Face Recognition Application for Automatic Teller Machines (ATM)
|
|
|
- Rudolf Denis Francis
- 10 years ago
- Views:
Transcription
1 2012 International Conference on Information and Knowledge Management (ICIKM 2012) IPCSIT vol.45 (2012) (2012) IACSIT Press, Singapore Face Recognition Application for Automatic Teller Machines (ATM) Hossein Reza Babaei +, Ofentse Molalapata and Abdul-Hay Akbar Pandor Faculty of Information and Communication Technology, Limkokwing University of Creative Technology, Cyberjaya, Malaysia Abstract: In this article about biometric systems the general idea is to use facial recognition to reinforce security on one of the oldest and most secure piece of technology that is still in use to date thus an Automatic Teller Machine. The main use for any biometric system is to authenticate an input by Identifying and verifying it in an existing database. Security in ATM s has changed little since their introduction in the late 70 s. This puts them in a very vulnerable state as technology has brought in a new breed of thieves who use the advancement of technology to their advantage. With this in mind it is high time something should be done about the security of this technology beside there cannot be too much security when it comes to people s money. Keywords: Biometrics, Facial Recognition, Biometric Standards, Automatic Teller Machine Technology, Biometric Predecessors. 1. Introduction In the field of Biometrics, with the general term used alternatively to point out a characteristic or process. As a characteristic it s a measurable biological otherwise known as anatomical and physiological and behavioural characteristic that can be used for automated recognition. As a process it encompasses automated methods of recognizing an individual based on measurable biological anatomical and physiological and behavioural characteristics. Biometrics is an automated methodology to uniquely identify humans using their behavioural or physiological characteristics [1-4, 23, 24]. Recognition in this technology plays a major role, recognition used in the description of biometric systems like facial recognition, finger print or iris recognition relating to their fundamental function, the generic term how ever does not necessarily imply verification closed-set identification or open-set identification [7-9, 22, 24]. Verification is the task where the biometric system attempts to confirm an individual s claimed identity by comparing a submitted sample to one or more previously enrolled templates [14-18]. Figure 1 show the concept of recognition and verification which is feather illustrated by the picture below where the first image resembles the second image [10-14, 18]. Figure 1: Image resembling Identification is the task where the biometric system searches a database for a reference finding a match for the submitted biometric sample; a biometric sample is collected and compared to all the templates in the database. If it is close-set identification, the submitted biometric is known to exist in the database. If it is open-set identification, the submitted biometric sample is not guaranteed to exist in the database, the system determines if the sample exists or not [18]. Figure 2 shows the process of identification. In ATM s such a concept could be used to reinforce the one used by ATM s being Card + Password will allow you to access your banking details, as robust as this might seem, if someone has access to the two it + Corresponding author. Tel.: address: [email protected]. 211
2 will be easy to obtain your life savings[4,6]. However if there is one thing one can t get hold of is your face making this an impenetrable system which will not need much processing time [4]. Figure 2: Process of identification 2. Biometric Predecessors The first form of biometrics ever used date way back to the cave men who used hand prints as an unforgeable signature these prints can still be seen in caves such as the caves in Tsodilo hills in Botswana (Africa) which has paintings thought to be more than 20,000 years old, however some evidence suggests fingerprints were used as people mark as early as 500 B.C The early Chinese merchants used fingerprints to settle business transactions they also used finger and footprints to distinguish between children from each other. The early Egyptian traders were identified by physical descriptors to distinguish between trusted traders of known reputation and previous successful transactions, and those new to the market. 3. Standards of Biometrics Biometric technology is used to help users deploy and maintain systems in an easier manner, with no need to remember codes or eliminate the use of keyboards or even keys for that meter. Can be used to promote longevity and enable interoperability. For national and international efforts developing standards for; Technical interfaces, Data interchange formats, testing and reporting, societal issues Uses of Biometric Systems National security- automated methods capable of rapidly determining an individual s identity, previously used identities and past activities. Homeland security and law enforcement- technologies to secure countries while facilitating legitimate trade and movement of people and to identify criminals in the civilian law enforcement environment. Enterprise and E-government Services- administration of people, processes and technologies. Personal information and business transactions- business plans that meet customer demands for service at any time, from any location and through multiple communication device. Table 1: shows the evolution of biometric systems 1858 First systematic capture of hand images for identification purposes is recorded 1870 Bertillon develops anthropometrics to identify individuals 1892 Galton develops a classification system for fingerprints 1896 Henry develops a fingerprint classification system 1936 Concept of using the iris pattern for identification is created 1960s Face recognition becomes semi-automated 1960 First model of acoustic speech production is created 1965 Automated signature recognition research begins 1969 FBI pushes to make fingerprint recognition an automated process 1974 First commercial hand geometry systems become available 1986 Exchange of fingerprint minutiae data standard is published 1988 First semi-automated facial recognition system is deployed 1992 Biometric Consortium is established within US Government 1997 First commercial, generic biometric interoperability standard is published 1999 FBI s IAFIS major components become operational 2002 M1 Technical Committee on Biometrics is formed 2003 Formal US Government coordination of biometric activities begins 2004 US-VIST program becomes operational 2004 DOD implements ABIS 2005 US patent on iris recognition concept expires 212
3 3.2. How biometrics works In biometrics a series of steps are followed to get the aimed goal, the steps are as shown in the figure 3 below: Figure 3: Biometrics steps to get the aimed goal Sensor: A sensor collects data and converts the information to a digital format Signal processing algorithms: This is where quality control activities and development of the template takes place Data Storage: Keeps information that new biometric templates will be compared to Matching algorithm: Compares the new template to other templates in the data storage Decision process: Uses the results from the matching component to make a system level decision Biometric Implementation Factors In order to implement a biometric system these are the factors to first consider. Location Security Risks Task (Identification or verification) Expected number of users User circumstances Existing Data 4. Analysis (Biometric Modalities) i. Fingerprint: Fingerprints have uneven surfaces of ridges and valleys that form a person s unique pattern, fingerprints are still widely used to date. Figure 4 shows a finger print. Figure 4: Finger print sample ii. Face Recognition: The use of infrared detectors to capture a 3D pattern of person s cranial physiognomy. Figure 5 shows how infrared technology is used to get the image [3]. Figure 5: Usage of Infrared technology to get the image iii. Iris Recognition: Iris image processing is illuminating the iris with near infrared light, which takes the illuminated picture of the iris without hurting or causing any discomfort to the person. Figure 6 shows the area of focus in the eye when using Iris recognition. Figure 6: Area of focus in the eye 213
4 iv. Hand/ Finger Geometry: This is one of the first successful commercial biometric products. A person places their hand on a device and the system takes a picture of the hand using mirrors, the picture shows top and side hand views, then measures digits of the hand and compares to those collected at enrollment. Figure 7 show how hand/finger geometry is used in biometrics. Figure 7: Hand/ Finger Geometry Initial Analysis Out of all the biometrics modalities I have chosen Facial recognition as the best technique for my project. This is because of the many algorithms that can make it more secure and more easy to use. In the current state facial recognition is used in high-level national security by the FBI, CIA and the Secret Service in the United States of America. Methods of Face Recognition i. Appearance-based (View-based) face recognition: Appearance-based approaches represent an object in terms of several object views (raw intensity images). ii. Adaptive Contrast Enhancement: The idea is to enhance contrast locally analyzing local grey differences taking into account mean grey level. Figure 8 shows Adaptive Contrast Enhancement. Figure 8: Adaptive contrast Enhancement iii. Gamma Correction: Gamma correction operation performs nonlinear brightness adjustment. Brightness for darker pixels is increased, but it is almost the same for bright pixels. Figure 9 shows Gamma Correction. 5. Research Methodology Figure 9: Gamma Correction The aim of this research is to design and develop a facial recognition application for Automatic Teller Machine (ATM) to reinforce security. Development Methodology: In this research about Facial recognition it was best to use Rapid application Development (RAD which is a development lifecycle designed to give much faster development and higher-quality results than those achieved with the traditional lifecycle. It is designed to take the maximum advantage of powerful development software that has evolved recently. Rapid Application Development is a method used to help developers to get first-hand information from customers about an on-going project and even make changes where necessary [8]. Rapid Application Development (RAD): Rapid Application Development (RAD) refers to a development life cycle designed to give much faster development and higher quality systems than the traditional life cycle. It is designed to take advantage of powerful development software like CASE tools, prototyping tools and code generators [6]. RAD is a people-centred and incremental development approach. Active user involvement, as well as collaboration 214
5 and co-operation between all stakeholders are imperative. Testing is integrated throughout the development life cycle so that the system is tested and reviewed by both developers and users incrementally. The key objectives of RAD are: High Speed High Quality Low Cost The RAD life cycle composes of four stages: Requirements Planning User Design Rapid Construction Transition[9] Figure 10 shows the necessary steps in Rapid Application Development. Figure 10: Necessary steps in RAD 6. System Design In the case of this system Infrared Facial Recognition seems to be the best technique. This means an infrared light camera is placed strategically to see the human face without moving the lens and getting a 3D geometry of the face and verifying it while the person is entering their password. Infrared Light cameras are used because they are less prone to defection due to light and can be used in complete darkness, this gives the system an edge over other biometric systems as they require intense quality control. This means there is more processing time required to run the system hence efficiency of the ATM is lost with the expense of a reinforcement application which makes the system as a whole less feasible. 7. Conclusion As facial recognition has proven to be the most secure method of all biometric systems to a point it is widely used in the United States for high level security, entrusting the system even to help in the fight against terrorism. If this system is used at this level it should show how much technology has changed in order to make this method effective in the processes of identification and verification. With new improved technics like Artificial Intelligence that help eliminate more disturbances and distortions that could affect the rate of effectiveness of the system, will help in increasing the margin of security from a simple 60-75% accuracy to % accuracy rate. These technics will make this system impenetrable. 8. Acknowledgement The special thank goes to our helpful advisor Dr. Arash Habibi Lashkari for his supervising and advising in the progression of our dissertation and project. 9. References [1] PENG Zhao-yi, ZHU Yan-hui, ZHOU Yu Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection, 2010 Second International Conference on MultiMedia and Information Technology, pp , [2] PatilK, GiripunjeSD, BajajPR Facial Expression Recognition and Head Tracking in Video Using Gabor Filter, Third International Conference on Emerging Trends in Engineering and Technology, pp , [3] Zhao, Huang, Dellandre á, Che, Automatic 3D facial expression recognition based on a Bayesian Belief Net and a Statistical Facial Feature Model, 2010 International Conference on Pattern Recognition, France, pp , [4] Cornelis Robat., Automatic teller machine ATM,
6 [5] Zharkova & Ipson, Valentina & Stan, Survey of Image Processing Techniques. Survey of Image Processing Techniques, EGSO-5-D1_F , 3, 2003 [6] RAD - Rapid Application Development Process. RAD - Rapid Application Development Process, 2011 [7] SEC Ventures Consulting Services Methodology SEC Ventures Consulting Services Methodology. [8] RAPID APPLICATION DEVELOPMENT RAPID APPLICATION DEVELOPMENT. [9] Rapid application development (RAD) Rapid application development (RAD). [10] Matai, Irturk, Kastner, Design and Implementation of an FPGA-based Real-Time Face Recognition System, IEEE International Symposium on Field-Programmable Custom Computing Machines, United States, pp97-100, [11] Professional Development - Rapid Application Development. Professional Development - Rapid Application Development, 2011 [12] Li, Phung, Bouzerdom, Tivive, Automatic Recognition of Smiling and Neutral Facial Expressions, 2010 Digital Image Computing: Techniques and Applications, Australia, pp , [13] Juebo, Hehua, Lianhua, A Cloud Model-based Approach for Facial Expression Synthesis, Journal Of Multimedia, Vol. 6, No. 2, China, pp , [14] Pazoki Z, Faroki F, Effective feature selection for face recognition based on correspondence analysis and trained artificial neural network, Sixth International Conference on Signal-Image Technology and Internet Based Systems, Iran, pp80-84, [15] Lao, Han, Murase, Efficient Facial Attribute Recognition with A Spatial Codebook, International Conference on Pattern Recognition, Japan, pp , [16] Wang, Zhang, Facial Recognition Based on Kernel PCA, Third International Conference on Intelligent Networks and Intelligent Systems, China, pp88-91, [17] Rao I, Murphy P, Nandy S, Rao V, A Real World System For Detection And Tracking, International Conference on Advances in Recent Technologies in Communication and Computing, India, pp , [18] Deng J, Li J, Zou X, Extraction Of Litchi Stem Based On Computer Vision Under Natural Scene, [19] International Conference on Computer Distributed Control and Intelligenct Environmental Monitoring, China, pp , [20] Miller G, Fels S, Oldridge S, A Conceptual Structure for Computer Vision, Canadian Conference on Computer and Robot Vision, Canada, pp , 2011 [21] Bhaumik G, Mallick T, Chowdhury K S, Dr. Sanyal G, Analysis and Detection of Human Faces by using Minimum Distance Classifier for Surveillance, International Conference on Recent Trends in Information, Telecommunication and Computing, pp , [22] Lei Z, Wang C, Wang Q, Huang Y, Real-Time Face Detection And Recognition For Video Surveillance Applications, 2009 World Congress on Computer Science and Information Engineering, pp , [23] W. ZHAO, R. CHELLAPPA, P. J. PHILLIPS and A. ROSENFELD., Face Recognition: A Literature Survey. ACM Computing Surveys. 4, 2003 [24] Fanglin Chen, Jie Zhou, Senior Member, IEEE, and Chunyu Yang, Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy. IEEE TRANSACTIONS ON IMAGE PROCESSING. 18 (7), ,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
How To Improve Security Of An Atm
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security
COMPARISON OF VARIOUS BIOMETRIC METHODS
COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT [email protected], [email protected] Abstract This paper presents comparison
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Fast Subsequent Color Iris Matching in large Database
Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business Management
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
Traceable Physical Security Systems for a Safe and Secure Society
Hitachi Review Vol. 63 (2014), No. 5 254 Featured Articles Traceable Physical Security Systems for a Safe and Secure Society Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr.
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
False alarm in outdoor environments
Accepted 1.0 Savantic letter 1(6) False alarm in outdoor environments Accepted 1.0 Savantic letter 2(6) Table of contents Revision history 3 References 3 1 Introduction 4 2 Pre-processing 4 3 Detection,
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Biometrics Technology and Standards Overview
Biometrics Technology and Standards Overview Biometrics General term used alternatively to describe a characteristic or a process As a Characteristic it is a measurable biological (anatomical and physiological)
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
A Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
Limitations of Human Vision. What is computer vision? What is computer vision (cont d)?
What is computer vision? Limitations of Human Vision Slide 1 Computer vision (image understanding) is a discipline that studies how to reconstruct, interpret and understand a 3D scene from its 2D images
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
MORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence
Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence Andreas Lanitis Department of Multimedia and Graphic Arts, Cyprus University of Technology P.O Box 50329, Lemesos,
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
SURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control D.Jayanthi, M.Bommy Abstract In modern days, a large no of automobile accidents are caused due to driver fatigue. To
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
3D SCANNING: A NEW APPROACH TOWARDS MODEL DEVELOPMENT IN ADVANCED MANUFACTURING SYSTEM
3D SCANNING: A NEW APPROACH TOWARDS MODEL DEVELOPMENT IN ADVANCED MANUFACTURING SYSTEM Dr. Trikal Shivshankar 1, Patil Chinmay 2, Patokar Pradeep 3 Professor, Mechanical Engineering Department, SSGM Engineering
Automatic Traffic Estimation Using Image Processing
Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran [email protected] Abstract As we know the population of city and number of
Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 06 68 Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System Ibidapo, O. Akinyemi,
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO V. Conotter, E. Bodnari, G. Boato H. Farid Department of Information Engineering and Computer Science University of Trento, Trento (ITALY)
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
Palmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
Dr. Asher Vaturi The Max Stern Yezreel Valley College
Dr. Asher Vaturi The Max Stern Yezreel Valley College Performance indicators for Indoor and outdoor environment built areas Concern about the overall quality of the indoor environment We focus on issues
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION Smita S. Mudholkar 1, Pradnya M. Shende 2, Milind V. Sarode 3 1, 2& 3 Department of Computer Science &
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Smart Card in Biometric Authentication
Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: [email protected] Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:
Reliability of Fingerprint Verification in Ghana
Reliability of Fingerprint Verification in Ghana Osman Yakubu Garden City University College Department of Computer Science Kenyasi, Kumasi, Ghana ABSTRACT Biometric recognition refers to the automatic
A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
Palmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: [email protected]
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking
Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist,
Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Part 1: Overview of Biometric Technology and Verification Systems
Part 1: Overview of Biometric Technology and Verification Systems What Is Biometrics? 1 Once a tool primarily used by law enforcement, biometric technologies increasingly are being used by government
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
