Research Article GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test
|
|
|
- Mabel Powell
- 10 years ago
- Views:
Transcription
1 Hindawi Publishing Corporation EURSIP Journal on Information Security Volume 2010, rticle ID , 11 pages doi: /2010/ Research rticle GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test Davrondzhon Gafurov, Patrick ours, ian Yang, and Christoph usch Norwegian Information Security Lab, Gjøvik University College, P.O. ox 191, 2802 Gjøvik, Norway Correspondence should be addressed to Davrondzhon Gafurov, Received 5 February 2010; Revised 3 July 2010; ccepted 30 ugust 2010 cademic Editor: ernadette Dorizzi Copyright 2010 Davrondzhon Gafurov et al. This is an open access article distributed under the Creative Commons ttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. For evaluation of biometric performance of biometric components and system, the availability of independent databases and desirably independent evaluators is important. oth databases of significant size and independent testing institutions provide the precondition for fair and unbiased benchmarking. In order to show generalization capabilities of the system under test, it is essential that algorithm developers do not have access to the testing database, and thus the risk of tuned algorithms is minimized. In this paper, we describe the GUC100 multiscanner fingerprint database that has been created for independent and in-house (semipublic) performance and interoperability testing of third party algorithms. The GUC100 was collected by using six different fingerprint scanners (TST, L-1, Cross Match, Precise iometrics, Lumidigm, and Sagem). Over several months, fingerprint images of all 10 fingers from 100 subjects on all 6 scanners were acquired. In total, GUC100 contains almost fingerprint images. The GUC100 database enables us to evaluate various performances and interoperability settings by taking into account different influencing factors such as fingerprint scanner and image quality. The GUC100 data set is freely available to other researchers and practitioners provided that they conduct their testing in the premises of the Gjøvik University College in Norway, or alternatively submit their algorithms (in compiled form) to run on GUC100 by researchers in Gjøvik. We applied one public and one commercial fingerprint verification algorithm on GUC100, and the reported results indicate that GUC100 is a challenging database. 1. Introduction The interest in biometric systems is rapidly increasing due to the demands on high security applications. lthough various types of human characteristics are observed in biometric authentication, the most popular biometric systems are based on fingerprinting [1, 2]. The two important aspects in performance evaluation of fingerprint recognition algorithms (and other biometrics in general) are the availability of independent databases and desirably testing bodies too. The advantages of such databases and third party testing bodies are that firstly it allows more direct and unbiased benchmarking of different algorithms, and secondly it increases trustworthiness of the performance report, since developers do not have a direct access to the database for tuning algorithm s parameters to adapt to the database. However, creating and distributing large-scale databases publicly is not an easy task because of the involved costs and time as well as jurisdictional limits. Due to the nature of the collected data (i.e., human physiology), creation and distribution of the large scale biometric databases raises privacy concerns and may not be permitted by data protection authorities in some countries (especially in Europe). Even if data collection is permitted, usually it is requested to destroy collected data after the completion of the project, for example, as in [3]. Nevertheless, in the biometric community, several fingerprint databases were established for research purposes [4 10]. short summary of some reported fingerprint databases is given in Table 1. In this table, the columns #SC, #S, #FS, #UF, and #NF represent the number of fingerprint scanners, number of volunteers contributing to the data collection, number of fingers per subject, total number of unique fingers, and number of images per finger, respectively. Previously public databases were provided by NIST (National
2 2 EURSIP Journal on Information Security Table 1: Summary of some fingerprint image databases. Database #SC #S #FS #UF #NF Comment iofinger [3] Not available any more NIST29 [4] vailable for purchase NIST4 [5] vailable for purchase NIST14 [6] vailable for purchase 1 19 up to FVC2000 [7] 1 19 up to vailable publicly 1 19 up to FVC2002 [8] vailable publicly FVC2004 [9] vailable publicly FVC2006 [10] vailable publicly FVC-onGoing [11] Web-based automated evaluation system for fingerprint recognition algorithms, sequestered database iosec [12] vailable publicly from mid-2006 MCYT [13] all Publicly available GUC100 (this paper) all vailable for in-house (semi-public) testing Institute of Standards and Technology) which consists of thousands of fingerprint images, for example, SD29 [4], SD4 [5], and SD14 [6]. However, these images are rolled ones that is, scanned from inked tenprint paper card. Such type of images is quite different from electronically captured ones and is not suited well for evaluation of algorithms that should be operated in an on-line application. In spite of this, the NIST fingerprint databases are still being used in research community and are available for purchase [4 6]. In addition, in the context of the MINEX project NIST composed a large-scale fingerprint data set for in-house testing of algorithms [14]. The database series FVC200x [7 10] were designed for the Fingerprint Verification Competition (FVC) where several competing algorithms were tested on them. Every FVC200x database consists of 4 disjoint data sets. Out of the four, in three data sets, images were captured electronically by some commercially available fingerprint scanners. The fourth database consisted of synthetically generated fingerprint images (therefore not listed in the Table 1). In fact in databases FVC2000, 2002, and 2004, the #UF and #NF were 120 and 12, respectively, but only 110 and 8 were used. There are also multimodal databases, where the fingerprint is collected as one of the modalities [12, 13, 15]. This paper describes a multi-scanner fingerprint database, which has been created for independent and in-house performance and interoperability testing. In the rest of the paper, we will refer to this database as GUC100 (GUC stands for Gjøvik University College.) The rest of the paper is organized as follows. Section 2 describes objectives, targeted application scenarios, and availability of the GUC100 database. Section 3 details more on the data collection process, subject demographics population, fingerprint scanners, and so on. Section 4 presents an overview of interoperability testing on the GUC100 database as well as some factors that can be considered while conducting a test on the GUC100 database. Section 5 provides performance of two publicly available fingerprint verification software on GUC100 database. Section 6 points out to some possible biases in the database which are needed to be taken into account when interpreting results of evaluation on GUC100. Section 7 summarizes the paper. 2. Objectives, Scenarios, and vailability of the Database The primary objective of the GUC100 database is to enable performance evaluation of fingerprint algorithms in crossscanner (interoperability) scenarios where enrolment and verification scanners are different. The targeted performance accuracy with this database is aimed at FRR 1% (or lower) at FR 0.1%. lthough evaluation of products from a single biometric supplier is essential from the supplier s perspective, testing of scenarios, where products (e.g., sensor, minutia extractor, minutia comparator) are provided by different suppliers, is very important for both integrators and operators to proof the interoperability prior to component integration and/or system roll-out. This refers to the settings where, for example, the enrolment and verification fingerprint images
3 EURSIP Journal on Information Security 3 Table 2: Some characteristics of fingerprint scanners. Scanner rea [mm] Temperature range [Celsius] Technology TST ird Optical L-1 DFR TIR (Total Internal Reflection) Cross Match LSCN TIR (Total Internal Reflection) Precise 250MC Capacitive Lumidigm V MSI (MultiSpectralImages) Sagem MorphoSmart TIR (Total Internal Reflection) are acquired by different capture devices. For instance, in a biometric passport case, the document issued by a country where the enrolment image is captured by one scanner shall be able to be verified by another country where the probe image is very likely to be acquired by a different scanner. The GUC100 fingerprint database provides 15 and 30 crossscanner combinations for a symmetric and an asymmetric comparators, respectively. The GUC100 database is intended for technology testing whichis an offline evaluation of biometric components using a pre-existing corpus [16]. In creating the GUC100, we aimed at increasing several dimensions of the database as the numbers in Table 1 (last row) indicate. The database aims to simulate an indoor, covert (i.e., supervised), and verification (i.e., one to one) application environments. It is useful for performance evaluation not only at the traditional minutiae level but also at the pseudonymous identifier level which is more privacy protective compared to conventional minutiae templates [17, 18]. In exploitation of this database we follow due to privacy regulations in Norway the principal of If the data cannot travel to the algorithm, then the algorithm shall travel to the data. This means that copies of GUC100 database cannot be distributed to other parties outside of GUC campus. However, algorithm developers are free to visit GUC and perform testing of their algorithm in its premises or submit their (binary code) fingerprint recognition algorithm to GUC team for testing. The interested party can contact authors of this paper or visit the GUC100 webpage for any updates on the database at minimum specification for a fingerprint encoder is that it should be able to produce a template from fingerprint image in PNG format, and a fingerprint comparator should be able tocomparetwotemplatesandproduceacomparisonscore.if there are any specific requirements then they will be posted in aforementioned GUC100 webpage. It is also possible to send requests or inquires about database to the address: [email protected]. It is worth mentioning that the database is available for algorithm evaluation until fter that the database will be destroyed due to the agreement with Norwegian Data Privacy uthority (NSD) [19]. 3. GUC100 Fingerprint Database The GUC100 database was collected at GUC (Gjøvik University College) in Norway during February 2008 January efore starting the data collection, we obtained permission from the Norwegian Data Privacy uthority (NSD) [19]. In addition, all volunteers signed a consent form. lthough due to Norwegian regulations the database cannot be sent over to other parties, but it is freely accessible and available for testing within GUC s campus to external parties Population. The number of subjects who participated in the data collection was 100: 80 males and 20 females. The average ages of male and female groups were about 30.5 (±12.3) and 28.3 (±8) years old, respectively. Participants were mostly students and staff at GUC Fingerprint Scanners. The GUC100 database was collected by using six fingerprint scanners from different suppliers. The scanners were TST ird3, L-1 DFR2100, Cross Match LSCN100, Precise 250MC, Lumidigm V100, and Sagem MorphoSmart. ll these scanners, except TST ird3, were based on touching interaction. The TST scanner was based on touchless interaction. The resolution of all scanners was 500 dpi. Photos of the fingerprint scanners are given in Figure 2, and some of their properties are presented in Table 2(In this table, the order of scanners does not indicate any preference, it merely follows the order in Figure 2.) In this table, the columns rea, Temperature range, and Technology represent acquisition area, operating temperature range and sensor technology of the scanners, respectively. The lack of the swipe sensor in GUC100 database can be justified by the fact that database is intended to simulate and predict performance for public, commercial, and governmental applications but not for access to personal devices, where swipe sensors are in common use. Furthermore, the main purpose of the database is not comparing performance of various scanner technology but rather benchmarking different algorithms and investigating cross-scanner interoperability. Example images of the same finger in one session for each scanner are shown in Figure 1. s it can be seen from the figure, due to the scanner principle, the nature of fingerprint images from the TST scanner is rather different compared to the images from the other scanners Data Collection. The data collection was conducted in an indoor environment. Each subject attended 12 sessions during a period of several months. The average time interval
4 4 EURSIP Journal on Information Security (a) TST (b) L-1 (d) Precise (e) Lumidigm (c) Cross Match (f) Sagem Figure 1: Images of the same finger in one session on all scanners. Figure 2: Fingerprint scanners (from left to right): TST, L-1, Cross Match, Precise, Lumidigm, and Sagem. between each session was about one week. restriction was applied such that the participant was not allowed to attend more than one session per day. We believe that introducing such long time delays (i.e., in terms of days and weeks) between acquisition sessions allows natural variations of the fingerprint skin to occur and thus to cover more realistic scenarios. ll sessions were carried out under supervision of a human operator, so that no extreme rotations of the fingerprints are included in the database. During the capture process no objective quality measurements were taken, and the quality of the images was determined visually (i.e., subjectively) by the human operator. For each person, the first 3 sessions were uncontrolled and the other 9 sessions were controlled (the term controlled refers to signal quality control by means of adjustment of the environmental factors that was conducted by an operator.) The reason for introducing such controlled session was that when the data collection was started in February 2008, it was not straightforward to capture good quality fingerprint image (visual jugement) without some extra action. Thus, in the controlled sessions, some actions were undertaken to improve image quality for example, subjects could wet/clean their fingers (by touching wet sponge) before touching scanners platens, or sometimes they were instructed to apply more finger pressure on scanners. This was mostly required on cold days with outside temperature below zero and mainly for L-1 and Cross Match scanners. In uncontrolled sessions, no extra actions were undertaken to get better images. Figure 3 presents an example of images of a single finger over all 12 sessions. In addition, over most sessions of
5 EURSIP Journal on Information Security Figure 3: Images of the same finger in 12 sessions over several months on one scanner (left to right, top to down). the data collection, the environmental conditions were also recorded on line (i.e., during data capture of the subject), which include inside and outside temperatures as well as the humidity of the room. In each session (both in controlled and uncontrolled ones), subjects provided all 10 fingers on each of the 6 scanners. Participants presented their fingers in the following order: left small finger,..., left thumb, right thumb,..., right ring and right small finger. The order of visiting scanners was as follow: first they presented all 10 fingers (in the above mentioned order) in TST scanner, then in L-1, Cross Match, Precise, Lumidigm, and finally in Sagem scanner. In every session, 60, fingerprint images per person were obtained. In total, GUC100 database contains (= ) fingerprint images. Few images were discarded due to the duplication or mislabeling. In order to speed up data collection time and reduce human errors, we also developed a graphical user interface integrating all scanners. The program integrates image capturing functions from all scanners into a common interface and automatically saves the captured fingerprints according to the filename convention. The visual interface of this software is shown in Figure 4. This program made the data collection process easier and faster, and every session took about 5 7 minutes per subject. In addition, two separate smaller fingerprint databases are also available that can be used for algorithm development [20]. They consist of fingerprint images from 45 and 40 subjects (these are different subjects from GUC100 database), respectively Fingerprint Image Quality. We applied NIST Fingerprint Image Quality (NFIQ) algorithm [21] to have an overview of image qualities in GUC100 database. For each fingerprint image, the NFIQ algorithm returns number 1 (best quality), 2, 3, 4, or 5 (worst quality). The aim of the this work is not comparing performances of individual scanners; therefore, here the NFIQ scores are not provided separately for each scanner. Figure 5 shows distribution of NIFIQ scores over all scanners (except TST). The NFIQ scores for TST images are
6 6 EURSIP Journal on Information Security not included due to the nature of images. The ordinate of the figure is given in percentage (%). It is worth noting that quality score may be affected by the order the subject uses the scanners, and other image quality algorithms can also be applied on the database. 4. Interoperability and Parameters 4.1. Interoperability Performance and Matrices. From a customer perspective, performance interoperability of biometric components is very important. Performance interoperability is an essential measure to ensure that biometric subsystems from different suppliers are capable of generating and comparing samples and to meet at the same time an absolute level of performance within some margin [22]. Interoperability performance results of biometric components/systems provide a better choice on selecting products and thus reduce dependency on a single supplier. The GUC100 fingerprint database enables performance evaluation of not only components from a single supplier but also components from different suppliers in intra- and intersensor settings. Such interoperability can be viewed at two different processing levels which are image and minutiae template levels. Figure 6 depicts interoperability perspective at the image level according to ISO interoperability schema [22]. In this figure, the blue octagons, blue ellipses, and green round rectangle represent fingerprint scanners (S), fingerprint images (FP) and IMage-based Comparators (IMC), respectively. In this figure (also in Figure 7), the subscripts denote product supplier s id. In Figures 6, 7,and8, the TST, IDT, CMT, P, LUM, and SG stand for TST, L-1 (Identix), Cross Match, Precise, Lumidigm, and Sagem, respectively. The and indicate some arbitrary suppliers. In addition, in this figure (also in Figure 7), the left part of comparators (i.e., IMC and MTC) represents enrolment and the right part represents verification. In Figure 6, the dimension of interoperability is 3. In first dimension there are 6 scanners (enrolment mode), in second dimension there are 2 IMC, in third dimension there are 6 scanners (verification mode). Figure 7 depicts interoperability picture at the minutia level according to ISO interoperability schema [22]. In this figure, the blue octagons, blue circles, yellow round rectangles, yellow circles, and green round rectangle represent fingerprint scanners (S), fingerprint images (FP), Minutia Template Encoder (MTE), minutiae template (T), and Minutia Template Comparator (MTC), respectively. In addition, the superscripts (s) and (p) denote whether MTE/MTC produces/processes proprietary or standard data formats (e.g., ISO standard on finger minutiae [23]), respectively. In Figure 7, the dimension of interoperability is 5. In first dimension there are 6 scanners (enrolment mode), in second dimension there are 4 MTE (enrolment mode), in third dimension there are 4 MTC, in fourth dimension there are 4 MTE (verification mode), and in fifth dimension there are 6 scanners (verification mode) Evaluation Parameters. The GUC100 database enables evaluation of various configurations of native and inter- Percentage (%) Figure 4: Visual interface of the software tool NFIQ score Figure 5: NFIQ distribution. operability performances by focusing on some influencing factors. Such factors can be the following. (i) Fingerprint Scanner. Scanner interoperability is an important issue, although not very much investigated. It has been shown that when enrolment and verification images are acquired by different scanners, the performance deteriorates significantly [24]. Recently, some methods have been proposed to address this problem [25, 26]. t the same time, interestingly, experimental evaluation indicates that fusing scores from different scanners results in better performance compared to fusing different instances of the same sensor [27, 28]. In addition to disparate fingerprint scanners, if MTE and MTC are also provided by different suppliers, then the interoperability schema gets more complex, for example, as the red path in Figure 7 highlights. The GUC100 database provides 6 intrascanner and 15 inter-scanner combinations for the specified pair of MTC and MTE.
7 EURSIP Journal on Information Security 7 S TST FP TST FP TST S TST S IDT FP IDT FP IDT S IDT IMC S CMT FP CMT FP CMT S CMT S P FP P FP P S P IMC S LUM FP LUM FP LUM S LUM S SG FP SG FP SG S SG Figure 6: Interoperability picture at the image level. (ii) Image Quality. Image quality is a very important factor that influences performance [29]. s mentioned earlier, each fingerprint image is associated with the NFIQ score that indicates its quality. Depending on application, one can test performance on various configurations in the context of image quality, for example, use only good quality images for the enrolment and then medium to low quality images for the verification; use only good quality images both for the enrolment and verification, and so forth. (iii) Session Type. Usually in biometric system the enrolment phase is conducted in a controlled way where the image quality, finger positioning, and so forth. are controlled or instructed to some extent. On the other hand, the verification phase can be performed in a more relaxed environment where no feedbacks to the user are expected. Therefore, one may use images from controlled sessions only for enrolment while images from uncontrolled sessions only for verification. It is worth noting that the image quality and session type parameters might be somewhat correlated because in controlled session image qualities were usually (not necessarily always) better compared to in uncontrolled sessions. In addition to aforementioned factors, the GUC100 database may enable performance evaluations in the context of some other parameters such as temperature, humidity, and finger type (e.g., thumb finger, small finger). 5. Experimental Results We have applied a public and a commercial fingerprint verification software for validating the value of the database. The publicly available fingerprint verification software was NIST s MINDTCT and OZORTH3 [30]. The second software was Neurotechnology VeriFinger which is commercially available [31]. In this work, we use images from all ten fingers for genuine comparisons, but due to the large number of comparisons (and consequently long time), we use images from only one finger (left index) for impostor comparisons. In addition, we use only one finger for estimating impostor scores and also compare only the same session samples. Thus by denoting n = 100 number of subjects, k = 10 number of fingers per subject, and m = 12 number of images per finger and also by assuming asymmetric template comparator, we can have about = n k m (m 1) genuine comparisons (scores) and = m n (n 1) impostor comparisons (scores). Performance metric curves in terms of FR/FRR plots for each scanner are presented in Figure 8. Plots are given both when enrolment and verification scanners are the same and when they are different. The EERs of the curves are also shown in the legends of the plots. s can be observed from the figures in general, when enrolment and verification scanners are different, EERs are higher compared to when they are the same. Tables 3 and 4 provide summarizing statistics (median and mean) of crossscanner comparisons (interoperability) in terms of EER for Neurotechnology and NIST algorithms, respectively. In these tables, the last two columns indicate average performance degradation with respect to same scanner comparison which are computed according to the following: Degradation = (EER 2 EER 1 ) 100%, (1) EER 1 where EER 1 is the EER of same scanner comparison (i.e., no interoperability second column) and EER 2 is the average (median or mean) EER of cross scanner comparison (i.e., interoperability columns three and four in the tables).
8 8 EURSIP Journal on Information Security S TST FP TST FP TST S TST S IDT FP IDT MTE (p) T (p) MTC (p) T (p) MTE (p) FP IDT S IDT S CMT FP CMT MTE (s) T (s) MTC (s) T (s) MTE (s) FP CMT S CMT S P FP P MTE (s) T (s) MTC (s) T (s) MTE (s) FP P S P S LUM FP LUM MTE (p) T (p) MTC (p) T (p) MTE (p) FP LUM S LUM S SG FP SG FP SG S SG Figure 7: Interoperability picture at the minutia level. Table 3: Neurotechnology: median, mean, and degradation in cross-scanner comparison (interop) in terms of EER. Scanner EER (no interop.), % Median EER (interop.), % Mean EER (interop.), % Median degradation, % Mean degradation, % S S S S S S Table 4: NIST: median, mean, and degradation in cross-scanner comparison (interop) in terms of EER. Scanner EER (no interop.), % Median EER (interop.), % Mean EER (interop.), % Median degradation, % Mean degradation, % S S S S S S Limitations of the Database There are few factors that may introduce bias, and one needs to take them into account when interpreting performance reports which are produced using GUC100 database. Since it is not always easy to recruit representative persons for experiments, the demographics of the subjects in GUC100 database in terms of gender (mostly men) and age (mostly adults) are not ideally balanced. Therefore, caution must be taken when analysing results in the context of the gender or when generalizing results to the other population of users like for instance, children or old people. The order of finger presentation and order of scanner selection are fixed and not randomized. lthough not investigated or proved yet, this may introduce bias when comparing performance of scanners (e.g., due to habituation). Thus, the main purposes of the GUC100 database are interoperability and benchmarking different algorithms but not comparing performance of different scanner technologies. In addition, interoperability results are primarily related to the scanner set used in GUC100, for other types of fingerprint scanners, the performance results might not be adequately generalized. 7. Summary In this paper, we presented a GUC100 fingerprint database which was created for in-house performance and
9 EURSIP Journal on Information Security EER 60 FRR (%) 4 FRR (%) 40 EER FR (%) FR (%) 100 S1: EER = 1.56 S2: EER = 3.73 S3: EER = 1.93 S4: EER = 1.89 S5: EER = 4.3 S6: EER = 3.19 S1: EER = 4.94 S2: EER = 9.25 S3: EER = 4.95 S4: EER = 4.72 S5: EER = 26.3 S6: EER = 6 (a) Neurotechnology: enrolment and verification scanners are the same 30 (b) NIST: enrolment and verification scanners are the same EER 60 FRR (%) 15 FRR (%) 40 EER FR (%) FR (%) 100 S1 - S2: EER = 2.88 S1 - S3: EER = 1.99 S1 - S4: EER = 3.5 S1 - S5: EER = 9.86 S1 - S6: EER = 2.75 S2 - S1: EER = 2.89 S2 - S3: EER = 2.94 S2 - S4: EER = 5.09 S2 - S5: EER = 14.7 S2 - S6: EER = 3.53 S3 - S1: EER = 1.99 S3 - S2: EER = 2.94 S3 - S4: EER = 3.49 S3 - S5: EER = 9.63 S3 - S6: EER = 2.74 S4 - S1: EER = 3.5 S4 - S2: EER = 5.1 S4 - S3: EER = 3.48 S4 - S5: EER = 9.73 S4 - S6: EER = 4.04 S5 - S1: EER = 9.86 S5 - S2: EER = 14.7 S5 - S3: EER = 9.63 S5 - S4: EER = 9.73 S5 - S6: EER = S6 - S1: EER = 2.76 S6 - S2: EER = 3.54 S6 - S3: EER = 2.74 S6 - S4: EER = 4.05 S6 - S5: EER = S1 - S2: EER = 8.45 S1 - S3: EER = 5.74 S1 - S4: EER = 7.85 S1 - S5: EER = S1 - S6: EER = 6 S2 - S1: EER = 8.44 S2 - S3: EER = 9.66 S2 - S4: EER = S2 - S5: EER = S2 - S6: EER = 8.77 S3 - S1: EER = 5.73 S3 - S2: EER = 9.65 S3 - S4: EER = 7.46 S3 - S5: EER = S3 - S6: EER = 6.8 S4 - S1: EER = 7.84 S4 - S2: EER = S4 - S3: EER = 7.49 S4 - S5: EER = S4 - S6: EER = 8 S5 - S1: EER = S5 - S2: EER = S5 - S3: EER = S5 - S4: EER = S5 - S6: EER = S6 - S1: EER = 6 S6 - S2: EER = 8.76 S6 - S3: EER = 6.8 S6 - S4: EER = 7.97 S6 - S5: EER = (c) Neurotechnology: enrolment and verification scanners are different (d) NIST: enrolment and verification scanners are different Figure 8: Performance of public and commercial algorithms on GUC100.
10 10 EURSIP Journal on Information Security interoperability evaluation of fingerprint recognition algorithms in technology testing. The GUC100 database consists of fingerprint images of all 10 fingers from 100 subjects which were acquired by using 6 different scanners. The data collection was carried out during February 2008 January 2009 at the campus of the Gjøvik University College (GUC) in Norway. The GUC100 database is referred as in-house (semi-public) which means that the database is freely available for researchers and practitioners provided that all testing shall be conducted in the premises of GUC. Thus, the interested parties (i.e., industry, research institution, independent developers, etc.) can visit GUC premises and perform training and testing by themselves or alternatively submit their (binary) algorithms to be tested by researchers at GUC. cknowledgment This work is supported by funding under the Seventh Research Framework Programme of the European Union, Project TURINE (ICT ). This document has been created in the context of the TURINE project. ll information is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. The European Commission has no liability in respect of this document, which is merely representing the authors view. References [1] International iometric Group, iometrics market and industry report , 2008, report.php. [2] D. Maltoni, D. Maio,. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, NY, US, [3] M. rnold, C. usch, and H. Ihmor, Investigating performance and impacts on fingerprint recognition systems, in Proceedings of the 6th nnual IEEE System, Man and Cybernetics Information ssurance Workshop (SMC 05),pp.1 7, West Point, NY, US, June [4] NIST special database 29, 2008, nistsd29.cfm. [5] NIST special database 4, 2008, nistsd4.cfm. [6] NIST special database 14, 2008, nistsd14.cfm. [7]D.Maio,D.Maltoni,R.Cappelli,J.L.Wayman,and.K. Jain, FVC2000: fingerprint verification competition, IEEE Transactions on Pattern nalysis and Machine Intelligence, vol. 24, no. 3, pp , [8]D.Maio,D.Maltoni,R.Cappelli,J.L.Wayman,and.K. Jain, FVC2002: second fingerprint verification competition, in Proceedings of the 16th International Conference on Pattern Recognition, pp , [9] R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and. K. Jain, Performance evaluation of fingerprint verification systems, IEEE Transactions on Pattern nalysis and Machine Intelligence, vol. 28, no. 1, pp. 3 17, [10] FVC2006: fingerprint verification competition, [11] FVC-onGoing: web-based automated evaluation system for fingerprint recognition algorithms, [12] J. Fierrez, J. Ortega-Garcia, D. Torre Toledano, and J. Gonzalez-Rodriguez, iosec baseline corpus: a multimodal biometric database, Pattern Recognition, vol. 40, no. 4, pp , [13] J. Ortega-Garcia, J. Fierrez-guilar, D. Simon et al., MCYT baseline corpus: a bimodal biometric database, IEE Proceedings: Vision, Image and Signal Processing, vol. 150, no. 6, pp , [14] P. Grother, W. Salamon, C. Watson, M. Indovina, and P. Flanagan, Performance of fingerprint match-on-card algorithms, phase ii report, 2008, [15] S. Garcia-Salicetti, C. eumier, G. Chollet et al., IOMET: a multimodal person authentication database including face, voice, fingerprint, hand and signature modalities, in Proceedings of International Conference on udio- and Video-ased iometric Person uthentication, vol of Lecture Notes in Computer Science, pp , [16] ISO/IEC :2007, Information technology biometric performance testing and reporting part 2: testing methodologies for technology and scenario evaluation, [17]. K. Jain, K. Nandakumar, and. Nagar, iometric template security, EURSIP Journal on dvances in Signal Processing, vol. 2008, rticle ID , 17 pages, 2008, special issue on dvanced Signal Processing and Pattern Recognition Methods for iometrics. [18] D. Gafurov,. Yang, P. ours, and C. usch, Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels, in Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, [19] Norwegian data privacy authority, [20] GUC100 multi-scanner fingerprint database for in-house (semi-public) performance and interoperability evaluation, [21] M. D. Garris, E. Tabassi, and C. L. Wilson, NIST fingerprint evaluations and developments, Proceedings of the IEEE, vol. 94, no. 11, pp , [22] ISO/IEC , Information technology biometric performance testing and reporting part 4: interoperability performance testing, [23] ISO/IEC :2005, Information technology biometric data interchange formats part 2: finger minutiae data, [24]. Ross and. Jain, iometric sensor interoperability: a case study in fingerprints, in Proceedings of the International iometric uthentication, the 8th European Conference on Computer Vision (ECCV 04), vol of Lecture Notes in Computer Science, pp , [25] Y. Han, J. Nam, N. Park, and H. Kim, Resolution and distortion compensation based on sensor evaluation for interoperable fingerprint recognition, in Proceedings of International Joint Conference on Neural Networks (IJCNN 06),pp , Vancouver, Canada, July [26]. Ross and R. Nadgir, thin-plate spline calibration model for fingerprint sensor interoperability, IEEE Transactions on Knowledge and Data Engineering, vol.20,no.8,rticleid , pp , 2008.
11 EURSIP Journal on Information Security 11 [27] F. lonso-fernandez, R. N. J. Veldhuis,. M. azen, J. Fierrez-guilar, and J. Ortega-Garcia, Sensor interoperability and fusion in fingerprint verification: a case study using minutiae-and ridge-based matchers, in Proceedings of the 9th International Conference on Control, utomation, Robotics and Vision (ICRCV 06), Singapore, December [28] G. L. Marcialis and F. Roli, Fingerprint verification by fusion of optical and capacitive sensors, Pattern Recognition Letters, vol. 25, no. 11, pp , [29] F. lonso-fernandez, J. Fierrez, J. Qrtega-Garcia et al., comparative study of fingerprint image-quality estimation methods, IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp , [30] NIST s Fingerprint verification software, 2009, non export control.pdf. [31] Neurotechnology s VeriFinger 6.0., 2009,
On the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Performance Evaluation of Biometric Template Update
Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: [email protected]
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
Abstract. 1. Introduction. 1.1. Methodology
Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008
Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Procedure for obtaining Biometric Device Certification (Authentication)
Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information
Prof. Davide Maltoni [email protected]. DEIS - University of Bologna - ITALY. Summer School - BIOMETRICS: AUTHENTICATION and RECOGNITION
6XPPHU6FKRROIRU$GYDQFHG6WXGLHVRQ %,20(75,&6 $87+(17,&$7,21DQG5(&2*1,7,21 $OJKHUR,WDO\-XQH² Fingerprint Recognition Sensing, feature extraction and matching Prof. Davide Maltoni [email protected] DEIS
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
David Yambay, Stephanie Schuckers Clarkson University. Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy CITeR Spring 2011
LivDet 2011- Fingerprint Liveness Detection Competition 2011 Final Report David Yambay, Stephanie Schuckers Clarkson University Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Open Source Reference Systems for Biometric Verification of Identity
Open Source Reference Systems for Biometric Verification of Identity Aurélien Mayoue and Dijana Petrovska-Delacrétaz TELECOM & Management SudParis, 9 rue Charles Fourier, 91011 Evry Cedex, France Abstract.
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
ISO 24745 - Biometric Template Protection
ISO 24745 - Biometric Template Protection Hochschule Darmstadt / Gjøvik University College / Fraunhofer IGD IBPC 2010 -Satellite Workshop II NIST March 5, 2010 PET for the Protection of Biometric data
Regional fusion for high-resolution palmprint recognition using spectral minutiae representation
Published in IET Biometrics Received on 1st September 2013 Revised on 15th January 2014 Accepted on 10th February 2014 Special Issue: Integration of Biometrics and Forensics ISSN 2047-4938 Regional fusion
SWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Biometric Enabled Access and Time & Attendance Solutions
Biometric Enabled Access and Time & Attendance Solutions Certified Partner The Ultimate Set of Keys The Ultimate Fingerprint Readers Cost-effective Protection Throughout Your Organization How to protect
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Embedded and mobile fingerprint. technology. FingerCell EDK
Embedded and mobile fingerprint identification technology FingerCell EDK FingerCell EDK Embedded and mobile fingerprint identification technology Document updated on August 30, 2010 CONTENTS FingerCell Algorithm
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Under Real Spoofing Attacks
Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic
Technology behind Aadhaar. Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012
Technology behind Aadhaar Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication
Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA
Are Image Quality Metrics Adequate to Evaluate the Quality of Geometric Objects? Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA ABSTRACT
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
F11 User Manual. Version:1.0 Date:Jul. 2010
F11 User Manual Version:1.0 Date:Jul. 2010 Introduction: This document mainly introduces the user s operation of F11. About the device installation please refer to F11 Installation Guide. F11 User Manual
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
Smart Card in Biometric Authentication
Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: [email protected] Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:
Defining AFIS Latent Print Lights-Out
NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint
BIOMETRIC SOLUTIONS 2013 ISSUE
BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
EaSy: Efficient and Secure System for Utility Service Registration
EaSy: Efficient and Secure System for Utility Service Registration 1 Nor Zaidi Haron, 2 Siti Aisah Md Junos@Yunus, 3 Mohd Sa'ari Mohamad Isa, 4 Azmi Awang Md Isa *1 Universiti Teknikal Malaysia Melaka,
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Biometric Authentication. Biometric Consortium Conference Tampa
Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents
Development of a Networked Thumb Print-Based Staff Attendance Management System
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-03, pp-121-126 www.ajer.org Research Paper Open Access Development of a Networked Thumb Print-Based
Guide to e-commerce. Electronic transactions under Government Model Contracts. Procurement driving better value
Procurement driving better value Guide to e-commerce Electronic transactions under Government Model Contracts A guide for government agencies & suppliers October 2011 2 2 nd Edition Published October 2011
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Form Design Guidelines Part of the Best-Practices Handbook. Form Design Guidelines
Part of the Best-Practices Handbook Form Design Guidelines I T C O N S U L T I N G Managing projects, supporting implementations and roll-outs onsite combined with expert knowledge. C U S T O M D E V E
Best Practices in Testing and Reporting Performance of Biometric Devices. Version 2.01
NPL Report CMSC 14/02 Best Practices in Testing and Reporting Performance of Biometric Devices Version 2.01 By A. J. Mansfield, National Physical Laboratory and J. L. Wayman, San Jose State University
Expertise for biometric solution
Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco [email protected] Linda Karina Toscano-Medina [email protected] Gualberto
Securing Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
USAccess System- Registrar. Help Guide. Prepared for
USAccess System- Registrar Help Guide Prepared for United States Department of Agriculture Office of Security 300 7th Street SW, Washington DC 20024 Version 1.0 December 12, 2007 USAccess System Registrar
NCheck Finger Attendance
Fingerprint biometrics for attendance control NCheck Finger Attendance NCheck Finger Attendance Fingerprint biometrics for attendance control Document updated on August 3, 2012 CONTENTS Application details............................................
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
The Bucharest Academy of Economic Studies, Romania E-mail: [email protected] E-mail: [email protected]
Paul Pocatilu 1 and Ctlin Boja 2 1) 2) The Bucharest Academy of Economic Studies, Romania E-mail: [email protected] E-mail: [email protected] Abstract The educational process is a complex service which
Optical Digitizing by ATOS for Press Parts and Tools
Optical Digitizing by ATOS for Press Parts and Tools Konstantin Galanulis, Carsten Reich, Jan Thesing, Detlef Winter GOM Gesellschaft für Optische Messtechnik mbh, Mittelweg 7, 38106 Braunschweig, Germany
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Product Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
CALIBRATION OF A ROBUST 2 DOF PATH MONITORING TOOL FOR INDUSTRIAL ROBOTS AND MACHINE TOOLS BASED ON PARALLEL KINEMATICS
CALIBRATION OF A ROBUST 2 DOF PATH MONITORING TOOL FOR INDUSTRIAL ROBOTS AND MACHINE TOOLS BASED ON PARALLEL KINEMATICS E. Batzies 1, M. Kreutzer 1, D. Leucht 2, V. Welker 2, O. Zirn 1 1 Mechatronics Research
Understanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
ZKTeco FR1200 User Manual
ZKTeco FR1200 User Manual Version: 1.0.1 Date: Dec. 2011 Introduction: This document mainly introduces the user s operation of ZKTeco FR1200. About the device installation, please refer to the Installation
Research Article Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design
VLSI Design, rticle ID 698041, 5 pages http://dx.doi.org/10.1155/2014/698041 Research rticle Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design Yu-Cheng Fan, Chih-Kang
Detecting Credit Card Fraud
Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Using the Analytic Hierarchy Process in Engineering Education*
Int. J. Engng Ed. Vol. 14, No. 3, p. 191±196, 1998 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 1998 TEMPUS Publications. Using the Analytic Hierarchy Process in Engineering Education* P. R. DRAKE
Data Exploration Data Visualization
Data Exploration Data Visualization What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include Helping to select
The Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
