Correlation pattern recognition for biometrics

نویسندگان

  • Vijayakumar Bhagavatula
  • Marios Savvides
چکیده

Think of withdrawing cash from an automatic teller machine (ATM). What if a thief steals your ATM card and comes to know your personal identification number (PIN)? For many secure buildings, access is restricted to bearers of an appropriate magnetic swipe card or a radio frequency identification (RFID) tag. But what if that RFID tag or swipe card falls into the wrong hands? Similarly, when we login to computers, we rely on passwords that can be forgotten or stolen. In our increasingly security-conscious world, it is important to improve our ability to control access to physical (e.g., buildings) and virtual spaces based on who the person is, rather than on what she knows (e.g., passwords) or what he possesses (e.g., RFID tags). Biometric recognition offers this ability. Biometrics refers to the physiological (e.g., face, fingerprint, iris image, retinal patterns, DNA, etc.) or behavioral (e.g., gait, dynamic signature, keyboard dynamics, etc.) characteristics that distinguish one person from another. Thus, a given person has a unique biometric pattern since biometric signatures cannot be lost, forgotten, or easily stolen. It is of course possible to compromise biometric verification systems (e.g., using fake fingerprints made out of gelatinous materials) and to counter these efforts, liveness detection methods are being actively developed. Biometrics can be used to authenticate a person’s claimed identity (called verification or the 1:1 matching problem) or to ascertain whether that person is in a database or not (called identification or the 1:N matching problem). Verification usually involves cooperative subjects in applications such as access control whereas identification applications (e.g., recognizing subjects in surveillance videos) can involve subjects that may or may not be cooperative. An example application of biometric identification is found in some United Arab Emirates (UAE) facilities where access is controlled usFigure 1. Schematic of the use of correlation pattern recognition for biometrics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correlation Filter based Fingerprint Verification System

Biometrics is an important security tool which can be used for human identification and authentication to offer a higher level of security than conventional identification methods. Among all available biometrics, Fingerprints are a good choice as they are unique to a person. Fingerprint recognition is a complex pattern recognition problem. This paper proposes fingerprint verification based on c...

متن کامل

Fusing Face and Periocular biometrics using Canonical correlation analysis

This paper presents a novel face and periocular biometric fusion at feature level using canonical correlation analysis. Face recognition itself has limitations such as illumination, pose, expression, occlusion etc. Also, periocular biometrics has spectacles, head angle, hair and expression as its limitations. Unimodal biometrics cannot surmount all these limitations. The recognition accuracy ca...

متن کامل

Local Derivative Pattern with Smart Thresholding: Local Composition Derivative Pattern for Palmprint Matching

Palmprint recognition is a new biometrics system based on physiological characteristics of the palmprint, which includes rich, stable, and unique features such as lines, points, and texture. Texture is one of the most important features extracted from low resolution images. In this paper, a new local descriptor, Local Composition Derivative Pattern (LCDP) is proposed to extract smartly stronger...

متن کامل

Recognizing Different Types of Stochastic Processes

We propose a new cross-correlation method that can recognize independent realizations of the same type of stochastic processes and can be used as a new kind of pattern recognition tool in biometrics, sensing, forensic, security and image processing applications. The method, which we call bispectrum correlation coefficient method, makes use of the cross-correlation of the bispectra. Three kinds ...

متن کامل

Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA

Face recognition systems are very useful in many applications such as surveillance, biometrics and security. Principal Component Analysis (PCA) has also been used in some important applications, especially in pattern detection such as face detection and recognition. In real-time applications, response time must be as fast as possible. For this purpose, we propose a new PCA signcryption implemen...

متن کامل

Feature Correlation Filter for Face Recognition

The correlation filters for pattern recognition, have been extensively studied in the areas of automatic target recognition(ATR) and biometrics. Whereas the conventional correlation filters perform directly on image pixels, in this paper, we propose a novel method, called “feature correlation filter (FCF)”, by extending the concept of correlation filter to feature spaces. The FCF preserves the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006