2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

筛选
英文 中文
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier 提出了基于线性判别分析和最近邻分类器的手掌静脉识别方案
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013096
Selma Elnasir, S. Shamsuddin
{"title":"Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier","authors":"Selma Elnasir, S. Shamsuddin","doi":"10.1109/ISBAST.2014.7013096","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013096","url":null,"abstract":"Palm vein recognition is a new promising field in biometrics. The palm vein pattern provides highly discriminating features that are difficult to forge because it resides underneath the palmar skin. However, the issues of extracting the palm vein features and the high dimension of the feature space are still open. Therefore, in this paper, we propose an improved scheme of palm vein recognition method based on the Linear Discrimination Analysis (LDA) to extract the discriminative features with low dimension. LDA is later followed by the matching procedure using cosine distance nearest neighbor classifier. The performance of the proposed scheme produced 99.50% for identification rate, 100% for verification rate and 0.0% of Equal Error Rate (EER). The experiments prove that the proposed method has a better performance compared with Principal Component Analysis and Gabor filter methods.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Cross-band ear recognition in low or variant illumination environments 低照度或变照度环境下的跨波段耳识别
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013100
Syed Mohd Zahid Syed Zainal Ariffin, N. Jamil
{"title":"Cross-band ear recognition in low or variant illumination environments","authors":"Syed Mohd Zahid Syed Zainal Ariffin, N. Jamil","doi":"10.1109/ISBAST.2014.7013100","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013100","url":null,"abstract":"Ear biometric is slowly gaining its position in biometric studies. Just like fingerprint and iris, the ears are unique and have other advantages over current regular biometric methods. Besides those advantages, there are some issues arising for ear recognition. One of those is regarding the illumination. Low illumination may result in low quality image acquired resulting in low recognition rate. Based on this situation, we proposed a cross-band ear recognition to overcome the variant illumination problem. This method starts by measuring the environments illumination which will determine which type of images (i.e.: thermal or visible) acquired to be processed. Once determined, the images will undergo pre-processing before the ear region is being localized using Viola-Jones approach with Haar-like feature. The ear features will be extracted using local binary patterns operator. Euclidean distance of the feature of test image and database images will be calculated. The lowest Euclidean value will determine the individual identity (intra- and inter-variance).","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fractional low-order independent component analysis for face recognition robust to partial occlusion 分数阶独立分量分析对部分遮挡的鲁棒性人脸识别
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013084
X. Chen, Wen Li, Zengli Liu, Zaihong Zhou
{"title":"Fractional low-order independent component analysis for face recognition robust to partial occlusion","authors":"X. Chen, Wen Li, Zengli Liu, Zaihong Zhou","doi":"10.1109/ISBAST.2014.7013084","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013084","url":null,"abstract":"As biometric vector may not follow the Gaussian distribution under complex light, pose and accessories, systems often yield unacceptable performance when subjected to impulsive, non-Gaussian noise. This paper adopts signal symmetric alpha stable distribution theory to construct fractional low-order independent component analysis algorithm (FLOD-ICA) and applied FLOD-ICA to solve the partial occlusion face recognition problem. Experiments verified that our proposed scheme is effective for face recognition under partial occlusion.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving biometrics using matrix random low-rank approximation approach 基于矩阵随机低秩逼近方法的隐私保护生物特征识别
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013085
X. Chen, Luping Zheng, Zengli Liu, Jiashu Zhang
{"title":"Privacy-preserving biometrics using matrix random low-rank approximation approach","authors":"X. Chen, Luping Zheng, Zengli Liu, Jiashu Zhang","doi":"10.1109/ISBAST.2014.7013085","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013085","url":null,"abstract":"In this paper, we propose a matrix random low-rank approximation (MRLRA) approach to generate cancelable biometric templates for privacy-preserving. MRLRA constructs a random low-rank matrix to approximate the hybridization of biometric feature and a random matrix. Theoretically analysis shows the distance between one cancelable low-rank biometric template by MRLRA and its original template is very small, which results to the verification and authentication performance by MRLRA is near that of original templates. Cancelable biometric templates by MRLRA conquer the weakness of random projection based cancelable biometric templates, in which the performance will deteriorate much under the same tokens. Experiments have verified that (i) cancelable biometric templates by MRLRA are sensitive to the user-specific tokens which are used for constructing the random matrix in MRLRA; (ii) MRLRA can reduce the noise of biometric templates; (iii)Even under the condition of same tokens, the performance of cancelable biometric templates by MRLRA doesn't deteriorate much.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of effective hough transform-based fingerprint alignment approaches 基于霍夫变换的有效指纹比对方法的比较
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013099
Cynthia S. Mlambo, F. Nelwamondo, M. E. Mathekga
{"title":"Comparison of effective hough transform-based fingerprint alignment approaches","authors":"Cynthia S. Mlambo, F. Nelwamondo, M. E. Mathekga","doi":"10.1109/ISBAST.2014.7013099","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013099","url":null,"abstract":"In this paper, two effective and mostly used Hough Transform (HT) based fingerprint alignment approaches are compared, namely; Local Match Based Alignment (LMBA) and Discretized Rotation Based Alignment (DRBA). The comparison was performed by considering different conditions of minutiae points, which are rotation, translation and the number of minutiae points. In addition, this research reports the advantages of understanding the quality and relationships between the wide varieties of existing HT based fingerprint alignment methods. Minutiae points extracted from fingerprints of FVC2000 database were used on the experiments to compare these approaches. The results revealed that LMBA approach performs better than the DRBA approach on minutiae points set with larger rotation and small number of points. The DRBA approach was found to perform better with minutiae points with large amount of translation, and the computational time was less than that of LMBA approach. However, the memory usage required in DRBA is greater than memory required in LMBA.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"67 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration 有点同态密码的矩阵乘法使用GPU加速
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013115
Yuan Tian, Mznah Al-Rodhaan, Biao Song, A. Al-Dhelaan, Tinghuai Ma
{"title":"Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration","authors":"Yuan Tian, Mznah Al-Rodhaan, Biao Song, A. Al-Dhelaan, Tinghuai Ma","doi":"10.1109/ISBAST.2014.7013115","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013115","url":null,"abstract":"Homomorphic encryption has become a popular research topic since the cloud computing paradigm emerged. This paper discusses the design of a GPU-assisted homomorphic cryptograph for matrix operation. Our proposed scheme is based on an n*n matrix multiplication which are computationally homomorphic. We use more efficient GPU programming scheme with the extension of DGHV homomorphism, which prove the result of verification does not leak any information about the inputs or the output during the encryption and decryption. The performance results are obtained from the executions on a machine equipped with a GeForce GTX 765M GPU. We use three basic parallel algorithms to form efficient solutions which accelerate the speed of encryption and evaluation. Although fully homomorphic encryption is still not practical for real world applications in current stage, this work shows the possibility to improve the performance of homomorphic encryption and achieve this target one step closer.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey of anti-phishing tools with detection capabilities 具有检测功能的反网络钓鱼工具的调查
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013124
Hiba Zuhair Zeydan, A. Selamat, M. Salleh
{"title":"Survey of anti-phishing tools with detection capabilities","authors":"Hiba Zuhair Zeydan, A. Selamat, M. Salleh","doi":"10.1109/ISBAST.2014.7013124","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013124","url":null,"abstract":"Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信