Search results for: biometrics
-
BIOMETRICS
Journals -
Journal of Biometrics
Journals -
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublicationAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublicationDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
International Journal of Biometrics
Journals -
Assessment of River Water Quality and Pollution Status Using Physicochemical and Biometrics, Awetu River, Ethiopia
PublicationThe surface water is contaminated by a variety of synthetic organic and inorganic compounds, chemicals, and nutrients; due to this reason, the quality of the water resources of Ethiopia is declining at an alarming rate, resulting in severe environmental degradation. The main objective of the study was to recognize the pollution status river for the study area by physicochemical parameters and the extent of microbial environmental...
-
IET Biometrics
Journals -
IEEE Transactions on Biometrics, Behavior, and Identity Science
Journals -
IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications
Conferences -
Analysis of results of large-scale multimodal biometric identity verification experiment
PublicationAn analysis of a large set of biometric data obtained during the enrolment and the verification phase in an experimental biometric system installed in bank branches is presented. Subjective opinions of bank clients and of bank tellers were also surveyed concerning the studied biometric methods in order to discover and to explore relations emerging from the obtained multimodal dataset. First, data acquisition and identity verification...
-
Usability study of various biometric techniques in bank branches
PublicationThe purpose of the presented research was to evaluate the performance of the prepared biometric algorithms and obtain information on the opinions and preferences of their users in bank branches. The study aimed to determine users' attitudes towards particular modalities and preferences on how to use biometrics after the bank customers had practical experience with the operation of the prototype solutions. The research results...
-
Analysis of High Resolution Clouds of Points as a Source of Biometric Data
PublicationThe article presents the analysis devoted to human face data obtained by means of precise photographic scanners. Collected point clouds were used to make high precision meshes of human face. The essence of these studies is the comparison of relative features as well as the comparison of absolute models which require as precisely as possible matching of face models. The article focuses on the analysis of various parts of the human...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublicationW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
The dynamic signature verification using population-based vertical partitioning
PublicationThe dynamic signature is an attribute used in behavioral biometrics for verifying the identity of an individual. This attribute, apart from the shape of the signature, also contains information about the dynamics of the signing process described by the signals which tend to change over time. It is possible to process those signals in order to obtain descriptors of the signature characteristic of an individual user. One of the methods...
-
From hobbies, straightforward analysis to serious research – the road to phd degree
PublicationThe illustration of the main articles goal is an example of author's academic career course, the aim of which is to obtain a doctoral degree in the field of geodesy and cartography. Today, the most important thing for the young scientist is the devotion to research in certain field of science, which is interested for the large community of scientists. From a psychological point of view, a unity of interest and experiments must...
-
Biometryczna kontrola dostępu
PublicationOpisano szczegółowo algorytm detekcji oraz identyfikacji człowieka na podstawie punktów nodalnych twarzy. Zdefiniowano pojęcia: biometria, proces pomiaru biometrycznego, metody biometrycznej identyfikacji oraz kontrola dostępu. Przedstawiono opis opracowanego systemu biometrycznej identyfikacji wykorzystującego sztuczne sieci neuronowe. Podano wyniki badań oraz przeprowadzono ich wnikliwą dyskusję.Biometrics is the study of automated...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublicationHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Multiscaled Hybrid Features Generation for AdaBoost Object Detection
PublicationThis work presents the multiscaled version of modified census features in graphical objects detection with AdaBoost cascade training algorithm. Several experiments with face detector training process demonstrate better performance of such features over ordinal census and Haar-like approaches. The possibilities to join multiscaled census and Haar features in single hybrid cascade of strong classifiers are also elaborated and tested....
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublicationDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
A new method of presosns identification based on comparative analysis of 3D face models
PublicationThe article presents the use of modern close range photogrammetry for possessing highly accurate 3D models of the human face (including the ears). Modern methods used to obtain precise data describing the construction of a human face, and even the whole human body, should allow to get finished measurement material in a very short time. Those features belong to the optical scanning technology. Comparative analysis of models of the...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublicationA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...