NABS: Novel Approaches for Biometric Systems
ثبت نشده
چکیده
Research on biometrics has noticeably increased. However, no single bodily or behavioral feature is able to satisfy acceptability, speed, and reliability constraints of authentication in real applications. The present trend is therefore toward multimodal systems. In this paper, we deal with some core issues related to the design of these systems and propose a novel modular framework, namely, novel approaches for biometric systems (NABS) that we have implemented to address them. NABS proposal encompasses two possible architectures based on the comparative speeds of the involved biometries. It also provides a novel solution for the data normalization problem, with the new quasi-linear sigmoid (QLS) normalization function. This function can overcome a number of common limitations, according to the presented experimental comparisons. A further contribution is the system response reliability (SRR) index to measure response confidence. Its theoretical definition allows taking into account the gallery composition at hand in assigning a system reliability measure on a single-response basis. The unified experimental setting aims at evaluating such aspects both separately and together, using face, ear, and fingerprint as test biometries. The results provide a positive feedback for the overall theoretical framework developed herein. Since NABS is designed to allow both a flexible choice of the adopted architecture, and a variable compositions and/or substitution of its optional modules, i.e., QLS and SRR, it can support different operational settings.
منابع مشابه
Security of Biometric Authentication Systems – Extended
This technical report outlines our views of actual security of biometric authentica-tion and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. The report starts with an introductory section that is followed by a section abou...
متن کاملBlockage of CD59 Function Restores Activities of Neutralizing and Nonneutralizing Antibodies in Triggering Antibody-Dependent Complement-Mediated Lysis of HIV-1 Virions and Provirus-Activated Latently Infected Cells.
UNLABELLED Both HIV-1 virions and infected cells use their surface regulators of complement activation (RCA) to resist antibody-dependent complement-mediated lysis (ADCML). Blockage of the biological function of RCA members, particularly CD59 (a key RCA member that controls formation of the membrane attack complex at the terminal stage of the complement activation cascades via all three activat...
متن کاملIllumination Invariant Novel Approaches for Face Recognition
Most of current identification and verification systems like access control and surveillance require reliable person identification technique. The primary goal of such systems is that resources are accessed only by legitimate users. Inefficient person identification systems may become vulnerable thereby allowing impostors. Under these circumstances biometric systems such as automated face recog...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012