biometric research papers 2015 IEEE PAPER





Image-based ear biometric smartphone app for patient identification in field settings
free download

Abstract: We present a work in progress of a computer vision application that would directly impact the delivery of healthcare in underdeveloped countries. We describe the development of an image-based smartphone application prototype for ear biometrics. The

Expanding the Human-Biometric Sensor Interaction Model to Identity Claim Scenarios
free download

Abstract Biometric technologies represent a significant component of comprehensive digital identity solutions, and play an important role in crucial security tasks. These technologies support identification and authentication of individuals based on their physiological and

Investigation into DCT Feature Selection for Visual Lip-Based Biometric Authentication
free download

Abstract This paper investigated using lip movements as a behavioural biometric for person authentication. The system was trained, evaluated and tested using the XM2VTS dataset, following the Lausanne Protocol configuration II. Features were selected from the DCT

Preliminary analysis of in utero low-level arsenic exposure and fetal growth using biometric measurements extracted from fetal ultrasound reports
free download

Abstract Background: Early life exposure to arsenic is associated with decreased birth weight in highly exposed populations but little is known about effects of low-level arsenic exposure on growth in utero. Methods: Using a sample of 272 pregnancies from New

Private Eyes: Secure Remote Biometric Authentication
free download

Abstract: We propose an efficient remote biometric authentication protocol that gives strong protection to the user's biometric data in case of two common kinds of security breaches:(1) loss or theft of the user's token (smart card, handheld device, etc.), giving the attacker full Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

VULNERABILITY ASSESSMENT OF MULTI BIOMETRIC SYSTEMS
free download

Abstract The objective of this study was to provide vulnerability analysis for multi biometric systems and their performance against the known attacks. The report helps in identifying and analyzing risks that may have detrimental outcomes on the security provided by multi

'Increasing the robustness of biometric templates for dynamic signature biometricsystems
free download

Abstract:Due to the high deployment of devices such as smartphones and tablets and their increasing popularity in our society, the use of biometric traits in commercial and banking applications through these novel devices as an easy, quick and reliable way to perform

Sagittal Thoracic and Lumbar Spine Profiles in upright standing and Lying Prone Positions among Healthy Subjects: Influence of various Biometric features.
free download

Sagittal thoracic and lumbar spine profiles in upright standing and lying prone positions among healthy subjects: influence of various biometric features.prone positions and to analyse their relationship with various biometric characteristics. Summary of Background Data

An image database of Drosophila melanogaster wings for phenomic and biometric analysis
free download

Abstract Background: Extracting important descriptors and features from images of biological specimens is an ongoing challenge. Features are often defined using landmarks and semi- landmarks that are determined a priori based on criteria such as homology or some other

Additional Safeguards for Children Using Biometric Technologies in the European Union Multilevel System from the Perspective of Fundamental Rights
free download

We want to identify the requirements for the respect of fundamental rights in the use of biometric technologies in the context of the European multilevel system in which we live (the compliance with applicable fundamental and human rights standards). with a particular

I feel like i'm taking selfies all day!: Towards understanding biometric authentication on smartphones
free download

ABSTRACT We present the results of an MTurk survey (n= 383) on the reasons for using and not using biometric authentication systems on smartphones. We focused on Apple's Touch ID as well as Android's Face Unlock as they are the most prevalent systems on the

SURVEY ON RECOGNITION OF DIFFERENT BIOMETRIC TRAITS
free download

Abstract: The face is a picture of the mind with the eyes as its interpreter. It is a complex multidimensional structure and needs a good computing technique for recognition. Face detection has been one of the most studied topics in the computer vision literature. As one

A Wearable Biometric Capture and Record System
free download

Page 1. A Wearable Biometric Capture and Record System Carlo Alberto Avizzano Emanuele Ruffaldipowered A novel wearable biometric capture system Page 6. Design GoalA novel biometric capture system (BCS) for capture and analysis of motion and EMG signals.

Notes on biometric variability in invasive species: the case of Psacothea hilaris hilaris
free download

Abstract Species morphometric variability is the result of the combined effect of genes and environment. This is emphasized in insects, especially in ones that rely on discrete food resources, such as xylophagous insects. Psacothea hilaris hilaris (Pascoe)(Coleoptera

A survey of distributed biometric authentication systems
free download

Abstract: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to detach the biometric data storage from the service provider. Besides, a new

Impacts on Database Performance in a Privacy-Preserving Biometric Authentication Scenario
free download

Abstract:Nowadays, biometric data are more and more used within authentication processes. Such data are usually stored in databases and underlie inherent privacy concerns. Therefore, special attention should be paid to their handling. We propose an

Robust Speaker Recognition Biometric System a Detailed Review
free download

Abstract:his paper reviews Biometric based Speaker Recognition and presents brief about various algorithms and techniques used at various stages of Speaker Recognition and development of Attendance System as application of Speaker Recognition. The research Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node
free download

ABSTRACT Biometric systems are a vital part of physical access control systems. Biometric systems ensure that access to use a system or service is done by a valid user. These systems are used in various applications like ATMs, voting system, aadhar card,

A Multimodal Approach to Improve the Performance of Biometric System
free download

Abstract-Biometric systems have very success rate in identifying an individual based on ones biological traits. In biometric history some features like weight, age, height etc. are also there to provide user recognition to some extent but not fully upto the mark because of

Block Projection Based Feature Extraction for Biometric Recognition with Multi-lead ECG
free download

Abstract:In order to reveal discriminant information from the multi-lead ECG to facilitate the ECG biometric recognition, two novel feature extraction algorithms are proposed in this paper. As opposed to the existing singlelead based techniques, the proposed algorithms

EXPLORING EMPLOYEES'PERCEPTION OF BIOMETRIC TECHNOLOGY ADOPTION IN HOTELS
free download

Abstract Biometric technology is quickly becoming a principal method of identification in today's fast-paced networked and security-conscious society. However, adoption of new technology is considered successful when employees embrace and use it effectively. The Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

A Personal Verification and Identification using Palmprint and Hand Geometry BiometricRecognition System
free download

Abstract-In this research method demonstrates to the study about identification and verification using hand geometry recognition system. The geometric measurement of human hand have been used for personal verification and authentication on the bases of different

A Biometric Evaluation of a Computerized Psychomotor Test for Motor Skill Training
free download

Practitioner Summary: Standardized psychomotor tasks can be computerized for assessing human motor skill, including the use of VR systems with haptic interfaces. Some systems have been validated against conventional test methods in terms of performance. A system

Blood and Biometric Data on an Established Salmo trutta macrostigma (Dumeril, 1858) Population in an Italian Stream: Preliminary Results
free download

Abstract.-The aim of this study was to obtain a basic knowledge of some blood haematological and biochemical characteristics of Salmo trutta macrostigma (S. t. macrostigma) captured in Anapo river, Italy. White blood cell count (WBC), red blood cell

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security.
free download

Abstract Multibiometrics is the usage of more than one physiological or behavioral characteristic to identify an individual. Multibiometrics is advantageous over unibiometrics as it is resilience to spoofing and has low False Acceptance Rate (FAR). However

A Novel IKP-Based Biometric Recognition Using Mobile Phone Camera
free download

This paper explores an inner-knuckle-print (IKP) biometric recognition, based on mobile phone. Since IKP characteristics are captured by using mobile phone camera, the greatest challenge is that IKP images from the same hand have different illumination, posture, and

An Exploration of the Impacts of Three Factors in Multimodal Biometric Score Fusion: Score Modality, Recognition Method, and Fusion Process
free download

Data fusion can be performed at different levels, eg, pixel, feature, score, and decision. Accordingly, the corresponding data preprocessing is also different for each level. For example, pixel-level and feature-level image fusion usually require registration and

Biometric Security Enhancement using GLCM Method: A Review
free download

Abstract:Iris texture pattern can be used for biometric verification and identification of a person from a large dataset. However, such a biometric recognition system can only recognize those people who have already been enrolled in the system. Iris recognition

The Potential for Adaptive Safety through In-Vehicle Biomedical and Biometric Monitoring
free download

ABSTRACT A 2009 study by the National Highway Traffic Safety Administration identified certain medical conditions as contributing factors in crash causation (Hanna 2009). It was

ESTIMATION OF THE BENTHIC ENERGY IN TWO ARID TROPICAL SANDY BEACHES AT SOUTH EASTERN RED SEA, SAUDI ARABIA USING BIOMETRIC
free download

ABSTRACT: The energy content of benthic invertebrates was estimated of two arid tropical sandy beaches, namely AlBirk and AlHorida, on the south eastern coast of the Red Sea, Saudi Arabia in the summer of 2007. This is the first study to deal with the benthic energy Matters do not always unfold as expected on projects. Actions taken by stakeholders are not always realistic, and certain processes can appear chaotic. An ocean of information hits decision makers everyday in the present world. A person can get lost in its quagmire when

Research on Human Silhouette Detection Methods for a Non-cooperative BiometricSystem
free download

Abstract:Together with the development of effective and efficient people identification algorithms, biometric authentication systems become increasingly popular and widespread, leading to a significant growth in the number of institutions interested in implementing and Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System
free download

Abstract:Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. Recently, biometric information has been used for authentication schemes because it is difficult to Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card
free download

Abstract To protect the resources from unauthorized users, the remote user authentication have become an essential part in the communication network. Currently, smart card-based remote user authentication for multi-server environment is a widely used and researched

Ensuring Quality in Biometric Systems
free download

Abstract Biometric system is using for personal recognition of people in many social and economical activities now a days. A good biometric trait should be measurable, distinctive and stable over time. Real-world deployment of biometric systems often has to contend

Development of a Smart Wearable Device for Human Activity and Biometric Data Measurement
free download

Abstract This paper presents a smart wearable device cooperating with smartphones to measure and utilize human activity and biometric data such as motion tracking, photoplethysmography (PPG), skin temperature (SKT), and galvanic skin response (GSR).

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction
free download

Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

Development of Microcontroller-Based Biometric Locker System with Short Message Service
free download

Abstract:The study was a development of a microcontroller based biometric locker system with short message system (SMS) which ensures the security of personal and confidential belongings of a person. Developmental research method which was comprised of

Multi-Secure Authentication using Sift Algorithm in Biometric Cryptosystem
free download

Abstract Most of the system breaches are caused by authentication errors during the login process and these failures are caused due to the limitations associated with existing authentication methods. The existing proxy-based biometric authentication methods are

Authentication Scheme based on Biometric Key for VANET Information System in M2M Application Service
free download

Abstract: Smart machines and devices are rapidly deployed in the future, a secure mobile environment will be mandatory. Smart machines and devices of future are being developed towards smart machine and device based M2M (Machine to Machine) by using IT (

Cohort Selection of Specific User Using Max-Min-Centroid-Cluster (MMCC) Method to Enhance the Performance of a Biometric System
free download

Abstract Selection of cohort models plays a vital role to increase the accuracy of a biometric authentication system as well as to reduce the computational cost. This paper proposes a novel approach for cohort selection called Max-Min-Centroid-Cluster (MMCC) method.

A New Secure Storing System for Biometric Templates Based Encryption and Concealment
free download

MATERIALS AND METHODS Proposed system: The proposed system has been consist of three phases, improved encryption/decryption method, improved concealment/extracting method and finally combining the two methods. This system has been implemented in

Biometric Solutions as Privacy Enhancing Technologies
free download

Abstract This research is focused on giving a comprehensive overview of the secure biometric systems field, analysing it from privacy enhancing technology (PET) perspective. The widespread use of biometric systems, the nature of the shared data, the kinds of use

A New EEG Acquisition Protocol for Biometric Identification Using Eye Blinking Signals
free download

Abstract:In this paper, a new acquisition protocol is adopted for identifying individuals from electroencephalogram signals based on eye blinking waveforms. For this purpose, a database of 10 subjects is collected using Neurosky Mindwave headset. Then, the eye

Biometric Authentications to Control ATM Theft
free download

Abstract-In the current scenario the way banking and transaction system is changing in the world, the validation, authentication and confirmation of a person is very important and should be of more concern. Authentication and verification has always been the part to Cancelable biometrics describes a class of biometric matching algorithms designed to address the security and privacy concerns because of the limited number of biometric samples. This limitation–humans have only one face, two eyes, and up to ten fingers–

Biometric Analytics Cost Estimating
free download

Abstract This paper examines the interplay between biometric technologies and advanced analytics, referred to as biometric analytics, as a way to detect fraudulent entries in a biometric system. We follow a systematic approach, based on cost estimating standards,

Fast and Secure Linear Regression and Biometric Authentication with Security Update
free download

Abstract. We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts. We prove its security under the LWE assumption, and innovatively show how the scheme can be used to handle computations over both binary strings and real numbers. In

A study on the Intelligent Techniques of the ECG-based Biometric Systems
free download

Abstract:Electrocardiogram (ECG) signal reflects the recorded cardiac electrical activity of an individual over time; it has been emerged as an important biometric trait. It has the advantages of being a unique aliveness indicator as it is difficult to spoofed and falsified.

Enhanced Biometric-based User Authentication Protocol Using Non-tamper Resistant Smart Cards
free download

Abstract This paper reviews An's enhanced biometric-based user authentication protocol and shows that it is weak against the password guessing attack and has a problem of verification in the authentication phase. They are very important features to be secured to

Biometric Security through Multimodal Systems
free download

This paper gives a review of multimodal authentication system. For the security of any individual and to prove his uniqueness, multimodal authentication serves as backbone. During the last few years, military and intelligence organization have encountered many

Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
free download

Abstract Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in diverse fields. It ensures actual presence of biometric entity of a person in

Integrated Multi-Stage Biometric System Design
free download

Abstract In this paper, an integrated multi stage biometric system design is proposed using speech, face and finger print along with Artificial Neural Network (ANN). The voice recognition subsystem utilises Mel-frequency Cepstrum Coefficient (MFCC) feature

Multi-Biometric Recognition for Iris and Ear Images by using ICA, GA, Hamming Distance
free download

Abstract The integration of different biometric sources, often termed as biometric fusion. The design issue is one of the major concerned while choosing the properties of the biometrics. The fusion scheme can be classified into sensor level, feature level, score level and

A biometric-based Password Authentication with key Exchange Scheme using Mobile Device for Multi-Server Environment
free download

Abstract: Remote authentication for multi-server environment can help users register only once and access arbitrary services conveniently in the same registry realm. However, most of the solutions are plagued by security problems. In this paper, we point out that 'a novel Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

An Approach to Robust Biometric Key Generation System Design
free download

Abstract: This paper presents a novel approach to the design of robust multimodal biometric cryptosystems. The design objectives behind the system are robustness, privacy of user's biometric templates and stable cryptographic key generation. The framework presented in

A Multimodal Biometric System Based on Palmprint and Finger Knuckle Print Recognition Methods
free download

Abstract: Biometric authentication is an effective method for automatically recognizing a person's identity. In our previous paper, we have considered palm print for human authentication. Recently, it has been found that the Finger Knuckle Print (FKP), which

A Secured Public Key Cryptosystem for Biometric Encryption
free download

Summary In the modern era security plays an important role in each and every field. The needs for stringent security measures in biometric systems have greater importance for information security systems. The biometric systems to offer reliable and high security to

Error Correction Codes for Biometric Cryptosystem: An Overview
free download

Abstract In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By

Electrocardiogram (ECG) as a Biometric Characteristic: A Review
free download

Abstractiometric systems are mostly used as person identification or verification systems. In the last few decades, the Electrocardiogram (ECG) has been introduced as a most powerful biometric tool for personal/individual identification. ECG has unique cardiac feature to

Modify k-medoids Algorithm with New Efficiency Method for Biometric Database Classification
free download

Abstract:K-medoids algorithm modified by changing the condition factor. Largest cluster elements number is used instead of the cluster number. The modified algorithm is applied to images data base of the human face with different environment (direction, angles etc.).

Hand Vein-based Multimodal Biometric Recognition
free download

Abstract: Multi-modal biometric recognition utilizes more than one modality for recognition of a person, when compared to the single modality with the help of enhanced security. The vascular patterns are one of the physiological biometrics and internal feature of the body,

A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates
free download

Abstract:In this paper, we base our research on biometric systems security. We begin by introducing biometrics after which we will describe how a biometric system works before we later define what a biometric template is. Thereafter, we will explore attacks on biometric

Biometric Authentication of an Individual Using Multilayer Perceptron and Support Vector Machine
free download

Abstract:The proposed method uses multi layered perceptron neural network and support vector machine to classify the normal subjects. Data used for training, testing and cross validation was recorded from normal persons (without any heart disease) within thirty six

MODELING OF BIOMETRIC IDENTIFICATION SYSTEM USING THE COLORED PETRI NETS.
free download

ABSTRACT: In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The

Hybrid Approach for Securing Biometric Templates Using Visual Cryptography
free download

Abstract: Security of information is one of the most important factors of information technology and communication. Also an accurate automatic personal identification is essential in a wide range of application domains such as national ID card (Aadhar Card),

A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Templates in Verification and Identification Systems
free download

Abstract: The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features

Next Generation Secure Computing: Biometric in Secure E-transaction
free download

Abstract: To establish identity of an individual is becoming critical in our heavy interconnected society. The need for reliable user authentication techniques has increased heightened concerns about security and rapid developments in networking,

Time-intervals as a Behavioral Biometric
free download

Humans perform actions across a wide range of time scales, from the firing of individual neurons approximately 200 times per second, to the submission of a research paper, which may occur only several times per year. Our actions form a hierarchy of time scales

A MULTI-FACTOR AUTHENTICATION SCHEME INCLUDING BIOMETRICCHARACTERISTICS AS ONE FACTOR
free download

Abstract: Multi-factor authentication schemes have been proved to be very useful in many authentication systems including biometric ones. In this paper we have proposed a multi- factor authentication scheme, in which one of the main components is represented by the Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and Logical access control is the means and procedures to protect access to information on PCs, networks, and mobile phones. A variety of credential types may be used, such as passwords, tokens, or biometrics, to authenticate the user. These credentials may

Biometric Systems Based on Palm Vein Patterns
free download

Abstract:The work covers issues related to the design of biometric systems based on the hand vascular pattern. The study includes analysis of various stages of biometric systems design ranging from acquisition, feature extraction and biometric pattern creation for

Biometric system based on off-line signatures
free download

Abstract: Biometrics not only authenticates an individual's identity but is also a process that applies security measures to various systems such as bank check verification, authentication of legal documents etc. Handwriting is one of the unique and widely acceptable modes of

Computerising the Voting Process: On the Difficulties and Benefits of BiometricVerification Elections
free download

Abstract:The use of biometric system of verification is increasingly assuming phenomenal dimensions in contemporary electoral activities across the globe. However, the academic community appears to know very little of the extent to which biometric systems of SNR, these images can be digitally deblurred by standard image deconvolution algorithms to recover depth-dependent detail, enabling accurate iris recognition and identification. It is shown that even the intermediate, distorted iris images maintain sufficient low-and mid-

An Efficient Palmprint Biometric System Based On Progressive Image Compression
free download

Abstract:In this paper, we propose an efficient multi-spectral palmprint identification system. For that, we compressed each palmprint band at 0.5 bit per pixel (bpp) by a progressive image compression algorithm where we used the famous Set Partitioning In

A Multimodal Approach to Enhance the Performance of Biometric System
free download

ABSTRACT: Multimodal biometric system is the combination of more than one biometric trait to authenticate an individual. Unimodal biometric systems use only one biometric trait (iris, retina, face, hand geometry, fingerprint, voice, gait, signature etc.) to recognize individual.

RECOGNITION OF FACES IN THE CROWD USING BIOMETRIC TECHNOLOGIES MIXED
free download

Abstract: This paper aims to develop under Microsoft Visual Studio, a practical application detection and recognition of people using Haar classifiers in conjunction with an algorithm personal centroid detection of eye gaze direction. The method uses biometric technology Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace–a place where they were known and

Research on Multimode Biometric Features Recognition System Adopting Neural Network
free download

Abstract: The small sample issue is a common problem in face recognition system, and multi- modal model has strong generalization ability to solve the problem of small sample, which has already become the most important area of research in pattern recognition, however,

Fake Biometric Detection Using Improved Features in Image and Dempster-Shafer Method
free download

Abstract-Biometric systems are vulnerable to various types of attacks. In this paper, a software based multi biometric and multi attack protection method based on image quality assessment is used to identify the real and fake traits. The present system proposes 30

Multimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology
free download

Abstract: In this technical era, providing a security to the data is a challenging task. This article addresses the issues related to privacy and security issues of RFID technology. RFID is radio frequency identification technology. RFID is a wireless non-contact technology

Fingerprint Registration Using Zernike Moments: An Approach for a Supervised Contactless Biometric System
free download

Abstract In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration

Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
free download

Abstract:The most important shortcomings of solutions based on public key infrastructure and digital signatures are: costs, ambiguous laws, and nuisance of daily use. The purpose of this article is to discuss the motivation and benefits, as well as a presentation of concepts,

GAUSSIAN FILTER BASED BIOMETRIC SYSTEM SECURITY ENHANCEMENT
free download

Abstract-A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or

Secured Lip Biometric based Authentication System
free download

Abstract The proposed system is to develop an authentication system based on lip gestures. Lip password verification is an important research topic in the area of biometric authentication. In this project the work is done in such a way that the lip gestures are

Highly Secured Railway Reservation using Biometric Technology
free download

Abstract: Security is the main factor in all organizations and has more importance in Indian Railway. Security can be provided by any mean cannot provide more flexibility, the existing rail system does not contain sufficient security, so we think to implement biometrics in our

Biometric Finger-Vein Recognition for ATM
free download

Abstract: In this paper biometric finger-vein recognition (FVR) system for authentication on ATM network is proposed. The system is implemented on the basis on embedded platform and equipped with a novel finger-vein recognition algorithm and implemented in MATLAB Due to difficulty in controlling the lighting conditions in practical applications, variable illumination is one of the most challenging tasks in face recognition. Prior to face recognition, illumination compensation has to be performed, whereby the uneven illumination of

CONTRIBUTION TO THE FORMULATION OF A CORRELATION LENGTH/WEIGHT ONBIOMETRIC DATA RECORDED ON TUNA (THUNNUS THYNNUS
free download

SUMMARY Oceanis srl, as part of the assignment of the Ministry of Agriculture and Forestry, General Directorate of Fisheries and Aquaculture, Italy, for the implementation of the national observation program for the fishing season for bluefin tuna in 2013, has carried

Multimodal Biometric Authentication For Automated Teller Machine
free download

Abstract:In the world of computer scienceinformation technology security is essential and important issue. Identification and Authentication Techniques plays an important role while dealing with security and integrity. The human physical characteristics like

The Practical Implementation of Biometric Technology–Legal Aspects
free download

Abstract:The article refers to legal and social problems, which may occur while implementing a biometric system. The research on biometric regulation made by the author while preparing the Ph. D. thesis resulted in finding general rules, which should be

Biometric Voting System in Ghana. A Case Study
free download

Presently in Ghana, the electoral process involves biometric registration of eligible voters and queuing up of the registered voters, to cast their votes using ballot papers and indelible ink on the day of voting. At the end of the voting exercise, the counting of the ballots

Analysis of Polymorphic DNA Sequences in the Identification of Individuals and its Possible Use in Biometric Systems
free download

Abstract:The article presents the achievements in DNA forensic science practice, the latest developments as well as future trends. The article concerns also other than forensic DNA applications as well as expectations, concerns and obstacles. DNA identification

A Study and Comparison of NIR Hyperspectral Imaging and Other Emerging BiometricTechniques in Security System
free download

ABSTRACT Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market,

Performance and Security Evaluation of Palmprint Biometric Templates
free download

Abstract:Template security is a critical issue in biometric systems because biometric templates cannot easily revoked and reissued. Nevertheless, biometric systems are prone to a variety of attacks. Hence, providing security to this form is of prime importance. In our

A Biometric Based Secure Session Key Agreement using Modified Elliptic Curve Cryptography
free download

Abstract: Protection of data and network security has been greatly researched. To enhance the security in the case of border control applications like E-Passport, conventional cryptographic concepts are integrated with biometrics. To avoid the intrusion of terrorists

A Comparative Study on Biometrics For Building Similarity Based Multimodal BiometricSystem
free download

Abstract Single biometric systems have a range of issues like noisy information, nonuniversality, spoof attacks and unacceptable error rate. In order to avoid these attacks Multimodal biometric template securing system can be developed by fusing multiple

ECG Biometrics: New Algorithm and Multimodal Biometric System
free download

Page 1. ECG Biometrics: New Algorithm and Multimodal Biometric System by Shahrzad PouryayevaliPage 24. Chapter 2 ECG as a Biometric 2.1 Introduction In this chapter we first describe what the electrocardiogram signal represents and introduce it's different components.

An Efficient Fake Biometric Detection Technique Exploiting Structural Similarity Index
free download

Abstract: In this paper, we propose a novel image quality assessment (IQA) based on an Improved Structural Similarity (ISSIM) which considers the spatial distributions of image structures. The existing structural similarity (SSIM) metric, which deals with structure loss

INVESTIGATE THE POTENTIAL OF EEG SIGNALS FOR BIOMETRICAUTHENTICATION: A POWER SPECTRAL DENSITY APPROACH
free download

1.1 What is Biometrics Biometrics is the science of measuring and analysis of certain unique human body characteristics for authentication purposes (Jain et al. 2000, Jain et al. 2008). In information technology, biometrics refers to technologies that measure and

Study of the Effect of Salt Stress on Biometric Characteristics of Barley: Hordeum Vulgare L.(Poaceae)
free download

Abstract:The aim of our work is to study the response of the barley plant (Hordeum vulgare L.) to salt stress, at different NaCl concentrations (0, 50, 100, 150 and 250 mM) and follow its growth over time in the effect of salt stress. The control is based mainly on measurements

THE EAR AS A BIOMETRIC
free download

Abstract:Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics. Biometric identification methods have proved to be very efficient, more natural and easy for users than traditional methods of human

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
free download

Abstract:While biometrics have long been promoted as the future of authentication, the recent introduction of Android face unlock and iPhone fingerprint unlock are among the first large-scale deployments of biometrics for consumers. In a 10-participant, within-subjects

E-Voting security system through Biometric Cloud Computing Integration with virtual server application
free download

Abstract: Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based

Biometric Personal and Informational privacy concerns: An empirical study in the Kenyan context
free download

Abstract: Purpose: Great strides have been made in the realm of technology in Kenya. This has contributed greatly in the organic growth of the Kenyan economy and improved the standards of living of many Kenyans. However with the sporadic adoption of technologies

The iris biometric feature segmentation using finite element method
free download

Abstract This manuscript presents a method for segmentation of iris images based on a deformable contour (active contour) paradigm. The deformable contour is a novel approach in image segmentation. A type of active contour is the Snake. Snake is a parametric curve

SECURED BIOMETRIC AUTHENTICATION IN CLOUD SHARING SYSTEM
free download

Abstract: The project mainly focus on Secure Storage and Sharing in cloud computing. Cloud services are used for storing and retrieving the data. Nowadays, most of the drawbacks in cloud computing is the user authentication problems. The proposed system

A New Method for Biometric Application Using PCG Signals
free download

Abstract:honocardiogram (PCG) signals as a biometric is a new and novel method for user identification. Use of PCG signals for user recognition is a highly reliable method because heart sounds are produced by internal organs and cannot be forged easily as compared

A Combined Approach for Biometric System in Secured Applications
free download

Abstract: Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot

BIOMETRIC ADVANCE OF SCLERA VEIN AND FINGER VEIN FEATURES FUSION RECOGNITION
free download

Sclera and finger print vein is a new parallel vein recognition method using a two-stage parallel approach for registration and matching. First, we designed a rotation-and scale- invariant Y shape descriptor based feature extraction method to efficiently eliminate most

A Taxonomy of Architecture-specific Use Cases, Security Risks and Mitigations inBiometric Solutions for Mobile Devices
free download

ABSTRACT Biometric solutions for mobile devices are becoming increasingly common. As more biometric applications enter the market, it has become clear that the design choices of a mobile biometric solution could possibly influence the application's usability and security

A Succession Multi-Modal Biometric Identification Hypothesis
free download

ABSTRACT Multibiometrics is the combination of one or more biometrics (eg, Fingerprint, Iris, and Face). Researchers are focusing on how to provide security to the system, the template which was generated from the biometric need to be protected. The problems of

Review of existing Indian Voting System and hybrid design using Biometric Security in Voting Authentication Process
free download

Abstract Voting is a decision making mechanism in a consensus-based society and security is most essential part of voting. The critical role in determining the outcome of an election, Electronic Voting Systems must be designed and developed with the greatest care. It is

Privacy-enhanced Biometric Hamming Distance Classification
free download

ABSTRACT Biometrics is a very effective way of verifying a person's identity, but it also raises privacy concerns. Because biometrics can never be changed, they should be kept private. Therefore it is important that biometric data is always encrypted when stored on a

Influence of the Soil-Free Substrate on the Biometric Parameters of Bean and Barley Germination
free download

ABSTRACT. In the laboratory conditions, influence of the substrate based on brown coal and natural zeolite (clinoptilolite) on the biometric parameters of bean and barley germination has been investigated. In the first version the soil (object of comparison) was used as the

IMAGE QUALITY ASSESSMENT USING BIOMETRIC LIVINESS DETECTION FOR FAKE FINGER PRINT
free download

Abstract A biometric system is a computer based system and is used to identify the person on their behavioural and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.). A typical biometric system consists of feature extraction

Improved Algorithm for Creating a Template for the Information Technology of BiometricIdentification
free download

Abstract The modern tasks of identification of objects require a fine precision and efficiency of their decision. Biometric information technologies are actively applied in different security systems and access control. The most perspective approaches in this case are the

Face Recognition as a Biometric Security for Secondary Password for ATM Users. A Comprehensive Review
free download

ABSTRACT Authentication is an important aspect in system control in computer based communication. Automatic Teller Machines (ATMs) are widely used in our daily lives due to their convenience, wide-spread availability and timeindependent operation. In this paper,

Chaotic Maps for Biometric Template Protection-A Proposal
free download

Abstract Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can decline its security. Towards addressing these concerns

Fake Biometric Trait Detection Using Image Quality
free download

Abstract-Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is needed in order to combat the epidemic growth in identity theft. To ensure biometric system security, liveness assessment can be applied in order to guard

Aadhaar Automated Biometric Identification Subsystem Interface
free download

The Unique Identification Authority of India (UIDAI) has been created, with the mandate of providing a unique identity to all Indian residents. The UIDAI has published an approach1 to pursuing this mandate, and plans to use biometrics to eliminate duplicates and ensure



CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER