ENGINEERING RESEARCH PAPERS

biometrics IEEE PAPER 2016




targets and Hand Postures on Touch-based Behavioural Biometrics
free download

ABSTRACT Users' individual differences in their mobile touch behaviour can help to continuously verify identity and protect personal data. However, little is known about the influence of GUI elements and hand postures on such touch biometrics. Thus, we present

BIOMETRICS RESEARCH
free download

On behalf of the organisers Elsevier and its partner, the Biometrics Institute, I am absolutely delighted to welcome you to Biometrics 2015: Secure Identity Solutions Now! It is within this international conference that you will debate and shape the current and future use of

Analysing comparative soft biometrics from crowdsourced annotations
free download

Abstract: Soft biometrics enable human description and identification from low quality surveillance footage. This paper premises the design, collection and analysis of a novel crowdsourced dataset of comparative soft biometric body annotations, obtained from a

Human Identification Using Palm-Vein Images: A New Trend in Biometrics
free download

Abstract: Biometrics authentication is a growing field and attracted much attention. Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Biometric recognition refers to the automatic recognition of individuals based on their

Effects of image compression on ear biometrics
free download

Abstract: An ear recognition system represents a powerful tool in forensic applications. Even in case the facial characteristic of a suspect is partly or fully covered an image of the outer ear may suffice to reveal a subject's identity. In forensic scenarios imagery may stem from

Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification
free download

Abstract–Basic aim of a biometric system is automatically discriminate between subjects as well as protects data. It also protects resources access from unauthorized users. In biometric system physical or behavioral traits are used for recognition purpose. A multimodal Recently, biometrics technology has been one of the hot research topics in the IT field, because of the demands for accurate personal identification or verification to solve security problems in various applications, such as e-commence, Internet banking, access control,

Journal of Biometrics Biostatistics
free download

Abstract With the recent release of FDA draft guidance (2010), adaptive designs, including adaptive randomization (eg response-adaptive (RA) randomization) has become popular in clinical trials because of its advantages of flexibility and efficiency gains, which also have

On-Demand Biometrics: Fast Cross-Device Authentication
free download

ABSTRACT We explore the use of a new way to log into a web service, such as email or social media. Using on-demand biometrics, users sign in from a browser on a computer using just their name, which sends a request to their phone for approval. Users approve

Providing Biometrics Security for Load Balanced Cloud Data Storage
free download

Abstract: Sensitive data to be stored in the cloud is to be prevented from unauthorized access. To perform this prevention the entire data is to be split into many partitions and the encrypted partition of files are stored in different services. Whenever the data is required to

Security Improvement of Biometric Authentication Systems at CancelableBiometrics
free download

Abstract Canceiable biometrics techniques are considered from the viewpoint of data protection in authentication systems. Though various methods are proposed for this technology, the security criterion is indenite. Moreover, there is still no work on the

Robust Biometrics Based Authentication Scheme Using Watermarking
free download

Abstract Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the

Machine Learning Methods Applied to Biometrics
free download

Abstract Biometrics is a challenging field which uses physiological and behavioral characteristics of persons in order to establish their identities. Biometrics research requires the fusion of several other fields, fields that are in a continuous development. Among

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES RESEARCH TECHNOLOGY RECENT ADVANCEMENTS IN EAR BIOMETRICS: A REVIEW
free download

ABSTRACT Ascertaining the identity of a person is quite an important aspect of Forensic Science. There are so many physiological features have been proved to be highly discriminating among individuals. Biometrics play a significant role in individualizing a

A Study on Benefits of Biometrics Attendance System: A Technological based Human Resource Management Practice Author1
free download

ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly in regard to employee's attendance;

The Consensus Clustering as a Contribution to Parental Recognition Problem Based on Hand Biometrics
free download

Abstract:The clustering analysis is a subject that has been interesting researchers from several areas, such as health (medical diagnosis, clustering of proteins and genes), marketing (market analysis and image segmentation), information management (

Observer variability in measuring animal biometrics and fluctuating asymmetry when using digital analysis of
free download

Ecological research using biometric data is only sound if biometrics themselves are accurate and not confounded by measurement error. Given concerns about the accu racy of biometrics taken directly(physical measurement of animals), digital measure ment of

An Access Control System using Bimodal Biometrics
free download

ABSTRACT In today's society, advances in technology have made life easier by providing us with higher levels of knowledge through the invention of different devices. However, each technological innovation harbours the potential of hidden threats to its users. One major

A Secure Multiserver Authentication Protocol for Smart Cards using Combined Logout Scheme and Biometrics
free download

Abstract: Online transaction can be done by using biometrics-based smart card, but yet there is no proper authentication. We first analyze He-Wang's scheme and it is susceptible to discover session-specific temporary information attack and impersonation attack. In this

Roundwood Tracking using Log End Biometrics
free download

Abstract: Log end biometrics is a physically marking free approach to establish log traceability from forest-site to further-processing companies. Within an Austrian research project questions regarding the applicability of log end biometrics were investigated. This

BIOMETRICS SYSTEM ACKNOWLEDGEMNT BASED ON DATA FUSION
free download

ABSTRACT In these days lot of systems have need an efficient and reliable biometrics recognition system. By considering the importance of biometric systems in global world, in this paper we are discussing the importance of a new era of verification. Applications of

A Literature Review on Liveness Assessment of Multimodal BiometricsThrough Image Quality Assessment
free download

Abstract Image Quality assessment plays an important role in image analysis because of which it has been a topic of intense research over the last several decades. This study gives an overview of the process of image quality measurement for liveness assessment of

Fusion of Multimodal Biometrics using Feature and Score Level Fusion
free download

Abstract:Abstract-Biometrics is used to uniquely identify a person's individual based on physical and behavioural characteristics. Unimodal biometric system contains various problems such as degree of freedom, spoof attacks, non-universality, noisy data and error

Robust Biometrics Based Authentication Scheme Using Watermarking
free download

ABSTRACT In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless,

DATA SECURITY ASSESSMENT USING INTELLIGENT BIOMETRICS AND COMPARING ITS PERFORMANCE WITH NANO-SENSORS
free download

ABSTRACT The point of the present study is the examination of protection control systems based on intelligent biometrics. One of the most significant applications of these systems is being used as a protection-security system. This research aims to prove the reliability of

Intra-Palm Propagation Signals as Suitable Biometrics for Successive Authentication
free download

Abstract: We propose the use of intra-palm propagation signals as biometrics. The intra- palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm

Securing system access using multi-model biometrics for authorization
free download

Abstract Today, the security requirements of society have placed biometrics at the center of a large debate as it is becoming a key aspect in a multitude of applications. Proposed system is the implementation of the embedded system for the online signature, finger print and

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES RESEARCH TECHNOLOGY MULTI-MODEL BIOMETRICS AUTHENTICATION FRAMEWORK
free download

ABSTRACT Authentication is the process to conform the truth of an attribute claimed by real entity. Biometric technology is widely useful for the process of authentication. Today, biometric is becoming a key aspect in a multitude of applications. So this paper proposed

Review: Roundwood Tracking using Log End Biometrics
free download

Abstract: Log end biometrics is a physically marking free approach to establish log traceability from forest-site to further-processing companies. Within an Austrian research project questions regarding the applicability of log end biometrics were investigated. This

Finger Vein Biometrics Approach for Person Identification
free download

Abstract:A approach in finger vein identification to improve the performance of the system. The finger vein patterns are used for biometric verification which is more secure then other biometrics. The proposed method uses the gabor filter for the extraction of the vein

SURVEY ON FUSION OF MULTIMODAL BIOMETRICS USING SCORE LEVEL FUSION
free download

www.elkjournals.com SURVEY ON FUSION OF MULTIMODAL BIOMETRICS USING SCORE LEVEL FUSION Keywords – Multimodal biometrics, Level of fusion, Fusion methods.

Hold Sign: A Novel Behavioral Biometrics for Smartphone User Authentication
free download

Abstract:The search for new authentication methods to replace passwords for modern mobile devices such as smartphones and tablets has attracted a substantial amount of research in recent years. As a result, several new behavioral biometric schemes have

Comparison of Biometric Authentication Software Techniques: GEFE vs. Angle Based Metrics
free download

Abstract In this paper, we explore three alternatives for developing a biometric authentication software system. The first approach we will consider is a computer vision technique optimized by Genetic and Evolutionary Feature Extraction (GEFE); the second

Multi Modal Biometric Systems: A State of the Art Survey
free download

Abstract-In its most general definition, Biometrics refers to the science of automatic recognition of individuals based on some specific physiological and/or behavioral features. A biometric system that is based on one single biometric identifier does not always come

Performance Evaluation of Multimodal Biometric Systems based on Mathematical Models and Probabilistic Neural Networks
free download

Abstract:Multimodal biometrics overcome the technical limitations of unimodal biometrics, making them ideally suited for everyday life applications that require a reliable authentication system. However, for a successful adoption of multimodal biometrics, such

Visual Field Loss, Quality of Life and Ocular Biometric Parameters: A Cross Sectional Study of Taiwanese Adults
free download

Abstract Purpose: To evaluate the severity of visual field loss in Taiwanese adults and assess the associations between visual field loss detected by frequency doubling technology (FDT) perimetry and vision-related quality of life (QoL) in Taiwanese adults.

Biometric Identification Using 3D Ear Recognition System
free download

Abstract: Biometric identification using 3D Ear recognition system is for authenticating the identity of an individual in information sensitive areas. It provides controlled access to the system using biometric 3D Ear template which is unique for each individual. This paper

Dental Biometric Approach for Human Identification using Dental X-Ray Images of Maxillary Bone
free download

Abstract-Human identification is becoming one of the major worldwide issues now days. Dental biometrics is the leading biometric technique to identify individuals on the basis of their dental characteristics. Dental Features of persons are naturally unique, one of feature

An Efficient Secure Multimodal Biometric Fusion Using Palm print and Face Image
free download

Abstract A Biometric system is essentially a pattern recognition system that makes use of biometric traits to recognize individuals. These biometric systems based on single modality suffers with various challenges such as noise in sensed data, intraclass variations, inter-

Determination of the Uncertainties and the Physiological Similarities of Family Members by using the Biometric Device the Broadway 3D
free download

Abstract The biometric identification by the face is one of the oldest biometric identification. With increasing progress has been using of identification by the face was implemented into area of security, where it provides a faster and more accurate identification. The 3D face

An assessment of the usability of biometric signature systems using the human-biometric sensor interaction model'
free download

Abstract Signature biometrics is a widely used form of user authentication. As a behavioural biometric, samples have inherent inconsistencies which must be accounted for within an automated system. Performance deterioration of a tuned biometric software system may

Biometric Verification, Security Concerns and Related Issues-A Comprehensive Study
free download

Abstract:There has been many attempts to make authentication processes more robust. Biometric techniques are one among them. Biometrics is unique to an individual and hence their usage can overcome most of the issues in conventional authentication process. This The last two decades have seen a dramatic increase in the number of stakeholders of biometric technologies. The quality of the technologies has increased due to an improvement in underlying data processing and sensor technologies. A growing and

Cancellable fuzzy vault with periodic transformation for biometric template protection
free download

Abstract: Nowadays, biometrics-based authentication is playing a potential approach for many modern applications such as banking, homeland security etc. However, the end-users may feel uncomfortable to deploy this technology because of not well-solved accurate rate

Development of Hydrogel based Bio-Inoculant Formulations and their Impact on Plant Biometric Parameters of Wheat (Triticum aestivum L.)
free download

Original Research Article http://dx.doi.org/10.20546/ijcmas.2016.503.103 Development of Hydrogel based Bio-Inoculant Formulations and their Impact on Plant Biometric Parameters of Wheat (Triticum aestivum L.) Archna Suman 1 *, Priyanka Verma 1 Ajar Nath Yadav 1,2

An Enhanced Biometric-Based Three Factors User Authentication Scheme for Multi-server Environments
free download

Abstract Authentication is an important and basic security service for many network based applications, which allows the registered user access remote services after the validity of his/her identity is verified by the remote server. Password, smart card and biometric are

Multiple Biometric System Application: Iris And Fingerprint Recognition System
free download

ABSTRACT In day today life security is most important issue. Biometric detection system is one of those system which is more secure than other security system ie Password, card etc. This paper introduces advantage of iris and fingerprint recognition system because this

Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme
free download

Abstract Authentication and key agreement protocol becomes an important security issue for multi-server architecture. Combining biometrics with password enhances the level of security. Recently, Baruah et al. analyzed that Mishra et al.'s protocol has several

Liveness Detection for Biometric System Using IQA
free download

Abstract: Now a day's different biometric systems like fingerprint, face, ear, palm, gait, voice, signature, iris, etc. are used worldwide to identify a person. There are various advantages of biometric system such as accurate identification, accountability, easy to use, time saving,

BIOMETRIC RECOGNITION USING DORSAL AND PALM VEIN IMAGES
free download

ABSTRACT Multi-modal biometric recognition has received wide applicability in the practical world for various authentication purposes. Here, the choice of right modality is an important consideration because the modality should posses the better security even the impostor is

Using Biometric Sensors to Increase Developers' Productivity
free download

Abstract The development of software is a cost-and people-intensive process. For years, the software development industry has been coping with a shortage of software developers. Besides just training even more software developers, an alternative and particularly

Anti-Spoofing Method: A Survey on Biometric Face Recognition
free download

ABSTRACT In recent decades, the evolution of biometric technology from the first revolutionary works in faces and voice recognition to the current state of development such as fingerprint, face, or iris, signature or hand. This path of technological growth has

Algorithm for Enhancement of Biometric Images Used in Feature Extraction and Authentication
free download

Abstract Biometrics refers to technologies for measuring and analysing a individual's physiological or behavioural characteristics which are unique to persons hence can be used to identify a person. For the successful identification the input image should have the fine

REVIEW OF DENTAL BIOMETRIC IN HUMAN FORENSIC IDENTIFICATION
free download

Abstract: To other medical specialties, Dentistry can contribute for the identification of human remains after any disasters or crimes in assistance. By comparing post mortem and ante mortem dental radiographs, the algorithm can be developed. In addition to radiographs,

Multimodal Biometric endorsement for secure Internet banking using Skin Spectroscopy, Knuckles texture and Finger nail recognition
free download

Abstract-Biometric is verification by analyzing the unique biological qualities which a person can differentiate from another. Data that collected by some if these technologies distinguish a single individual from the entire global population. The most secure banking now is the

An Altered Fingerprint and Multi-Biometric System to Enhanced Security Using Delaunay Triangulation
free download

Abstract:Biometrics are used in authentication process because biometrics are distinctive recognition of human being. Multi-biometric systems need storage of multiple biometric templates (eg, fingerprint, iris, Palm and face) for each user, which results in increased risk

A Further Note on the Security of CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
free download

Recently,[2] presented a security attack on the privacy-preserving outsourcing scheme for biometric identification proposed in [1]. In [2], the author claims that the scheme CloudBI-II proposed in [1] can be broken under the collusion case. That is, when the cloud server

AN EMERGING DEVELOPMENT OF BIOMETRIC SYSTEM: A NOVEL APPROACH OF SECURITY
free download

Abstract:Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a person by determining the authentication by using

Secure Network Authentication Based on Biometric National Identification Number
free download

Abstract-This paper present a proposed authentication system based on fingerprint as biometric type and some of static credential personal information such as name and birth date. The system generate a Unique National Identification Number (NIDN) by combining

OPTIMIZED BIOMETRIC SYSTEM BASED ON COMBINATION OF FACE IMAGES AND LOG TRANSFORMATION
free download

ABSTRACT The biometrics are used to identify a person effectively. In this paper, we propose optimised Face recognition system based on log transformation and combination of face image features vectors. The face images are preprocessed using Gaussian filter to

Biometric Authentication Based Voting System
free download

ABSTRACT: The main reason of voting is to allow voters to give their right to express their choices regarding specific problems, pieces of legislation, citizen initiatives, constitutional amendments, to choose their government and political representatives. It has always been

LPiTrack Signal Processing Algorithm and Application to Biometric Identification
free download

Mostly based on primitive features (Holland and Komogortsev, 2013, Kasprowski and Ober, 2004) like total looking time, total number of fixations (ie the total number of fixations that met the= 100 msec criterion), average velocity, average spatial location, average horizontal

MODELING THE EFFECTS OF STRESS ON VOICE BIOMETRIC 'FALSE NEGATION'
free download

Abstract The importance of biometric systems generally to human security cannot be overemphasized. More interestingly however, voice biometric is cardinal due to its feature of being both physiological and behavioural in nature. False Negative otherwise called

SECURE REMOTE AUTHENTICATION USING BIOMETRIC DATA WITH STEGANOGRAPHY FOR WIRELESSNETWORK.
free download

ABSTRACT In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Many authentication schemes using passwords and smart cards have been proposed. However, passwords might be forgotten and smart cards

A BIO INSPIRED ALGORITHM FOR BIOMETRIC FAKE DETECTION USING FACE, FINGER IRIS
free download

ABSTRACT The biometric person recognition technique based on the pattern of the human iris, face and fingerprint well suited to be applied to access control and provide strong security. A typical biometric system consists of sensing, feature extraction, and matching

Biometric recognition using Palm vein and Finger vein Images
free download

Abstract Recently biometrics is the best alternative for the token based and knowledge based security systems. Out of the existing biometric modalities, vascular biometric modalities are preferred for authenticating the person, because of its uniqueness among

Biometric Based Secure Authentication System for Fingerprint by Using Delaunay Triangulation
free download

ABSTRACT: The fingerprint recognition is one of the most popular technology in biometric. Now day there are many application are developed by fingerprint in industries and government. In this paper is based on the fingerprint recognition system for using the

Design of Biometric Authentication System using Three Basic Human Traits
free download

Abstract: Todays the single biometrics feature is not sufficient to provide secure authentication. Most of the multi-modal techniques are lacking in security aspect. Biometric system utilize in various system for the identification or authentication approval. Biometric

Poster: A proposal for architecture of biometric authentication products
free download

Abstract:This paper proposes an enhanced architecture of products for biometric authentication which is suitable for policy-based authorization. Keywords application



FREE IEEE PAPERS