, like iris, ear, and finger vein is done. Then, the feature extraction is done for each modality to extract the features. After that, the texture features are extracted from pre-processed images of the ear, iris, and finger vein, and the BiComp features are acquired from individual images using a BiComp mask. Then, the recognition score is computed based on the Multi-SVNN classifier to provide the score individually for all three traits, and the three scores are provided to the DBN. The DBN is trained using the chicken earthworm optimization algorithm (CEWA). The CEWA is the integration of the chicken swarm optimization (CSO), and earthworm optimization algorithm (EWA) for the optimal authentication of the person. The analysis proves that the developed method acquired a maximal accuracy of 95.36%, maximal sensitivity of 95.85%, and specificity of 98.79%, respectively.
Keywords: Multi-modal Bio-metric system | Chicken Swarm Optimization | Earthworm Optimization algorithm | Deep Belief Network | Multi-SVNN
مقاله انگلیسی
10 ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions
ECB2: یک طرح رمزگذاری جدید با استفاده از بیومتریک چهره برای امضای تراکنش های بلاک چین-2021
Blockchain is the technology on the basis of the recent smart and digital contracts. It ensures at this system the required characteristics to be effectively applied. In this work, we propose a novel encryption scheme specifically built to authorize and sign transactions in digital or smart contracts. The face is used as a biometric key, encoded through the Convolutional Neural Network (CNN), FaceNet. Then, this encoding is fused with an RSA key by using the Hybrid Information Fusion algorithm (BNIF). The results show a combined key that ensures the identity of the user that is executing the transaction by preserving privacy. Experiments reveal that, even in strong heterogeneous acquisition conditions for the biometric trait, the identity of the user is ensured and the contract is properly signed in less than 1.86 s. The proposed ECB2 encryption scheme is also very fast in the user template creation (0.05s) and requires at most four attempts to recognize the user with an accuracy of 94%.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi