Sample records for comparative biometric study

  1. Investigating the biometric and physicochemical characteristics of freshly harvested Pacific white shrimp (Litopenaeus vannamei): a comparative approach.

    PubMed

    Okpala, Charles Odilichukwu R; Bono, Gioacchino

    2016-03-15

    The practicality of biometrics of seafood cannot be overemphasized, particularly for competent authorities of the shrimp industry. However, there is a paucity of relevant literature on the relationship between biometric and physicochemical indices of freshly harvested shrimp. This work therefore investigated the relationship between biometric (standard length (SL), total weight (TW) and condition factor (CF)) and physicochemical (moisture content, pH, titratable acidity, water activity, water retention index, colour values and fracturability) characteristics of freshly harvested Pacific white shrimp (Litopenaeus vannamei) obtained from three different farms. The relationships between these parameters were determined using correlation and regression analyses. No significant correlation (P > 0.05) was found between the biometric and physicochemical indices of the sampled L. vannamei specimens. Possibly the lack of post-mortem and physical change(s) at day of harvest together with the absence of temporal variable may have collectively limited the degree of any significant correlation between biometric and physicochemical data points measured in this study. Although the TWs of freshly harvested L. vannamei shrimp resembled (P > 0.05), SL and CF differed significantly (P < 0.05) with minimal explained variance. Moreover, some biometric and physicochemical variables were independently correlated (P < 0.05). Data indicated that no significant correlation existed between biometric and physicochemical characteristics of freshly harvested L. vannamei shrimp. Across the farms studied, however, the biometric data were comparable. To best knowledge, this is the first study to investigate the biometric and physicochemical properties of freshly harvested shrimp using a comparative approach, which is also applicable to other economically important aquaculture species. Overall, this work provides useful information for competent authorities/stakeholders of the fishery industry and serves as a baseline for preservative treatments. © 2015 Society of Chemical Industry.

  2. PREDICTIVE ACCURACY OF TRANSCEREBELLAR DIAMETER IN COMPARISON WITH OTHER FOETAL BIOMETRIC PARAMETERS FOR GESTATIONAL AGE ESTIMATION AMONG PREGNANT NIGERIAN WOMEN.

    PubMed

    Adeyekun, A A; Orji, M O

    2014-04-01

    To compare the predictive accuracy of foetal trans-cerebellar diameter (TCD) with those of other biometric parameters in the estimation of gestational age (GA). A cross-sectional study. The University of Benin Teaching Hospital, Nigeria. Four hundred and fifty healthy singleton pregnant women, between 14-42 weeks gestation. Trans-cerebellar diameter (TCD), biparietal diameter (BPD), femur length (FL), abdominal circumference (AC) values across the gestational age range studied. Correlation and predictive values of TCD compared to those of other biometric parameters. The range of values for TCD was 11.9 - 59.7mm (mean = 34.2 ± 14.1mm). TCD correlated more significantly with menstrual age compared with other biometric parameters (r = 0.984, p = 0.000). TCD had a higher predictive accuracy of 96.9% ± 12 days), BPD (93.8% ± 14.1 days). AC (92.7% ± 15.3 days). TCD has a stronger predictive accuracy for gestational age compared to other routinely used foetal biometric parameters among Nigerian Africans.

  3. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  4. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  5. Deep Gaze Velocity Analysis During Mammographic Reading for Biometric Identification of Radiologists

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoon, Hong-Jun; Alamudun, Folami T.; Hudson, Kathy

    Several studies have confirmed that the gaze velocity of the human eye can be utilized as a behavioral biometric or personalized biomarker. In this study, we leverage the local feature representation capacity of convolutional neural networks (CNNs) for eye gaze velocity analysis as the basis for biometric identification of radiologists performing breast cancer screening. Using gaze data collected from 10 radiologists reading 100 mammograms of various diagnoses, we compared the performance of a CNN-based classification algorithm with two deep learning classifiers, deep neural network and deep belief network, and a previously presented hidden Markov model classifier. The study showed thatmore » the CNN classifier is superior compared to alternative classification methods based on macro F1-scores derived from 10-fold cross-validation experiments. Our results further support the efficacy of eye gaze velocity as a biometric identifier of medical imaging experts.« less

  6. Deep Gaze Velocity Analysis During Mammographic Reading for Biometric Identification of Radiologists

    DOE PAGES

    Yoon, Hong-Jun; Alamudun, Folami T.; Hudson, Kathy; ...

    2018-01-24

    Several studies have confirmed that the gaze velocity of the human eye can be utilized as a behavioral biometric or personalized biomarker. In this study, we leverage the local feature representation capacity of convolutional neural networks (CNNs) for eye gaze velocity analysis as the basis for biometric identification of radiologists performing breast cancer screening. Using gaze data collected from 10 radiologists reading 100 mammograms of various diagnoses, we compared the performance of a CNN-based classification algorithm with two deep learning classifiers, deep neural network and deep belief network, and a previously presented hidden Markov model classifier. The study showed thatmore » the CNN classifier is superior compared to alternative classification methods based on macro F1-scores derived from 10-fold cross-validation experiments. Our results further support the efficacy of eye gaze velocity as a biometric identifier of medical imaging experts.« less

  7. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    PubMed Central

    Yang, Bian; Busch, Christoph; de Groot, Koen; Xu, Haiyun; Veldhuis, Raymond N. J.

    2012-01-01

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations) on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples. PMID:22778583

  8. Soft Biometrics; Human Identification Using Comparative Descriptions.

    PubMed

    Reid, Daniel A; Nixon, Mark S; Stevenage, Sarah V

    2014-06-01

    Soft biometrics are a new form of biometric identification which use physical or behavioral traits that can be naturally described by humans. Unlike other biometric approaches, this allows identification based solely on verbal descriptions, bridging the semantic gap between biometrics and human description. To permit soft biometric identification the description must be accurate, yet conventional human descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe differences between subjects. This innovative approach has been shown to address many problems associated with absolute categorical labels-most critically, the descriptions contain more objective information and have increased discriminatory capabilities. Relative measurements of the subjects' traits can be inferred from comparative human descriptions using the Elo rating system. The resulting soft biometric signatures have been demonstrated to be robust and allow accurate recognition of subjects. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using a support vector machine to determine relative measurements from gait biometric signatures-allowing retrieval of subjects from video footage by using human comparisons, bridging the semantic gap.

  9. Correlation between fetal mild ventriculomegaly and biometric parameters.

    PubMed

    Fishel-Bartal, Michal; Shai, Daniel; Shina, Avi; Achiron, Reuven; Katorza, Eldad

    2017-09-19

    The aim of this study was to assess the correlation between fetal lateral ventricle width and biometric measurements. A prospective study on 335 fetuses, 101 fetuses with isolated mild ventriculomegaly and a control group of 234 fetuses with a normal US examination. All fetuses underwent a detailed brain ultrasound scan and a full biometric evaluation. To further compare biometric parameters, we matched, according to gestational week and gender, 91 fetuses from the study group to 91 fetuses from the control group. The mean gestational week during the exam was significantly different between the groups (29.6 weeks in the study group versus 28.3 in the control group, p = .001). The mean maternal age, obstetrical history, mode of conception, or fetal gender did not differ between the groups. After matching according to gestational age and fetal gender, the mean gestational week between the matched groups did not differ and was 29 + 5 weeks in both groups. The study group had significantly larger head circumference (p = .009), biparietal diameter (p < .001), femur length (p = .023), and estimated fetal weight (p = .024) compared with the control group. Isolated mild ventriculomegaly could be related to other larger fetal biometric measurements and does not necessarily mean a pathological condition.

  10. Emerging Biometric Modalities: Challenges and Opportunities

    NASA Astrophysics Data System (ADS)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  11. Corneal topography measurements for biometric applications

    NASA Astrophysics Data System (ADS)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  12. A proposed simple method for measurement in the anterior chamber angle: biometric gonioscopy.

    PubMed

    Congdon, N G; Spaeth, G L; Augsburger, J; Klancnik, J; Patel, K; Hunter, D G

    1999-11-01

    To design a system of gonioscopy that will allow greater interobserver reliability and more clearly defined screening cutoffs for angle closure than current systems while being simple to teach and technologically appropriate for use in rural Asia, where the prevalence of angle-closure glaucoma is highest. Clinic-based validation and interobserver reliability trial. Study 1: 21 patients 18 years of age and older recruited from a university-based specialty glaucoma clinic; study 2: 32 patients 18 years of age and older recruited from the same clinic. In study 1, all participants underwent conventional gonioscopy by an experienced observer (GLS) using the Spaeth system and in the same eye also underwent Scheimpflug photography, ultrasonographic measurement of anterior chamber depth and axial length, automatic refraction, and biometric gonioscopy with measurement of the distance from iris insertion to Schwalbe's line using a reticule based in the slit-lamp ocular. In study 2, all participants underwent both conventional gonioscopy and biometric gonioscopy by an experienced gonioscopist (NGC) and a medical student with no previous training in gonioscopy (JK). Study 1: The association between biometric gonioscopy and conventional gonioscopy, Scheimpflug photography, and other factors known to correlate with the configuration of the angle. Study 2: Interobserver agreement using biometric gonioscopy compared to that obtained with conventional gonioscopy. In study 1, there was an independent, monotonic, statistically significant relationship between biometric gonioscopy and both Spaeth angle (P = 0.001, t test) and Spaeth insertion (P = 0.008, t test) grades. Biometric gonioscopy correctly identified six of six patients with occludable angles according to Spaeth criteria. Biometric gonioscopic grade was also significantly associated with the anterior chamber angle as measured by Scheimpflug photography (P = 0.005, t test). In study 2, the intraclass correlation coefficient between graders for biometric gonioscopy (0.97) was higher than for Spaeth angle grade (0.72) or Spaeth insertion grade (0.84). Biometric gonioscopy correlates well with other measures of the anterior chamber angle, shows a higher degree of interobserver reliability than conventional gonioscopy, and can readily be learned by an inexperienced observer.

  13. Reader reaction on the generalized Kruskal-Wallis test for genetic association studies incorporating group uncertainty.

    PubMed

    Wu, Baolin; Guan, Weihua

    2015-06-01

    Acar and Sun (2013, Biometrics 69, 427-435) presented a generalized Kruskal-Wallis (GKW) test for genetic association studies that incorporated the genotype uncertainty and showed its robust and competitive performance compared to existing methods. We present another interesting way to derive the GKW test via a rank linear model. © 2014, The International Biometric Society.

  14. A lightweight approach for biometric template protection

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  15. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification.

    PubMed

    Wang, Yi; Wan, Jianwu; Guo, Jun; Cheung, Yiu-Ming; Yuen, Pong C; Yi Wang; Jianwu Wan; Jun Guo; Yiu-Ming Cheung; Yuen, Pong C; Cheung, Yiu-Ming; Guo, Jun; Yuen, Pong C; Wan, Jianwu; Wang, Yi

    2018-07-01

    Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy protection are in general based on pairwise matching of secured biometric templates and have inherent limitations in search efficiency and scalability. In this paper, we propose an inference-based framework for privacy-preserving similarity search in Hamming space. Our approach builds on an obfuscated distance measure that can conceal Hamming distance in a dynamic interval. Such a mechanism enables us to systematically design statistically reliable methods for retrieving most likely candidates without knowing the exact distance values. We further propose to apply Montgomery multiplication for generating search indexes that can withstand adversarial similarity analysis, and show that information leakage in randomized Montgomery domains can be made negligibly small. Our experiments on public biometric datasets demonstrate that the inference-based approach can achieve a search accuracy close to the best performance possible with secure computation methods, but the associated cost is reduced by orders of magnitude compared to cryptographic primitives.

  16. Distinct iris gene expression profiles of primary angle closure glaucoma and primary open angle glaucoma and their interaction with ocular biometric parameters.

    PubMed

    Seet, Li-Fong; Narayanaswamy, Arun; Finger, Sharon N; Htoon, Hla M; Nongpiur, Monisha E; Toh, Li Zhen; Ho, Henrietta; Perera, Shamira A; Wong, Tina T

    2016-11-01

    This study aimed to evaluate differences in iris gene expression profiles between primary angle closure glaucoma (PACG) and primary open angle glaucoma (POAG) and their interaction with biometric characteristics. Prospective study. Thirty-five subjects with PACG and thirty-three subjects with POAG who required trabeculectomy were enrolled at the Singapore National Eye Centre, Singapore. Iris specimens, obtained by iridectomy, were analysed by real-time polymerase chain reaction for expression of type I collagen, vascular endothelial growth factor (VEGF)-A, -B and -C, as well as VEGF receptors (VEGFRs) 1 and 2. Anterior segment optical coherence tomography (ASOCT) imaging for biometric parameters, including anterior chamber depth (ACD), anterior chamber volume (ACV) and lens vault (LV), was also performed pre-operatively. Relative mRNA levels between PACG and POAG irises, biometric measurements, discriminant analyses using genes and biometric parameters. COL1A1, VEGFB, VEGFC and VEGFR2 mRNA expression was higher in PACG compared to POAG irises. LV, ACD and ACV were significantly different between the two subgroups. Discriminant analyses based on gene expression, biometric parameters or a combination of both gene expression and biometrics (LV and ACV), correctly classified 94.1%, 85.3% and 94.1% of the original PACG and POAG cases, respectively. The discriminant function combining genes and biometrics demonstrated the highest accuracy in cross-validated classification of the two glaucoma subtypes. Distinct iris gene expression supports the pathophysiological differences that exist between PACG and POAG. Biometric parameters can combine with iris gene expression to more accurately define PACG from POAG. © 2016 The Authors. Clinical & Experimental Ophthalmology published by John Wiley & Sons Australia, Ltd on behalf of Royal Australian and New Zealand College of Ophthalmologists.

  17. Mercury concentration in maternal serum, cord blood, and placenta in patients with amalgam dental fillings: effects on fetal biometric measurements.

    PubMed

    Bedir Findik, Rahime; Celik, Huseyin Tugrul; Ersoy, Ali Ozgur; Tasci, Yasemin; Moraloglu, Ozlem; Karakaya, Jale

    2016-11-01

    We aimed to determine the extent to which mercury is transmitted from the mother to fetus via the umbilical cord in patients with amalgam dental fillings, and its effect on fetal biometric measurements. Twenty-eight patients as the study group with amalgam fillings, and 32 of them as the control group were included in this prospective case-control study. The mercury levels were measured in the maternal and cord venous sera, and the placental samples. Two groups were compared in terms of these and the fetal/neonatal biometric measurements. In the study group, the maternal and umbilical cord mercury levels were found to be significantly higher than those from the control group (p = 0.006 and p = 0.010, respectively). These high levels did not affect the fetal biometric measurements. The presence of high serum mercury levels in pregnant women with amalgam fillings is important, and warrants further long-term studies in order to investigate the fetal neurological effects as well.

  18. Generating cancelable fingerprint templates.

    PubMed

    Ratha, Nalini K; Chikkerur, Sharat; Connell, Jonathan H; Bolle, Ruud M

    2007-04-01

    Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key." The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.

  19. A robust probabilistic collaborative representation based classification for multimodal biometrics

    NASA Astrophysics Data System (ADS)

    Zhang, Jing; Liu, Huanxi; Ding, Derui; Xiao, Jianli

    2018-04-01

    Most of the traditional biometric recognition systems perform recognition with a single biometric indicator. These systems have suffered noisy data, interclass variations, unacceptable error rates, forged identity, and so on. Due to these inherent problems, it is not valid that many researchers attempt to enhance the performance of unimodal biometric systems with single features. Thus, multimodal biometrics is investigated to reduce some of these defects. This paper proposes a new multimodal biometric recognition approach by fused faces and fingerprints. For more recognizable features, the proposed method extracts block local binary pattern features for all modalities, and then combines them into a single framework. For better classification, it employs the robust probabilistic collaborative representation based classifier to recognize individuals. Experimental results indicate that the proposed method has improved the recognition accuracy compared to the unimodal biometrics.

  20. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  1. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  2. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  3. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  4. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the FMCSA rules at 49 CFR 383.51. If records indicate that an applicant has committed an offense that... assessment includes biometric identification and a biometric credential. (2) To apply for a comparability... process and provide biometric information to obtain a TWIC, if the applicant seeks unescorted access to a...

  5. Biometric recognition via texture features of eye movement trajectories in a visual searching task.

    PubMed

    Li, Chunyong; Xue, Jiguo; Quan, Cheng; Yue, Jingwei; Zhang, Chenggang

    2018-01-01

    Biometric recognition technology based on eye-movement dynamics has been in development for more than ten years. Different visual tasks, feature extraction and feature recognition methods are proposed to improve the performance of eye movement biometric system. However, the correct identification and verification rates, especially in long-term experiments, as well as the effects of visual tasks and eye trackers' temporal and spatial resolution are still the foremost considerations in eye movement biometrics. With a focus on these issues, we proposed a new visual searching task for eye movement data collection and a new class of eye movement features for biometric recognition. In order to demonstrate the improvement of this visual searching task being used in eye movement biometrics, three other eye movement feature extraction methods were also tested on our eye movement datasets. Compared with the original results, all three methods yielded better results as expected. In addition, the biometric performance of these four feature extraction methods was also compared using the equal error rate (EER) and Rank-1 identification rate (Rank-1 IR), and the texture features introduced in this paper were ultimately shown to offer some advantages with regard to long-term stability and robustness over time and spatial precision. Finally, the results of different combinations of these methods with a score-level fusion method indicated that multi-biometric methods perform better in most cases.

  6. Biometric recognition via texture features of eye movement trajectories in a visual searching task

    PubMed Central

    Li, Chunyong; Xue, Jiguo; Quan, Cheng; Yue, Jingwei

    2018-01-01

    Biometric recognition technology based on eye-movement dynamics has been in development for more than ten years. Different visual tasks, feature extraction and feature recognition methods are proposed to improve the performance of eye movement biometric system. However, the correct identification and verification rates, especially in long-term experiments, as well as the effects of visual tasks and eye trackers’ temporal and spatial resolution are still the foremost considerations in eye movement biometrics. With a focus on these issues, we proposed a new visual searching task for eye movement data collection and a new class of eye movement features for biometric recognition. In order to demonstrate the improvement of this visual searching task being used in eye movement biometrics, three other eye movement feature extraction methods were also tested on our eye movement datasets. Compared with the original results, all three methods yielded better results as expected. In addition, the biometric performance of these four feature extraction methods was also compared using the equal error rate (EER) and Rank-1 identification rate (Rank-1 IR), and the texture features introduced in this paper were ultimately shown to offer some advantages with regard to long-term stability and robustness over time and spatial precision. Finally, the results of different combinations of these methods with a score-level fusion method indicated that multi-biometric methods perform better in most cases. PMID:29617383

  7. Optical and biometric relationships of the isolated pig crystalline lens.

    PubMed

    Vilupuru, A S; Glasser, A

    2001-07-01

    To investigate the interrelationships between optical and biometric properties of the porcine crystalline lens, to compare these findings with similar relationships found for the human lens and to attempt to fit this data to a geometric model of the optical and biometric properties of the pig lens. Weight, focal length, spherical aberration, surface curvatures, thickness and diameters of 20 isolated pig lenses were measured and equivalent refractive index was calculated. These parameters were compared and used to geometrically model the pig lens. Linear relationships were identified between many of the lens biometric and optical properties. The existence of these relationships allowed a simple geometrical model of the pig lens to be calculated which offers predictions of the optical properties. The linear relationships found and the agreement observed between measured and modeled results suggest that the pig lens confirms to a predictable, preset developmental pattern and that the optical and biometric properties are predictably interrelated.

  8. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs.

    PubMed

    Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L

    2006-12-01

    Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.

  9. Reference charts for fetal biometric parameters in twin pregnancies according to chorionicity.

    PubMed

    Araujo Júnior, Edward; Ruano, Rodrigo; Javadian, Pouya; Martins, Wellington P; Elito, Julio; Pires, Claudio Rodrigues; Zanforlin Filho, Sebastião Marques

    2014-04-01

    The objective of this article is to determine reference values for fetal biometric parameters in twin pregnancies and to compare these values between monochorionic and dichorionic pregnancies. A retrospective cross-sectional study was conducted among 157 monochorionic and 176 dichorionic twin pregnancies between 14 and 38 weeks of gestation. Biometric measurements included the biparietal diameter (BPD), abdominal circumference (AC), femurs length (FL) and estimated fetal weight (EFW). To evaluate the correlation between biometric parameters and gestational age, polynomial regression models were created, with adjustments using the coefficient of determination (R(2) ). Comparison between monochorionic and dichorionic pregnancies was performed using analysis of covariance. The mean BPD, AC, FL and EFW for the dichorionic pregnancies were 56.16 mm, 191.1 mm, 41.08 mm and 816.1 g, respectively. The mean BPD, AC, FL and EFW for the monochorionic pregnancies were 57.14 mm, 184.2 mm, 39.29 mm and 723.4 g, respectively. There was a statistical difference between mono and dichorionic pregnancies for all the biometric parameters (BPD p = 0.012; AC p = 0.047; FL p = 0.007; EFW p = 0.011). Reference curves of biometric parameters in twin pregnancies were determined. Biometric parameters were statistically different between monochorionic and dichorionic pregnancies. © 2014 John Wiley & Sons, Ltd.

  10. Biometric Screening and Future Employer Medical Costs: Is It Worth It to Know?

    PubMed

    Vanichkachorn, Greg; Marchese, Maya; Roy, Brad; Opel, Gordon

    2017-12-01

    To study the relationship between a biometric wellness data and future/actual medical costs. A relationship between total cholesterol to high density lipoprotein ratio, blood pressure, and blood glucose and medical costs, based on analysis of claims data, was explored in 1834 employees that had both wellness program biometric and claims data in 2016. Increased total cholesterol to HDL ratio is strongly associated with increased average costs (P < 0.01). Similarly, an increased glucose level is strongly associated with increased average costs (P = 0.001). There was no evidence of a relationship between elevated blood pressure and higher costs. By investing in an employer-sponsored biometric screening of full cholesterol and glucose profiles, medium-sized employers can identify high-risk employees who are expected to incur significantly higher healthcare costs, as compared with low-risk level employees, and improve treatment outcomes.

  11. On the feasibility of interoperable schemes in hand biometrics.

    PubMed

    Morales, Aythami; González, Ester; Ferrer, Miguel A

    2012-01-01

    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors.

  12. On the Feasibility of Interoperable Schemes in Hand Biometrics

    PubMed Central

    Morales, Aythami; González, Ester; Ferrer, Miguel A.

    2012-01-01

    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors. PMID:22438714

  13. The research and application of multi-biometric acquisition embedded system

    NASA Astrophysics Data System (ADS)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  14. Oxidative stress enzyme and histopathological lesions in Colossoma macropomum (pisces, ariidae) for environmental impact assessment

    NASA Astrophysics Data System (ADS)

    Andrade, Ticianne de Sousa de Oliveira Mota; Sousa, Debora Batista Pinheiro; Dantas, Janaina Gomes; Castro, Jonatas da Silva; Neta, Raimunda Nonata Fortes Carvalho

    2015-12-01

    This study used oxidative stress enzyme (Glutathione S-Transferase and Catalase), histopathological lesions (Branchial lesions) and biometric data in the freshwater fish tambaqui, Colossoma macropomum, to assess environmental impacts in an Environmental Protection Area at São Luis, Brazil. Fish were sampled from two locations (A1 = contaminated area and A2 = reference site) within the protected area on four occasions. The activity of catalase (CAT) and glutathione S-transferase (GST) in C. macropomum was compared with biometric data and histopathological lesions. Results have shown that biometric data decreased significantly in fish (p<0.05) at the contaminated site. The activity of CAT was higher in fish specifically caught in A1. A significant difference was observed in the GST activity in the liver of C. macropomum when comparing fish from the contaminated site and those from the reference site (p<0.05).

  15. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    NASA Astrophysics Data System (ADS)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  16. Department of Defense Chemical and Biological Defense Program. FY2004-2006 Performance Plan

    DTIC Science & Technology

    2005-03-01

    Agents (NTAs) Compare the direct effects of PAF on smooth muscle, hematic constituents, and lung to determine role in toxicity. Continue to identify...Range Biometric Target ID System Explore technologies for a long range biometric target identification system. Air Containment Monitoring System...Continue development of systems for contained air monitoring for chemical agents.Long Range Biometric Air Containment Monitoring System Continued

  17. The biometric-based module of smart grid system

    NASA Astrophysics Data System (ADS)

    Engel, E.; Kovalev, I. V.; Ermoshkina, A.

    2015-10-01

    Within Smart Grid concept the flexible biometric-based module base on Principal Component Analysis (PCA) and selective Neural Network is developed. The formation of the selective Neural Network the biometric-based module uses the method which includes three main stages: preliminary processing of the image, face localization and face recognition. Experiments on the Yale face database show that (i) selective Neural Network exhibits promising classification capability for face detection, recognition problems; and (ii) the proposed biometric-based module achieves near real-time face detection, recognition speed and the competitive performance, as compared to some existing subspaces-based methods.

  18. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    NASA Astrophysics Data System (ADS)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  19. Biometric parameters in different stages of primary angle closure using low-coherence interferometry.

    PubMed

    Yazdani, Shahin; Akbarian, Shadi; Pakravan, Mohammad; Doozandeh, Azadeh; Afrouzifar, Mohsen

    2015-03-01

    To compare ocular biometric parameters using low-coherence interferometry among siblings affected with different degrees of primary angle closure (PAC). In this cross-sectional comparative study, a total of 170 eyes of 86 siblings from 47 families underwent low-coherence interferometry (LenStar 900; Haag-Streit, Koeniz, Switzerland) to determine central corneal thickness, anterior chamber depth (ACD), aqueous depth (AD), lens thickness (LT), vitreous depth, and axial length (AL). Regression coefficients were applied to show the trend of the measured variables in different stages of angle closure. To evaluate the discriminative power of the parameters, receiver operating characteristic curves were used. Best cutoff points were selected based on the Youden index. Sensitivity, specificity, positive and negative predicative values, positive and negative likelihood ratios, and diagnostic accuracy were determined for each variable. All biometric parameters changed significantly from normal eyes to PAC suspects, PAC, and PAC glaucoma; there was a significant stepwise decrease in central corneal thickness, ACD, AD, vitreous depth, and AL, and an increase in LT and LT/AL. Anterior chamber depth and AD had the best diagnostic power for detecting angle closure; best levels of sensitivity and specificity were obtained with cutoff values of 3.11 mm for ACD and 2.57 mm for AD. Biometric parameters measured by low-coherence interferometry demonstrated a significant and stepwise change among eyes affected with various degrees of angle closure. Although the current classification scheme for angle closure is based on anatomical features, it has excellent correlation with biometric parameters.

  20. Infrared sensing of non-observable human biometrics

    NASA Astrophysics Data System (ADS)

    Willmore, Michael R.

    2005-05-01

    Interest and growth of biometric recognition technologies surged after 9/11. Once a technology mainly used for identity verification in law enforcement, biometrics are now being considered as a secure means of providing identity assurance in security related applications. Biometric recognition in law enforcement must, by necessity, use attributes of human uniqueness that are both observable and vulnerable to compromise. Privacy and protection of an individual's identity is not assured during criminal activity. However, a security system must rely on identity assurance for access control to physical or logical spaces while not being vulnerable to compromise and protecting the privacy of an individual. The solution resides in the use of non-observable attributes of human uniqueness to perform the biometric recognition process. This discussion will begin by presenting some key perspectives about biometric recognition and the characteristic differences between observable and non-observable biometric attributes. An introduction to the design, development, and testing of the Thermo-ID system will follow. The Thermo-ID system is an emerging biometric recognition technology that uses non-observable patterns of infrared energy naturally emanating from within the human body. As with all biometric systems, the infrared patterns recorded and compared within the Thermo-ID system are unique and individually distinguishable permitting a link to be confirmed between an individual and a claimed or previously established identity. The non-observable characteristics of infrared patterns of human uniqueness insure both the privacy and protection of an individual using this type of biometric recognition system.

  1. Similarity Search in Large Collections of Biometric Data

    DTIC Science & Technology

    2009-10-01

    instantaneous identification of a person by converting the biometric into a digital form and then comparing it against a computerized database . They can...combined to get reliable results. Exact match in biometric collections have very little meaning and only a relative ordering of database objects with...running several indices for different aspects of the data, e.g. facial features, fingerprints and palmprints of a person, together. The system then

  2. Reader reaction to "a robust method for estimating optimal treatment regimes" by Zhang et al. (2012).

    PubMed

    Taylor, Jeremy M G; Cheng, Wenting; Foster, Jared C

    2015-03-01

    A recent article (Zhang et al., 2012, Biometrics 168, 1010-1018) compares regression based and inverse probability based methods of estimating an optimal treatment regime and shows for a small number of covariates that inverse probability weighted methods are more robust to model misspecification than regression methods. We demonstrate that using models that fit the data better reduces the concern about non-robustness for the regression methods. We extend the simulation study of Zhang et al. (2012, Biometrics 168, 1010-1018), also considering the situation of a larger number of covariates, and show that incorporating random forests into both regression and inverse probability weighted based methods improves their properties. © 2014, The International Biometric Society.

  3. Refractive and Biometric Outcomes in Patients with Retinopathy of Prematurity Treated with Intravitreal Injection of Ranibizumab as Compared with Bevacizumab: A Clinical Study of Correction at Three Years of Age.

    PubMed

    Chen, Yen-Chih; Chen, San-Ni; Yang, Benjamin Chi-Lan; Lee, Kun-Hsien; Chuang, Chih-Chun; Cheng, Chieh-Yin

    2018-01-01

    To compare refractive and biometric outcomes in patients with type 1 retinopathy of prematurity (ROP) treated with intravitreal injection of ranibizumab (IVR) versus bevacizumab (IVB), at a corrected age of 3 years. A retrospective case series compared cycloplegic refractive statuses and biometric statuses in patients who received either IVR or IVB for type 1 ROP, from April 2011 to April 2014. A total of 62 eyes (33 patients) with type 1 ROP were evaluated (26 eyes in 13 IVR patients and 36 eyes in 20 IVB patients). There were no differences in birth statuses including gestational age and birth body weight between the two groups. The prevalence of refractive error greater than 1 D was higher in the IVB group ( p = 0.03), and there was a higher prevalence of high myopia (<-5.0 D, p = 0.03) in the IVB group. Comparisons in biometric finding showed that IVB patients had shallower anterior chamber depth ( p = 0.01). Both IVR and IVB showed low refractive errors, even followed at the corrected age of 3 years. No difference was noted between the two groups in refractive statuses. However, IVB was associated with shallower anterior chamber and higher prevalence of refractive error at the corrected age of 3 years. This trial is registered with NCT03334513.

  4. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism.

  5. Prevalence of Metabolic Syndrome in an Employed Population as Determined by Analysis of Three Data Sources.

    PubMed

    Goetzel, Ron Z; Kent, Karen; Henke, Rachel Mosher; Pack, Cory; D'Arco, Malinda; Thomas, Jordana; Luckett, James; Arthur-Hartranft, Traci

    2017-02-01

    The aim of this study was to compare estimates of the prevalence and incidence of metabolic syndrome (MetS) using various data sources. We integrated health risk assessment (HRA), claims, and biometric screening data from Lockheed Martin Corporation. We measured the extent to which MetS risk factors measured using HRA and medical claims correlated with biometric screening data. Using biometric data, 24.9% of employees were identified as having MetS. Prevalence estimates were much lower using HRA data (6.8%) and claims (3.7%). Between 2012 and 2014, 10.4% of the sample newly acquired MetS. The number of MetS risk factors per employee was predictive of diabetes, heart disease, health care costs, and utilization. MetS is prevalent and associated with progression to disease. It is more easily tracked with biometric screening data than with HRA or claims data. Employers should consider efforts to manage and prevent this condition in their workforce.

  6. Intraocular pressure and ocular biometric parameters changes in migraine.

    PubMed

    Koban, Yaran; Ozlece, Hatice Kose; Bilgin, Gorkem; Koc, Mustafa; Cagatay, Halil Huseyin; Durgunlu, Emre I; Burcu, Ayse

    2016-05-31

    The aim of this study was to assess the intraocular pressure and ocular biometric parameters in migraine patients during acute migraine attacks and compare them with painless period and healthy controls using a new optical biometer AL-Scan. In this prospective, case-control study, the axial length, corneal curvature radius, anterior chamber depth, central corneal thickness, and pupil size of 40 migraine patients during acute migraine attacks and painless period and 40 age- and sex-matched healthy subjects were measured using a AL-Scan optical biometer (Nidek Co., Gamagori, Japan). All patients underwent a complete ophthalmic examination before the measurements. IOP and biometer measurements were taken at the same time of day (10:00-12:00) in order to minimize the effects of diurnal variation. There was not a statistically significant difference in intraocular pressure between the migraine patients during acute migraine attacks (15.07 mmHg), painless period (14.10 mmHg), and the controls (15,73 ± 0,81). Also, the ocular biometric parameters did not significantly vary during the acute migraine attacks. Further studies are needed to evaluate the etiopathologic relationship between intraocular pressure and ocular biometric parameters and acute migraine attack.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.; Maxwell, R.L.; Wright, L.J.

    A biometric identification device is an automatic device that can verify a person's identity from a measurement of a physical feature or repeatable action of the individual. A reference measurement of the biometric is obtained when the individual is enrolled on the device. Subsequent verifications are made by comparing the submitted biometric feature against the reference sample. Sandia Laboratories has been evaluating the relative performance of several identity verifiers, using volunteer test subjects. Sandia testing methods and results are discussed.

  8. Joint sparse representation for robust multimodal biometrics recognition.

    PubMed

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods.

  9. An analysis of random projection for changeable and privacy-preserving biometric verification.

    PubMed

    Wang, Yongjin; Plataniotis, Konstantinos N

    2010-10-01

    Changeability and privacy protection are important factors for widespread deployment of biometrics-based verification systems. This paper presents a systematic analysis of a random-projection (RP)-based method for addressing these problems. The employed method transforms biometric data using a random matrix with each entry an independent and identically distributed Gaussian random variable. The similarity- and privacy-preserving properties, as well as the changeability of the biometric information in the transformed domain, are analyzed in detail. Specifically, RP on both high-dimensional image vectors and dimensionality-reduced feature vectors is discussed and compared. A vector translation method is proposed to improve the changeability of the generated templates. The feasibility of the introduced solution is well supported by detailed theoretical analyses. Extensive experimentation on a face-based biometric verification problem shows the effectiveness of the proposed method.

  10. Biometric identification based on novel frequency domain facial asymmetry measures

    NASA Astrophysics Data System (ADS)

    Mitra, Sinjini; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In the modern world, the ever-growing need to ensure a system's security has spurred the growth of the newly emerging technology of biometric identification. The present paper introduces a novel set of facial biometrics based on quantified facial asymmetry measures in the frequency domain. In particular, we show that these biometrics work well for face images showing expression variations and have the potential to do so in presence of illumination variations as well. A comparison of the recognition rates with those obtained from spatial domain asymmetry measures based on raw intensity values suggests that the frequency domain representation is more robust to intra-personal distortions and is a novel approach for performing biometric identification. In addition, some feature analysis based on statistical methods comparing the asymmetry measures across different individuals and across different expressions is presented.

  11. Transfer learning for bimodal biometrics recognition

    NASA Astrophysics Data System (ADS)

    Dan, Zhiping; Sun, Shuifa; Chen, Yanfei; Gan, Haitao

    2013-10-01

    Biometrics recognition aims to identify and predict new personal identities based on their existing knowledge. As the use of multiple biometric traits of the individual may enables more information to be used for recognition, it has been proved that multi-biometrics can produce higher accuracy than single biometrics. However, a common problem with traditional machine learning is that the training and test data should be in the same feature space, and have the same underlying distribution. If the distributions and features are different between training and future data, the model performance often drops. In this paper, we propose a transfer learning method for face recognition on bimodal biometrics. The training and test samples of bimodal biometric images are composed of the visible light face images and the infrared face images. Our algorithm transfers the knowledge across feature spaces, relaxing the assumption of same feature space as well as same underlying distribution by automatically learning a mapping between two different but somewhat similar face images. According to the experiments in the face images, the results show that the accuracy of face recognition has been greatly improved by the proposed method compared with the other previous methods. It demonstrates the effectiveness and robustness of our method.

  12. Multimodal biometric approach for cancelable face template generation

    NASA Astrophysics Data System (ADS)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  13. The ocular biometric differences of diabetic patients.

    PubMed

    Kocatürk, Tolga; Zengin, Mehmet Özgür; Cakmak, Harun; Evliçoglu, Gökhan Evren; Dündar, Sema Oruç; Omürlü, Imran Kurt; Unübol, Mustafa; Güney, Engin

    2014-01-01

    To investigate the differences in ocular biometric and keratometric characteristics in comparison with biometric measurements using the noncontact optical low coherence reflectometer (OLCR) (Lenstar LS 900, Haag-Streit) on diabetic patients. The eyes of 170 patients were included in this study, including 81 diabetic and 89 nondiabetic subjects. Optical biometric measurements of diabetic and nondiabetic patients (between the ages of 25 and 85 years) who applied to the ophthalmology clinic were noted from March to June 2013. Detailed ophthalmologic examinations were done for every subject. Biometric measurements were done using the noncontact OLCR device. Patient age ranged from 29 to 83 years. Subgroup analyses were done in diabetic patients according to their Hba1C levels. The minimum Hba1C value was 5.3, maximum was 12.4, and mean was 7.56 ± 1.48. The median duration of diabetes was 5 years (25th-75th percentile 3.00-11.75). Diabetic patients were found to have thicker lens and shallower anterior chamber in both eyes compared to nondiabetic control subjects. There were no statistical differences between the groups according to central corneal thickness, axial length, or keratometric values in both eyes. However, lens thicknesses were found to be thicker and anterior chamber depth values were found to be shallower in the diabetic group in both eyes. It may useful to determine eyeglasses prescription, refractive surgery calculation, lens selection, and previous cataract surgery according to biometric measurements after the regulation of blood glucose.

  14. On Hunting Animals of the Biometric Menagerie for Online Signature.

    PubMed

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  15. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    NASA Astrophysics Data System (ADS)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  16. A study of multibiometric traits of identical twins

    NASA Astrophysics Data System (ADS)

    Sun, Zhenan; Paulino, Alessandra A.; Feng, Jianjiang; Chai, Zhenhua; Tan, Tieniu; Jain, Anil K.

    2010-04-01

    The increase in twin births has created a requirement for biometric systems to accurately determine the identity of a person who has an identical twin. The discriminability of some of the identical twin biometric traits, such as fingerprints, iris, and palmprints, is supported by anatomy and the formation process of the biometric characteristic, which state they are different even in identical twins due to a number of random factors during the gestation period. For the first time, we collected multiple biometric traits (fingerprint, face, and iris) of 66 families of twins, and we performed unimodal and multimodal matching experiments to assess the ability of biometric systems in distinguishing identical twins. Our experiments show that unimodal finger biometric systems can distinguish two different persons who are not identical twins better than they can distinguish identical twins; this difference is much larger in the face biometric system and it is not significant in the iris biometric system. Multimodal biometric systems that combine different units of the same biometric modality (e.g. multiple fingerprints or left and right irises.) show the best performance among all the unimodal and multimodal biometric systems, achieving an almost perfect separation between genuine and impostor distributions.

  17. On Hunting Animals of the Biometric Menagerie for Online Signature

    PubMed Central

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836

  18. 77 FR 23263 - Proposed Data Collections Submitted for Public Comment and Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-18

    ... days of this notice. Proposed Project Targeted Surveillance and Biometric Studies for Enhanced... outcome data collection in select communities. The initial selected studies will address biometric changes... health impact. CDC is requesting OMB approval to conduct the Youth and Adult Biometric Study (YABS), one...

  19. A Systems Approach to Biometrics in the Military Domain.

    PubMed

    Wilson, Lauren; Gahan, Michelle; Lennard, Chris; Robertson, James

    2018-02-21

    Forensic biometrics is the application of forensic science principles to physical and behavioral characteristics. Forensic biometrics is a secondary sub-system in the forensic science "system of systems," which describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military system. The purpose of this paper is to discuss biometrics in the military domain and integration into the wider forensic science system of systems. The holistic system thinking methodology was applied to the U.S. biometric system to map it to the system of systems framework. The U.S. biometric system is used as a case study to help guide other countries to develop military biometric systems that are integrated and interoperable at the whole-of-government level. The aim is to provide the system of systems framework for agencies to consider for proactive design of biometric systems. © 2018 American Academy of Forensic Sciences.

  20. Carbon Nanotube Embedded Nanostructure for Biometrics.

    PubMed

    Park, Juhyuk; Youn, Jae Ryoun; Song, Young Seok

    2017-12-27

    Low electric energy loss is a very important problem to minimize the decay of transferred energy intensity due to impedance mismatch. This issue has been dealt with by adding an impedance matching layer at the interface between two media. A strategy was proposed to improve the charge transfer from the human body to a biometric device by using an impedance matching nanostructure. Nanocomposite pattern arrays were fabricated with shape memory polymer and carbon nanotubes. The shape recovery ability of the nanopatterns enhanced durability and sustainability of the structure. It was found that the composite nanopatterns improved the current transfer by two times compared with the nonpatterned composite sample. The underlying mechanism of the enhanced charge transport was understood by carrying out a numerical simulation. We anticipate that this study can provide a new pathway for developing advanced biometric devices with high sensitivity to biological information.

  1. The Effect of Decomposition on the Efficacy of Biometrics for Positive Identification.

    PubMed

    Sauerwein, Kelly; Saul, Tiffany B; Steadman, Dawnie Wolfe; Boehnen, Chris B

    2017-11-01

    Biometrics, unique measurable physiological and behavioral characteristics, are used to identify individuals in a variety of scenarios, including forensic investigations. However, data on the longevity of these indicators are incomplete. This study demonstrated that iris and fingerprint biometric data can be obtained up to four days postmortem in warmer seasons and 50 + days in the winter. It has been generally believed, but never studied, that iris recognition is only obtainable within the first 24 hours after death. However, this study showed that they remain viable for longer (2-34 days) depending upon the environmental conditions. Temperature, precipitation, insects, and scavenger activity were the primary factors affecting the retention of biometrics in decomposing human remains. While this study is an initial step in determining the utility of physiological biometrics across postmortem time, biometric research has the potential to make important contributions to human identification and the law enforcement, military, and medicolegal communities. © 2017 American Academy of Forensic Sciences.

  2. Measuring changes in lipid and blood glucose values in the health and wellness program of Prudential Financial, Inc.

    PubMed

    Short, Meghan E; Goetzel, Ron Z; Young, Jared S; Kowlessar, Niranjana M; Liss-Levinson, Rivka C; Tabrizi, Maryam J; Roemer, Enid Chung; Sabatelli, Adriano A; Winick, Keith; Montes, Myrtho; Crighton, K Andrew

    2010-08-01

    To determine the effect of health promotion programs of Prudential Financial, Inc on biometric measures of blood lipids and glucose. Using actual biometric and self-reported measures of blood lipids and glucose values for the employees of Prudential Financial, Inc, we examined 1) the extent to which self-reported lipid and blood glucose values correlate to laboratory data, 2) whether self-reported and measured lipid values differ for physically active and sedentary employees, and 3) whether participation in a disease management program affects employees' lipid measures. We found significant differences in self-reported and measured total cholesterol and low-density lipoprotein values, although these differences and those for all lipid and blood glucose values were not clinically meaningful. Supporting previous clinical studies, high-density lipoprotein values were significantly higher for fitness center users compared with sedentary employees. Finally, disease management participants showed a significant reduction in total cholesterol and low-density lipoprotein during a 3-year period compared with nonparticipants. On average, the employees of Prudential Financial, Inc were aware of and accurately reported their lipid and blood glucose levels. Results from this study support the value of evaluating corporate health promotion programs, using measured biometric outcomes.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less

  4. Individual Biometric Identification Using Multi-Cycle Electrocardiographic Waveform Patterns.

    PubMed

    Lee, Wonki; Kim, Seulgee; Kim, Daeeun

    2018-03-28

    The electrocardiogram (ECG) waveform conveys information regarding the electrical property of the heart. The patterns vary depending on the individual heart characteristics. ECG features can be potentially used for biometric recognition. This study presents a new method using the entire ECG waveform pattern for matching and demonstrates that the approach can potentially be employed for individual biometric identification. Multi-cycle ECG signals were assessed using an ECG measuring circuit, and three electrodes can be patched on the wrists or fingers for considering various measurements. For biometric identification, our-fold cross validation was used in the experiments for assessing how the results of a statistical analysis will generalize to an independent data set. Four different pattern matching algorithms, i.e., cosine similarity, cross correlation, city block distance, and Euclidean distances, were tested to compare the individual identification performances with a single channel of ECG signal (3-wire ECG). To evaluate the pattern matching for biometric identification, the ECG recordings for each subject were partitioned into training and test set. The suggested method obtained a maximum performance of 89.9% accuracy with two heartbeats of ECG signals measured on the wrist and 93.3% accuracy with three heartbeats for 55 subjects. The performance rate with ECG signals measured on the fingers improved up to 99.3% with two heartbeats and 100% with three heartbeats of signals for 20 subjects.

  5. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems.

    PubMed

    Snelick, Robert; Uludag, Umut; Mink, Alan; Indovina, Michael; Jain, Anil

    2005-03-01

    We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. The majority of prior studies of multimodal biometrics have been limited to relatively low accuracy non-COTS systems and populations of a few hundred users. Our work is the first to demonstrate that multimodal fingerprint and face biometric systems can achieve significant accuracy gains over either biometric alone, even when using highly accurate COTS systems on a relatively large-scale population. In addition to examining well-known multimodal methods, we introduce new methods of normalization and fusion that further improve the accuracy.

  6. Department of Defense Chemical, Biological, Radiological, and Nuclear Defense Program. FY2003-2005 Performance Plan

    DTIC Science & Technology

    2004-05-01

    Agents (NTAs) Compare the direct effects of PAF on smooth muscle, hematic constituents, and lung to determine role in toxicity. Continue to...baselined. Long Range Biometric Target ID System Explore technologies for a long range biometric target identification system. 3.5.1.6

  7. Genetic and environmental structure of DSM-IV criteria for Antisocial Personality Disorder: a twin study

    PubMed Central

    Rosenström, Tom; Ystrom, Eivind; Torvik, Fartein Ask; Czajkowski, Nikolai Olavi; Gillespie, Nathan A.; Aggen, Steven H.; Krueger, Robert F.; Kendler, Kenneth S; Reichborn-Kjennerud, Ted

    2017-01-01

    Results from previous studies on DSM-IV and DSM-5 Antisocial Personality Disorder (ASPD) have suggested that the construct is etiologically multidimensional. To our knowledge, however, the structure of genetic and environmental influences in ASPD has not been examined using an appropriate range of biometric models and diagnostic interviews. The 7 ASPD criteria (section A) were assessed in a population-based sample of 2794 Norwegian twins by a structured interview for DSM-IV personality disorders. Exploratory analyses were conducted at the phenotypic level. Multivariate biometric models, including both independent and common pathways, were compared. A single phenotypic factor was found, and the best-fitting biometric model was a single-factor common pathway model, with common-factor heritability of 51% (95% CI = 40–67%). In other words, both genetic and environmental correlations between the ASPD criteria could be accounted for by a single common latent variable. The findings support the validity of ASPD as a unidimensional diagnostic construct. PMID:28108863

  8. Genetic and Environmental Structure of DSM-IV Criteria for Antisocial Personality Disorder: A Twin Study.

    PubMed

    Rosenström, Tom; Ystrom, Eivind; Torvik, Fartein Ask; Czajkowski, Nikolai Olavi; Gillespie, Nathan A; Aggen, Steven H; Krueger, Robert F; Kendler, Kenneth S; Reichborn-Kjennerud, Ted

    2017-05-01

    Results from previous studies on DSM-IV and DSM-5 Antisocial Personality Disorder (ASPD) have suggested that the construct is etiologically multidimensional. To our knowledge, however, the structure of genetic and environmental influences in ASPD has not been examined using an appropriate range of biometric models and diagnostic interviews. The 7 ASPD criteria (section A) were assessed in a population-based sample of 2794 Norwegian twins by a structured interview for DSM-IV personality disorders. Exploratory analyses were conducted at the phenotypic level. Multivariate biometric models, including both independent and common pathways, were compared. A single phenotypic factor was found, and the best-fitting biometric model was a single-factor common pathway model, with common-factor heritability of 51% (95% CI 40-67%). In other words, both genetic and environmental correlations between the ASPD criteria could be accounted for by a single common latent variable. The findings support the validity of ASPD as a unidimensional diagnostic construct.

  9. Live face detection based on the analysis of Fourier spectra

    NASA Astrophysics Data System (ADS)

    Li, Jiangwei; Wang, Yunhong; Tan, Tieniu; Jain, Anil K.

    2004-08-01

    Biometrics is a rapidly developing technology that is to identify a person based on his or her physiological or behavioral characteristics. To ensure the correction of authentication, the biometric system must be able to detect and reject the use of a copy of a biometric instead of the live biometric. This function is usually termed "liveness detection". This paper describes a new method for live face detection. Using structure and movement information of live face, an effective live face detection algorithm is presented. Compared to existing approaches, which concentrate on the measurement of 3D depth information, this method is based on the analysis of Fourier spectra of a single face image or face image sequences. Experimental results show that the proposed method has an encouraging performance.

  10. Performance Evaluation of a Biometric System Based on Acoustic Images

    PubMed Central

    Izquierdo-Fuente, Alberto; del Val, Lara; Jiménez, María I.; Villacorta, Juan J.

    2011-01-01

    An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 λ/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications. PMID:22163708

  11. On Biometrics With Eye Movements.

    PubMed

    Zhang, Youming; Juhola, Martti

    2017-09-01

    Eye movements are a relatively novel data source for biometric identification. When video cameras applied to eye tracking become smaller and more efficient, this data source could offer interesting opportunities for the development of eye movement biometrics. In this paper, we study primarily biometric identification as seen as a classification task of multiple classes, and secondarily biometric verification considered as binary classification. Our research is based on the saccadic eye movement signal measurements from 109 young subjects. In order to test the data measured, we use a procedure of biometric identification according to the one-versus-one (subject) principle. In a development from our previous research, which also involved biometric verification based on saccadic eye movements, we now apply another eye movement tracker device with a higher sampling frequency of 250 Hz. The results obtained are good, with correct identification rates at 80-90% at their best.

  12. Analyzing a multimodal biometric system using real and virtual users

    NASA Astrophysics Data System (ADS)

    Scheidat, Tobias; Vielhauer, Claus

    2007-02-01

    Three main topics of recent research on multimodal biometric systems are addressed in this article: The lack of sufficiently large multimodal test data sets, the influence of cultural aspects and data protection issues of multimodal biometric data. In this contribution, different possibilities are presented to extend multimodal databases by generating so-called virtual users, which are created by combining single biometric modality data of different users. Comparative tests on databases containing real and virtual users based on a multimodal system using handwriting and speech are presented, to study to which degree the use of virtual multimodal databases allows conclusions with respect to recognition accuracy in comparison to real multimodal data. All tests have been carried out on databases created from donations from three different nationality groups. This allows to review the experimental results both in general and in context of cultural origin. The results show that in most cases the usage of virtual persons leads to lower accuracy than the usage of real users in terms of the measurement applied: the Equal Error Rate. Finally, this article will address the general question how the concept of virtual users may influence the data protection requirements for multimodal evaluation databases in the future.

  13. A method for profiling biometric changes during disaccommodation.

    PubMed

    Alderson, Alison; Davies, Leon N; Mallen, Edward A H; Sheppard, Amy L

    2012-05-01

    To demonstrate the application of low-coherence reflectometry to the study of biometric changes during disaccommodation responses in human eyes after cessation of a near task and to evaluate the effect of contact lenses on low-coherence reflectometry biometric measurements. Ocular biometric parameters of crystalline lens thickness (LT) and anterior chamber depth (ACD) were measured with the LenStar device during and immediately after a 5 D accommodative task in 10 participants. In a separate trial, accommodation responses were recorded with a Shin-Nippon WAM-5500 optometer in a subset of two participants. Biometric data were interleaved to form a profile of post-task anterior segment changes. In a further experiment, the effect of soft contact lenses on LenStar measurements was evaluated in 15 participants. In 10 adult participants, increased LT and reduced ACD was seen during the 5 D task. Post-task, during fixation of a 0 D target, a profile of the change in LT and ACD against time was observed. In the two participants with accommodation data (one a sufferer of nearwork-induced transient myopia and other a non-sufferer), the post-task changes in refraction compared favorably with the interleaved LenStar biometry data. The insertion of soft contact lenses did not have a significant effect on LenStar measures of ACD or LT (mean change: -0.007 mm, p = 0.265 and + 0.001 mm, p = 0.875, respectively). With the addition of a relatively simple stimulus modification, the LenStar instrument can be used to produce a profile of post-task changes in LT and ACD. The spatial and temporal resolution of the system is sufficient for the investigation of nearwork-induced transient myopia from a biometric viewpoint. LenStar measurements of ACD and LT remain valid after the fitting of soft contact lenses.

  14. Performance Evaluation of Multimodal Multifeature Authentication System Using KNN Classification.

    PubMed

    Rajagopal, Gayathri; Palaniswamy, Ramamoorthy

    2015-01-01

    This research proposes a multimodal multifeature biometric system for human recognition using two traits, that is, palmprint and iris. The purpose of this research is to analyse integration of multimodal and multifeature biometric system using feature level fusion to achieve better performance. The main aim of the proposed system is to increase the recognition accuracy using feature level fusion. The features at the feature level fusion are raw biometric data which contains rich information when compared to decision and matching score level fusion. Hence information fused at the feature level is expected to obtain improved recognition accuracy. However, information fused at feature level has the problem of curse in dimensionality; here PCA (principal component analysis) is used to diminish the dimensionality of the feature sets as they are high dimensional. The proposed multimodal results were compared with other multimodal and monomodal approaches. Out of these comparisons, the multimodal multifeature palmprint iris fusion offers significant improvements in the accuracy of the suggested multimodal biometric system. The proposed algorithm is tested using created virtual multimodal database using UPOL iris database and PolyU palmprint database.

  15. Performance Evaluation of Multimodal Multifeature Authentication System Using KNN Classification

    PubMed Central

    Rajagopal, Gayathri; Palaniswamy, Ramamoorthy

    2015-01-01

    This research proposes a multimodal multifeature biometric system for human recognition using two traits, that is, palmprint and iris. The purpose of this research is to analyse integration of multimodal and multifeature biometric system using feature level fusion to achieve better performance. The main aim of the proposed system is to increase the recognition accuracy using feature level fusion. The features at the feature level fusion are raw biometric data which contains rich information when compared to decision and matching score level fusion. Hence information fused at the feature level is expected to obtain improved recognition accuracy. However, information fused at feature level has the problem of curse in dimensionality; here PCA (principal component analysis) is used to diminish the dimensionality of the feature sets as they are high dimensional. The proposed multimodal results were compared with other multimodal and monomodal approaches. Out of these comparisons, the multimodal multifeature palmprint iris fusion offers significant improvements in the accuracy of the suggested multimodal biometric system. The proposed algorithm is tested using created virtual multimodal database using UPOL iris database and PolyU palmprint database. PMID:26640813

  16. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  17. Case studies of the use of biometrics technologies to reduce fraud in governmental and industrial environments

    NASA Astrophysics Data System (ADS)

    Bordes, Roy N.

    1998-12-01

    The purpose of this presentation is to enlighten the reader on the advancements that have been made in the field of biometrics technology as it relates to government and industrial-type applications. The term 'biometrics' is defined as, 'Any technology that uses electronically scanned graphical information for identification purposes.' Biometric technology was for a long time in the experimental stages, with many BETA test projects that were really not applicable to industrial markets. During the course of this presentation, we will show that biometrics applications do work, can develop positive returns on investment, but from a security standpoint have some major application problems that still need to be overcome. We will also address which biometric technologies have a better future in the security world than others.

  18. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  19. The relationship between refractive and biometric changes during Edinger–Westphal stimulated accommodation in rhesus monkeys

    PubMed Central

    Vilupuru, Abhiram S.; Glasser, Adrian

    2010-01-01

    Experiments were undertaken to understand the relationship between dynamic accommodative refractive and biometric (lens thickness (LT), anterior chamber depth (ACD) and anterior segment length (ASL=ACD+LT)) changes during Edinger–Westphal stimulated accommodation in rhesus monkeys. Experiments were conducted on three rhesus monkeys (aged 11·5, 4·75 and 4·75 years) which had undergone prior, bilateral, complete iridectomies and implantation of a stimulating electrode in the Edinger–Westphal (EW) nucleus. Accommodative refractive responses were first measured dynamically with video-based infrared photorefraction and then ocular biometric responses were measured dynamically with continuous ultrasound biometry (CUB) during EW stimulation. The same stimulus amplitudes were used for the refractive and biometric measurements to allow them to be compared. Main sequence relationships (ratio of peak velocity to amplitude) were calculated. Dynamic accommodative refractive changes are linearly correlated with the biometric changes and accommodative biometric changes in ACD, ASL and LT show systematic linear correlations with increasing accommodative amplitudes. The relationships are relatively similar for the eyes of the different monkeys. Dynamic analysis showed that main sequence relationships for both biometry and refraction are linear. Although accommodative refractive changes in the eye occur primarily due to changes in lens surface curvature, the refractive changes are well correlated with A-scan measured accommodative biometric changes. Accommodative changes in ACD, LT and ASL are all well correlated over the full extent of the accommodative response. PMID:15721617

  20. Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Alhussain, Thamer; Drew, Steve

    The paper discussed an exploratory study of government employees’ perceptions of the introduction of biometric authentication at the workplace in the Kingdom of Saudi Arabia. We suggest that studying the factors affecting employees’ acceptance of new technology will help ease the adoption of biometric technology in other e-government applications. A combination of survey and interviews was used to collect the required data. Interviews were conducted with managers and questionnaires were given to employees from two different government organisations in the Kingdom of Saudi Arabia to investigate the employees’ perceptions of using biometrics. The results of this study indicate a significant digital and cultural gap between the technological awareness of employees and the preferred authentication solutions promoted by management. A lack of trust in technology, its potential for misuse and management motives reflect the managers’ need to consider their responsibilities for narrowing these gaps. It was apparent that overcoming employees’ resistance is an essential issue facing biometric implementation. Based on the research we recommend that an awareness and orientation process about biometrics should take place before the technology is introduced into the organisation.

  1. Compressed domain ECG biometric with two-lead features

    NASA Astrophysics Data System (ADS)

    Lee, Wan-Jou; Chang, Wen-Whei

    2016-07-01

    This study presents a new method to combine ECG biometrics with data compression within a common JPEG2000 framework. We target the two-lead ECG configuration that is routinely used in long-term heart monitoring. Incorporation of compressed-domain biometric techniques enables faster person identification as it by-passes the full decompression. Experiments on public ECG databases demonstrate the validity of the proposed method for biometric identification with high accuracies on both healthy and diseased subjects.

  2. Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth

    NASA Astrophysics Data System (ADS)

    Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.

    2008-02-01

    Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.

  3. Biometric Attendance and Big Data Analysis for Optimizing Work Processes.

    PubMed

    Verma, Neetu; Xavier, Teenu; Agrawal, Deepak

    2016-01-01

    Although biometric attendance management is available, large healthcare organizations have difficulty in big data analysis for optimization of work processes. The aim of this project was to assess the implementation of a biometric attendance system and its utility following big data analysis. In this prospective study the implementation of biometric system was evaluated over 3 month period at our institution. Software integration with other existing systems for data analysis was also evaluated. Implementation of the biometric system could be successfully done over a two month period with enrollment of 10,000 employees into the system. However generating reports and taking action this large number of staff was a challenge. For this purpose software was made for capturing the duty roster of each employee and integrating it with the biometric system and adding an SMS gateway. This helped in automating the process of sending SMSs to each employee who had not signed in. Standalone biometric systems have limited functionality in large organizations unless it is meshed with employee duty roster.

  4. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations

    DTIC Science & Technology

    2016-05-01

    Biometrics in Support of Operations Biometrics -at-Sea: Business Rules for South Florida United States...Intelligence Activities Biometrics -Enabled Intelligence USCG Biometrics -at-Sea: Business Rules for...Defense Biometrics United States Intelligence Activities Active Army,

  5. Comparison of the biometric formulas used for applanation A-scan ultrasound biometry.

    PubMed

    Özcura, Fatih; Aktaş, Serdar; Sağdık, Hacı Murat; Tetikoğlu, Mehmet

    2016-10-01

    The purpose of the study was to compare the accuracy of various biometric formulas for predicting postoperative refraction determined using applanation A-scan ultrasound. This retrospective comparative study included 485 eyes that underwent uneventful phacoemulsification with intraocular lens (IOL) implantation. Applanation A-scan ultrasound biometry and postoperative manifest refraction were obtained in all eyes. Biometric data were entered into each of the five IOL power calculation formulas: SRK-II, SRK/T, Holladay I, Hoffer Q, and Binkhorst II. All eyes were divided into three groups according to axial length: short (≤22.0 mm), average (22.0-25.0 mm), and long (≥25.0 mm) eyes. The postoperative spherical equivalent was calculated and compared with the predicted refractive error using each biometric formula. The results showed that all formulas had significantly lower mean absolute error (MAE) in comparison with Binkhorst II formula (P < 0.01). The lowest MAE was obtained with the SRK-II for average (0.49 ± 0.40 D) and short (0.67 ± 0.54 D) eyes and the SRK/T for long (0.61 ± 0.50 D) eyes. The highest postoperative hyperopic shift was seen with the SRK-II for average (46.8 %), short (28.1 %), and long (48.4 %) eyes. The highest postoperative myopic shift was seen with the Holladay I for average (66.4 %) and long (71.0 %) eyes and the SRK/T for short eyes (80.6 %). In conclusion, the SRK-II formula produced the lowest MAE in average and short eyes and the SRK/T formula produced the lowest MAE in long eyes. The SRK-II has the highest postoperative hyperopic shift in all eyes. The highest postoperative myopic shift is with the Holladay I for average and long eyes and SRK/T for short eyes.

  6. Annotated Computer Output for Illustrative Examples of Clustering Using the Mixture Method and Two Comparable Methods from SAS.

    DTIC Science & Technology

    1987-06-26

    BUREAU OF STANDAR-S1963-A Nw BOM -ILE COPY -. 4eo .?3sa.9"-,,A WIN* MAT HEMATICAL SCIENCES _*INSTITUTE AD-A184 687 DTICS!ELECTE ANNOTATED COMPUTER OUTPUT...intoduction to the use of mixture models in clustering. Cornell University Biometrics Unit Technical Report BU-920-M and Mathematical Sciences Institute...mixture method and two comparable methods from SAS. Cornell University Biometrics Unit Technical Report BU-921-M and Mathematical Sciences Institute

  7. Regional Brain Biometrics at Term-Equivalent Age and Developmental Outcome in Extremely Low-Birth-Weight Infants.

    PubMed

    Melbourne, Launice; Murnick, Jonathan; Chang, Taeun; Glass, Penny; Massaro, An N

    2015-10-01

    This study aims to evaluate individual regional brain biometrics and their association with developmental outcome in extremely low-birth-weight (ELBW) infants. This is a retrospective study evaluating term-equivalent magnetic resonance imaging (TE-MRI) from 27 ELBW infants with known developmental outcomes beyond 12 months corrected age. Regional biometric measurements were performed by a pediatric neuroradiologist blinded to outcome data. Measures included biparietal width, transcerebellar diameter (TCD), deep gray matter area (DGMA), ventricular dilatation, corpus callosum, and interhemispheric distance. The relationship between regional biometrics and Bayley-II developmental scores were evaluated with linear regression models. The study cohort had an average±standard deviation birth weight of 684±150 g, gestational age of 24.6±2 weeks and 48% males. DGMA was significantly associated with both cognitive and motor outcomes. Significant associations were also observed between TCD and corpus callosum splenium with cognitive and motor outcomes, respectively. Other biometric measures were not associated with outcome (p>0.05). DGMA<10.26 cm2 was highly specific for poor motor and cognitive outcome. TE-MRI biometrics reflecting impaired deep gray matter, callosal, and cerebellar size is associated with worse early childhood cognitive and motor outcomes. DGMA may be the most robust single biometric measure to predict adverse developmental outcome in preterm survivors. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  8. Improving the recognition of fingerprint biometric system using enhanced image fusion

    NASA Astrophysics Data System (ADS)

    Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma

    2010-04-01

    Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.

  9. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  10. Biometric identification based on feature fusion with PCA and SVM

    NASA Astrophysics Data System (ADS)

    Lefkovits, László; Lefkovits, Szidónia; Emerich, Simina

    2018-04-01

    Biometric identification is gaining ground compared to traditional identification methods. Many biometric measurements may be used for secure human identification. The most reliable among them is the iris pattern because of its uniqueness, stability, unforgeability and inalterability over time. The approach presented in this paper is a fusion of different feature descriptor methods such as HOG, LIOP, LBP, used for extracting iris texture information. The classifiers obtained through the SVM and PCA methods demonstrate the effectiveness of our system applied to one and both irises. The performances measured are highly accurate and foreshadow a fusion system with a rate of identification approaching 100% on the UPOL database.

  11. Normalizing electrocardiograms of both healthy persons and cardiovascular disease patients for biometric authentication.

    PubMed

    Yang, Meixue; Liu, Bin; Zhao, Miaomiao; Li, Fan; Wang, Guoqing; Zhou, Fengfeng

    2013-01-01

    Although electrocardiogram (ECG) fluctuates over time and physical activity, some of its intrinsic measurements serve well as biometric features. Considering its constant availability and difficulty in being faked, the ECG signal is becoming a promising factor for biometric authentication. The majority of the currently available algorithms only work well on healthy participants. A novel normalization and interpolation algorithm is proposed to convert an ECG signal into multiple template cycles, which are comparable between any two ECGs, no matter the sampling rates or health status. The overall accuracies reach 100% and 90.11% for healthy participants and cardiovascular disease (CVD) patients, respectively.

  12. Normalizing Electrocardiograms of Both Healthy Persons and Cardiovascular Disease Patients for Biometric Authentication

    PubMed Central

    Zhao, Miaomiao; Li, Fan; Wang, Guoqing; Zhou, Fengfeng

    2013-01-01

    Although electrocardiogram (ECG) fluctuates over time and physical activity, some of its intrinsic measurements serve well as biometric features. Considering its constant availability and difficulty in being faked, the ECG signal is becoming a promising factor for biometric authentication. The majority of the currently available algorithms only work well on healthy participants. A novel normalization and interpolation algorithm is proposed to convert an ECG signal into multiple template cycles, which are comparable between any two ECGs, no matter the sampling rates or health status. The overall accuracies reach 100% and 90.11% for healthy participants and cardiovascular disease (CVD) patients, respectively. PMID:23977063

  13. The first determination of Trichuris sp. from roe deer by amplification and sequenation of the ITS1-5.8S-ITS2 segment of ribosomal DNA.

    PubMed

    Salaba, O; Rylková, K; Vadlejch, J; Petrtýl, M; Scháňková, S; Brožová, A; Jankovská, I; Jebavý, L; Langrová, I

    2013-03-01

    Trichuris nematodes were isolated from roe deer (Capreolus capreolus). At first, nematodes were determined using morphological and biometrical methods. Subsequently genomic DNA was isolated and the ITS1-5.8S-ITS2 segment from ribosomal DNA (RNA) was amplified and sequenced using PCR techniques. With u sing morphological and biometrical methods, female nematodes were identified as Trichuris globulosa, and the only male was identified as Trichuris ovis. The females were classified into four morphotypes. However, analysis of the internal transcribed spacers (ITS1-5.8S-ITS2) of specimens did not confirm this classification. Moreover, the female individuals morphologically determined as T. globulosa were molecularly identified as Trichuris discolor. In the case of the only male molecular analysis match the result of the molecular identification. Furthermore, a comparative phylogenetic study was carried out with the ITS1 and ITS2 sequences of the Trichuris species from various hosts. A comparison of biometric information from T. discolor individuals from this study was also conducted.

  14. Power calculation for comparing diagnostic accuracies in a multi-reader, multi-test design.

    PubMed

    Kim, Eunhee; Zhang, Zheng; Wang, Youdan; Zeng, Donglin

    2014-12-01

    Receiver operating characteristic (ROC) analysis is widely used to evaluate the performance of diagnostic tests with continuous or ordinal responses. A popular study design for assessing the accuracy of diagnostic tests involves multiple readers interpreting multiple diagnostic test results, called the multi-reader, multi-test design. Although several different approaches to analyzing data from this design exist, few methods have discussed the sample size and power issues. In this article, we develop a power formula to compare the correlated areas under the ROC curves (AUC) in a multi-reader, multi-test design. We present a nonparametric approach to estimate and compare the correlated AUCs by extending DeLong et al.'s (1988, Biometrics 44, 837-845) approach. A power formula is derived based on the asymptotic distribution of the nonparametric AUCs. Simulation studies are conducted to demonstrate the performance of the proposed power formula and an example is provided to illustrate the proposed procedure. © 2014, The International Biometric Society.

  15. Iris recognition as a biometric method after cataract surgery

    PubMed Central

    Roizenblatt, Roberto; Schor, Paulo; Dante, Fabio; Roizenblatt, Jaime; Belfort, Rubens

    2004-01-01

    Background Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Methods Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical) distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. Results A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Conclusions Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure. PMID:14748929

  16. Iris recognition as a biometric method after cataract surgery.

    PubMed

    Roizenblatt, Roberto; Schor, Paulo; Dante, Fabio; Roizenblatt, Jaime; Belfort, Rubens

    2004-01-28

    Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical) distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  17. Validating a biometric authentication system: sample size requirements.

    PubMed

    Dass, Sarat C; Zhu, Yongfang; Jain, Anil K

    2006-12-01

    Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Often, vendors and owners of these commercial biometric systems claim impressive performance that is estimated based on some proprietary data. In such situations, there is a need to independently validate the claimed performance levels. System performance is typically evaluated by collecting biometric templates from n different subjects, and for convenience, acquiring multiple instances of the biometric for each of the n subjects. Very little work has been done in 1) constructing confidence regions based on the ROC curve for validating the claimed performance levels and 2) determining the required number of biometric samples needed to establish confidence regions of prespecified width for the ROC curve. To simplify the analysis that address these two problems, several previous studies have assumed that multiple acquisitions of the biometric entity are statistically independent. This assumption is too restrictive and is generally not valid. We have developed a validation technique based on multivariate copula models for correlated biometric acquisitions. Based on the same model, we also determine the minimum number of samples required to achieve confidence bands of desired width for the ROC curve. We illustrate the estimation of the confidence bands as well as the required number of biometric samples using a fingerprint matching system that is applied on samples collected from a small population.

  18. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.

    PubMed

    Yang, Li; Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.

  19. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments

    PubMed Central

    Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085

  20. Heritability of myopia and ocular biometrics in Koreans: the healthy twin study.

    PubMed

    Kim, Myung Hun; Zhao, Di; Kim, Woori; Lim, Dong-Hui; Song, Yun-Mi; Guallar, Eliseo; Cho, Juhee; Sung, Joohon; Chung, Eui-Sang; Chung, Tae-Young

    2013-05-01

    To estimate the heritabilities of myopia and ocular biometrics among different family types among a Korean population. We studied 1508 adults in the Healthy Twin Study. Spherical equivalent, axial length, anterior chamber depth, and corneal astigmatism were measured by refraction, corneal topography, and A-scan ultrasonography. To see the degree of resemblance among different types of family relationships, intraclass correlation coefficients (ICC) were calculated. Variance-component methods were applied to estimate the genetic contributions to eye phenotypes as heritability based on the maximum likelihood estimation. Narrow sense heritability was calculated as the proportion of the total phenotypic variance explained by additive genetic effects, and linear and nonlinear effects of age, sex, and interactions between age and sex were adjusted. A total of 240 monozygotic twin pairs, 45 dizygotic twin pairs, and 938 singleton adult family members who were first-degree relatives of twins in 345 families were included in the study. ICCs for spherical equivalent from monozygotic twins, pooled first-degree pairs, and spouse pairs were 0.83, 0.34, and 0.20, respectively. The ICCs of other ocular biometrics were also significantly higher in monozygotic twins compared with other relative pairs, with greater consistency and conformity. The estimated narrow sense heritability (95% confidence interval) was 0.78 (0.71-0.84) for spherical equivalent; 0.86 (0.82-0.90) for axial length; 0.83 (0.76-0.91) for anterior chamber depth; and 0.70 (0.63-0.77) for corneal astigmatism. The estimated heritability of spherical equivalent and ocular biometrics in the Korean population suggests the compelling evidence that all traits are highly heritable.

  1. Preliminary evaluation of foetal liver volume by three-dimensional ultrasound in women with gestational diabetes mellitus.

    PubMed

    İlhan, Gülşah; Gültekin, Hüseyin; Kubat, Ayça; Gokmen Karasu, Ayse Filiz; Güngör, Emre Sinan; Zebitay, Galip Ali; Verit Atmaca, Fatma Ferda

    2018-03-19

    The aim of the study was to assess the standard foetal biometric measurements and foetal liver volume (FLV) in pregnancies complicated by gestational diabetes mellitus (GDM) at the time of GDM screening and to compare the results with foetuses in normal pregnancies. Ninety-seven pregnant women with normal singleton uncomplicated pregnancies between 24 and 28 weeks of gestation were allocated into GDM (+) (n: 33) and GDM (-) (n: 64) groups based on their 75 g oral glucose tolerance test results. Foetal biometric measurements and FLV measurements of the groups were compared. Although there were no significant differences in the standard biometric measurements between the two groups, FLV was significantly higher in the women with GDM (p < .01). The ROC analysis implied that with a cut-off value of FLV of 32.72 cm 3 for GDM prediction, the sensitivity was 78.8% and specificity was 56.3%. We suggest that FLV measurements during the second-trimester ultrasound scanning may be a tool for the prediction of GDM in the obstetric population. Impact statement What is already known on this subject? GDM is an important pregnancy disease, because of its possible foetal and maternal complications. Besides the standard biometric measurements, some other foetal body dimensions such as the anterior abdominal wall thickness, skinfold thickness, adipose tissue thickness, Wharton's jelly thickness, foetal liver length and foetal liver volume (FLV) have been evaluated as ultrasound parameters of glycaemic control. While the evaluation of foetal liver dimensions has a role in identifying foetal growth acceleration, previous studies addressed patients with insulin-dependent diabetes mellitus rather than gestational diabetes mellitus, utilised two-dimensional ultrasound and did not argue the diagnostic value of these findings. What do the results of this study add? In our study, besides the standard biometric measurements, the FLV measurements were evaluated by a three-dimensional ultrasound. Although there were no significant differences in the standard biometric measurements between the GDM (+) and GDM (-) groups, the FLV was significantly higher in women with GDM. The FLV was found to be a potential predictive factor for GDM. The ROC analysis implied that as a cut-off value of FLV of 32.72 cm 3 for GDM prediction, the sensitivity was 78.8% and the specificity was 56.3%. What are the implications of these findings for clinical practise and/or further research? Screening for GDM with oral glucose tolerance test within the limited weeks of gestation may not always be feasible. On the other hand, the mid-trimester ultrasound scanning is done almost in all pregnancies. Accordingly, FLV measurement might be an alternative method for the GDM diagnosis.

  2. Gaze Estimation for Off-Angle Iris Recognition Based on the Biometric Eye Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karakaya, Mahmut; Barstow, Del R; Santos-Villalobos, Hector J

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ANONYMIZED biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction frommore » elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.« less

  3. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    PubMed

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  4. Clinical study of the Erlanger silver catheter--data management and biometry.

    PubMed

    Martus, P; Geis, C; Lugauer, S; Böswald, M; Guggenbichler, J P

    1999-01-01

    The clinical evaluation of venous catheters for catheter-induced infections must conform to a strict biometric methodology. The statistical planning of the study (target population, design, degree of blinding), data management (database design, definition of variables, coding), quality assurance (data inspection at several levels) and the biometric evaluation of the Erlanger silver catheter project are described. The three-step data flow included: 1) primary data from the hospital, 2) relational database, 3) files accessible for statistical evaluation. Two different statistical models were compared: analyzing the first catheter only of a patient in the analysis (independent data) and analyzing several catheters from the same patient (dependent data) by means of the generalized estimating equations (GEE) method. The main result of the study was based on the comparison of both statistical models.

  5. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    NASA Astrophysics Data System (ADS)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  6. Mouse Curve Biometrics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schulz, Douglas A.

    2007-10-08

    A biometric system suitable for validating user identity using only mouse movements and no specialized equipment is presented. Mouse curves (mouse movements with little or no pause between them) are individually classied and used to develop classication histograms, which are representative of an individual's typical mouse use. These classication histograms can then be compared to validate identity. This classication approach is suitable for providing continuous identity validation during an entire user session.

  7. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    PubMed Central

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing. PMID:22919273

  8. A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system.

    PubMed

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  9. Evaluation of Refractive Errors and Ocular Biometric Outcomes after Intravitreal Bevacizumab for Retinopathy of Prematurity.

    PubMed

    Gunay, Murat; Sekeroglu, Mehmet Ali; Bardak, Handan; Celik, Gokhan; Esenulku, Cenap Mahmut; Hekimoglu, Emre; Bardak, Yavuz

    2016-06-01

    To assess ocular biometric outcomes following intravitreal bevacizumab (IVB) monotherapy for retinopathy of prematurity (ROP) and compare these results with those of laser photocoagulated infants and with the ones with spontaneously regressed ROP. Premature infants including those who underwent IVB monotherapy (Group 1) or laser photocoagulation (Group 2) for ROP and infants with spontaneously regressed ROP (Group 3) were recruited for the study. Refractive errors and ocular biometric parameters (Axial length [AL], anterior chamber depth [ACD], and lens thickness [LT]) were measured at adjusted 1 year of age in all subjects. There was no significant difference of spherical equivalent (SE) value between the groups (P = 0.781). The incidence of high myopia was 7.4% in Group 1 and 12.7% in Group 2 (P = 0.081). No infants exhibited high myopia in Group 3. LT was greater in Group 2 when compared to Group 1 and Group 3 (P = 0.011). Lower SE was significantly correlated to longer AL in Group 1 (r = -0.656, P = 0.015). There was a significant positive correlation between SE and ACD values in Group 2 (r = 0.391, P = 0.005). The study showed no significant difference of SE between the groups. High myopia was only present among the treated infants either with IVB or laser. Infants who received laser treatment significantly had thicker lenses.

  10. 8 CFR 103.17 - Biometric service fee.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.17 Biometric service... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Biometric service fee. 103.17 Section 103... biometric information at a DHS office, other designated collection site overseas, or a registered State or...

  11. 8 CFR 103.16 - Collection, use and storage of biometric information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.16 Collection, use and storage of biometric information. (a) Use of biometric information. Any... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Collection, use and storage of biometric...

  12. 8 CFR 103.16 - Collection, use and storage of biometric information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.16 Collection, use and storage of biometric information. (a) Use of biometric information. Any... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Collection, use and storage of biometric...

  13. 8 CFR 103.16 - Collection, use and storage of biometric information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.16 Collection, use and storage of biometric information. (a) Use of biometric information. Any... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Collection, use and storage of biometric...

  14. 8 CFR 103.17 - Biometric service fee.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.17 Biometric service... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Biometric service fee. 103.17 Section 103... biometric information at a DHS office, other designated collection site overseas, or a registered State or...

  15. 8 CFR 103.17 - Biometric service fee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Biometric Requirements § 103.17 Biometric service... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Biometric service fee. 103.17 Section 103... biometric information at a DHS office, other designated collection site overseas, or a registered State or...

  16. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...

  17. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...

  18. 3D Biometrics for Hindfoot Alignment Using Weightbearing CT.

    PubMed

    Lintz, François; Welck, Matthew; Bernasconi, Alessio; Thornton, James; Cullen, Nicholas P; Singh, Dishan; Goldberg, Andy

    2017-06-01

    Hindfoot alignment on 2D radiographs can present anatomical and operator-related bias. In this study, software designed for weightbearing computed tomography (WBCT) was used to calculate a new 3D biometric tool: the Foot and Ankle Offset (FAO). We described the distribution of FAO in a series of data sets from clinically normal, varus, and valgus cases, hypothesizing that FAO values would be significantly different in the 3 groups. In this retrospective cohort study, 135 data sets (57 normal, 38 varus, 40 valgus) from WBCT (PedCAT; CurveBeam LLC, Warrington, PA) were obtained from a specialized foot and ankle unit. 3D coordinates of specific anatomical landmarks (weightbearing points of the calcaneus, of the first and fifth metatarsal heads and the highest and centermost point on the talar dome) were collected. These data were processed with the TALAS system (CurveBeam), which resulted in an FAO value for each case. Intraobserver and interobserver reliability were also assessed. In normal cases, the mean value for FAO was 2.3% ± 2.9%, whereas in varus and valgus cases, the mean was -11.6% ± 6.9% and 11.4% ± 5.7%, respectively, with a statistically significant difference among groups ( P < .001). The distribution of the normal population was Gaussian. The inter- and intraobserver reliability were 0.99 +/- 0.00 and 0.97 +/-0.02 Conclusions: This pilot study suggests that the FAO is an efficient tool for measuring hindfoot alignment using WBCT. Previously published research in this field has looked at WBCT by adapting 2D biometrics. The present study introduces the concept of 3D biometrics and describes an efficient, semiautomatic tool for measuring hindfoot alignment. Level III, retrospective comparative study.

  19. Method to assess the temporal persistence of potential biometric features: Application to oculomotor, gait, face and brain structure databases

    PubMed Central

    Nixon, Mark S.; Komogortsev, Oleg V.

    2017-01-01

    We introduce the intraclass correlation coefficient (ICC) to the biometric community as an index of the temporal persistence, or stability, of a single biometric feature. It requires, as input, a feature on an interval or ratio scale, and which is reasonably normally distributed, and it can only be calculated if each subject is tested on 2 or more occasions. For a biometric system, with multiple features available for selection, the ICC can be used to measure the relative stability of each feature. We show, for 14 distinct data sets (1 synthetic, 8 eye-movement-related, 2 gait-related, and 2 face-recognition-related, and one brain-structure-related), that selecting the most stable features, based on the ICC, resulted in the best biometric performance generally. Analyses based on using only the most stable features produced superior Rank-1-Identification Rate (Rank-1-IR) performance in 12 of 14 databases (p = 0.0065, one-tailed), when compared to other sets of features, including the set of all features. For Equal Error Rate (EER), using a subset of only high-ICC features also produced superior performance in 12 of 14 databases (p = 0. 0065, one-tailed). In general, then, for our databases, prescreening potential biometric features, and choosing only highly reliable features yields better performance than choosing lower ICC features or than choosing all features combined. We also determined that, as the ICC of a group of features increases, the median of the genuine similarity score distribution increases and the spread of this distribution decreases. There was no statistically significant similar relationships for the impostor distributions. We believe that the ICC will find many uses in biometric research. In case of the eye movement-driven biometrics, the use of reliable features, as measured by ICC, allowed to us achieve the authentication performance with EER = 2.01%, which was not possible before. PMID:28575030

  20. Method to assess the temporal persistence of potential biometric features: Application to oculomotor, gait, face and brain structure databases.

    PubMed

    Friedman, Lee; Nixon, Mark S; Komogortsev, Oleg V

    2017-01-01

    We introduce the intraclass correlation coefficient (ICC) to the biometric community as an index of the temporal persistence, or stability, of a single biometric feature. It requires, as input, a feature on an interval or ratio scale, and which is reasonably normally distributed, and it can only be calculated if each subject is tested on 2 or more occasions. For a biometric system, with multiple features available for selection, the ICC can be used to measure the relative stability of each feature. We show, for 14 distinct data sets (1 synthetic, 8 eye-movement-related, 2 gait-related, and 2 face-recognition-related, and one brain-structure-related), that selecting the most stable features, based on the ICC, resulted in the best biometric performance generally. Analyses based on using only the most stable features produced superior Rank-1-Identification Rate (Rank-1-IR) performance in 12 of 14 databases (p = 0.0065, one-tailed), when compared to other sets of features, including the set of all features. For Equal Error Rate (EER), using a subset of only high-ICC features also produced superior performance in 12 of 14 databases (p = 0. 0065, one-tailed). In general, then, for our databases, prescreening potential biometric features, and choosing only highly reliable features yields better performance than choosing lower ICC features or than choosing all features combined. We also determined that, as the ICC of a group of features increases, the median of the genuine similarity score distribution increases and the spread of this distribution decreases. There was no statistically significant similar relationships for the impostor distributions. We believe that the ICC will find many uses in biometric research. In case of the eye movement-driven biometrics, the use of reliable features, as measured by ICC, allowed to us achieve the authentication performance with EER = 2.01%, which was not possible before.

  1. Recent Self-Reported Cannabis Use Is Associated With the Biometrics of Delta-9-Tetrahydrocannabinol.

    PubMed

    Smith, Matthew J; Alden, Eva C; Herrold, Amy A; Roberts, Andrea; Stern, Dan; Jones, Joseph; Barnes, Allan; O'Connor, Kailyn P; Huestis, Marilyn A; Breiter, Hans C

    2018-05-01

    Research typically characterizes cannabis use by self-report of cannabis intake frequency. In an effort to better understand relationships between measures of cannabis use, we evaluated if Δ-9-tetrahydrocannabinol (THC) and metabolite concentrations (biometrics) were associated with a calibrated timeline followback (TLFB) assessment of cannabis use. Participants were 35 young adult male cannabis users who completed a calibrated TLFB measure of cannabis use over the past 30 days, including time of last use. The calibration required participants handling four plastic bags of a cannabis substitute (0.25, 0.5, 1.0, and 3.5 grams) to quantify cannabis consumed. Participants provided blood and urine samples for analysis of THC and metabolites, at two independent laboratories. Participants abstained from cannabis use on the day of sample collection. We tested Pearson correlations between the calibrated TLFB measures and cannabis biometrics. Strong correlations were seen between urine and blood biometrics (all r > .73, all p < .001). TLFB measures of times of use and grams of cannabis consumed were significantly related to each biometric, including urine 11-nor-9-carboxy-Δ9-tetrahydrocannabinol (THCCOOH) and blood THC, 11-hydroxy-THC (11-OH-THC), THCCOOH, THCCOOH-glucuronide (times of use: r > .48-.61, all p < .05; grams: r > .40-.49, all p < .05). This study extends prior work to show TLFB methods significantly relate to an extended array of cannabis biometrics. The calibration of cannabis intake in grams was associated with each biometric, although the simple TLFB measure of times of use produced the strongest relationships with all five biometrics. These findings suggest that combined self-report and biometric data together convey the complexity of cannabis use, but allow that either the use of calibrated TLFB measures or biometrics may be sufficient for assessment of cannabis use in research.

  2. Atmospheric turbulence and sensor system effects on biometric algorithm performance

    NASA Astrophysics Data System (ADS)

    Espinola, Richard L.; Leonard, Kevin R.; Byrd, Kenneth A.; Potvin, Guy

    2015-05-01

    Biometric technologies composed of electro-optical/infrared (EO/IR) sensor systems and advanced matching algorithms are being used in various force protection/security and tactical surveillance applications. To date, most of these sensor systems have been widely used in controlled conditions with varying success (e.g., short range, uniform illumination, cooperative subjects). However the limiting conditions of such systems have yet to be fully studied for long range applications and degraded imaging environments. Biometric technologies used for long range applications will invariably suffer from the effects of atmospheric turbulence degradation. Atmospheric turbulence causes blur, distortion and intensity fluctuations that can severely degrade image quality of electro-optic and thermal imaging systems and, for the case of biometrics technology, translate to poor matching algorithm performance. In this paper, we evaluate the effects of atmospheric turbulence and sensor resolution on biometric matching algorithm performance. We use a subset of the Facial Recognition Technology (FERET) database and a commercial algorithm to analyze facial recognition performance on turbulence degraded facial images. The goal of this work is to understand the feasibility of long-range facial recognition in degraded imaging conditions, and the utility of camera parameter trade studies to enable the design of the next generation biometrics sensor systems.

  3. Analyzing Personalized Policies for Online Biometric Verification

    PubMed Central

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M.

    2014-01-01

    Motivated by India’s nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident’s biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India’s program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India’s biometric program. The mean delay is sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32–41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident. PMID:24787752

  4. Modelling of Biometric Identification System with Given Parameters Using Colored Petri Nets

    NASA Astrophysics Data System (ADS)

    Petrosyan, G.; Ter-Vardanyan, L.; Gaboutchian, A.

    2017-05-01

    Biometric identification systems use given parameters and function on the basis of Colored Petri Nets as a modelling language developed for systems in which communication, synchronization and distributed resources play an important role. Colored Petri Nets combine the strengths of Classical Petri Nets with the power of a high-level programming language. Coloured Petri Nets have both, formal intuitive and graphical presentations. Graphical CPN model consists of a set of interacting modules which include a network of places, transitions and arcs. Mathematical representation has a well-defined syntax and semantics, as well as defines system behavioural properties. One of the best known features used in biometric is the human finger print pattern. During the last decade other human features have become of interest, such as iris-based or face recognition. The objective of this paper is to introduce the fundamental concepts of Petri Nets in relation to tooth shape analysis. Biometric identification systems functioning has two phases: data enrollment phase and identification phase. During the data enrollment phase images of teeth are added to database. This record contains enrollment data as a noisy version of the biometrical data corresponding to the individual. During the identification phase an unknown individual is observed again and is compared to the enrollment data in the database and then system estimates the individual. The purpose of modeling biometric identification system by means of Petri Nets is to reveal the following aspects of the functioning model: the efficiency of the model, behavior of the model, mistakes and accidents in the model, feasibility of the model simplification or substitution of its separate components for more effective components without interfering system functioning. The results of biometric identification system modeling and evaluating are presented and discussed.

  5. Analyzing personalized policies for online biometric verification.

    PubMed

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  6. Relation of anthropometric measurements to ocular biometric changes and refractive error in children with thalassemia.

    PubMed

    Elkitkat, Rania S; El-Shazly, Amany A; Ebeid, Weam M; Deghedy, Marwa R

    2018-03-01

    To evaluate and correlate anthropometric, biometric, and refractive error changes in thalassemia major (TM). One hundred children with TM and another hundred healthy controls were recruited. Height, weight, body mass index (BMI), and occipitofrontal circumference (OFC) were the anthropometric parameters recorded. Full ophthalmologic examination was performed, including best-corrected visual acuity, cycloplegic refraction, slit-lamp examination, Goldmann applanation tonometry, indirect ophthalmoscopy, keratometry (K readings), and ocular biometry. Compared to controls, children with TM were shorter and lighter, with a smaller BMI (p<0.001); however, no significant difference existed in OFC. Regarding ocular biometric data, patients with thalassemia had steeper mean K readings (p = 0.03), shorter axial length (AXL) (p = 0.005), shorter vitreous chamber depth (p<0.001), and thicker crystalline lens (p<0.001) than controls. Patients with thalassemia had a significant myopic shift (p = 0.003). Multiple regression analyses only showed a significant correlation between corneal astigmatism and both weight and height (β = -0.05 and p = 0.03 and β = 0.06 and p = 0.04, respectively). Spherical equivalent was significantly correlated to K readings, lens thickness, and anterior chamber depth (p<0.0001 for all parameters). Compared to controls, children with TM have significant retardation in general and ocular growth (smaller BMI and shorter AXL). Ocular growth changes probably resulted in compensatory biometric changes (steeper corneas and thicker lenses) to reach emmetropization, with an exaggerated response and subsequent myopic shift. However, growth retardation is not directly related to ocular growth changes, myopic shift, or variations in biometric parameters.

  7. A novel approach to transformed biometrics using successive projections

    NASA Astrophysics Data System (ADS)

    Gopi, E. S.

    2010-02-01

    Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.

  8. Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.

    PubMed

    Sidek, Khairul Azami; Khalil, Ibrahim

    2013-01-01

    Electrocardiogram (ECG) based biometric matching suffers from high misclassification error with lower sampling frequency data. This situation may lead to an unreliable and vulnerable identity authentication process in high security applications. In this paper, quality enhancement techniques for ECG data with low sampling frequency has been proposed for person identification based on piecewise cubic Hermite interpolation (PCHIP) and piecewise cubic spline interpolation (SPLINE). A total of 70 ECG recordings from 4 different public ECG databases with 2 different sampling frequencies were applied for development and performance comparison purposes. An analytical method was used for feature extraction. The ECG recordings were segmented into two parts: the enrolment and recognition datasets. Three biometric matching methods, namely, Cross Correlation (CC), Percent Root-Mean-Square Deviation (PRD) and Wavelet Distance Measurement (WDM) were used for performance evaluation before and after applying interpolation techniques. Results of the experiments suggest that biometric matching with interpolated ECG data on average achieved higher matching percentage value of up to 4% for CC, 3% for PRD and 94% for WDM. These results are compared with the existing method when using ECG recordings with lower sampling frequency. Moreover, increasing the sample size from 56 to 70 subjects improves the results of the experiment by 4% for CC, 14.6% for PRD and 0.3% for WDM. Furthermore, higher classification accuracy of up to 99.1% for PCHIP and 99.2% for SPLINE with interpolated ECG data as compared of up to 97.2% without interpolation ECG data verifies the study claim that applying interpolation techniques enhances the quality of the ECG data. Crown Copyright © 2012. Published by Elsevier Ireland Ltd. All rights reserved.

  9. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  10. 76 FR 72400 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... developed biometric information systems capable of collecting and storing biometric images, associated biographic and contextual information; matching biometrics against local and external biometric galleries; displaying the results of the biometric searches; and as appropriate issuing credentials that contains the...

  11. The efficiency of aspheric intraocular lens according to biometric measurements.

    PubMed

    Whang, Woong-Joo; Piao, Junjie; Yoo, Young-Sik; Joo, Choun-Ki; Yoon, Geunyoung

    2017-01-01

    To analyze internal spherical aberration in pseudophakic eyes that underwent aspheric intraocular lens (IOL) implantation, and to investigate the relationships between biometric data and the effectiveness of aspheric IOL implantation. This retrospective study included 40 eyes of 40 patients who underwent implantation of an IOL having a negative spherical aberration of -0.20 μm (CT ASPHINA 509M; Carl Zeiss Meditec Inc., Germany). The IOLMaster (version 5.0; Carl Zeiss AG, Germany) was used for preoperative biometric measurements (axial length, anterior chamber depth, central corneal power) and the measurement of postoperative anterior chamber depth. The spherical aberrations were measured preoperatively and 3 months postoperatively using the iTrace (Tracey Technologies, Houston, TX, USA) at a pupil diameter of 5.0 mm. We investigated the relationships between preoperative biometric data and postoperative internal spherical aberration, and compared biometric measurements between 2 subgroups stratified according to internal spherical aberration (spherical aberration ≤ -0.06 μm vs. spherical aberration > -0.06 μm). The mean postoperative internal spherical aberration was -0.087 ± 0.063 μm. Preoperative axial length and residual total spherical aberration showed statistically significant correlations with internal spherical aberration (p = 0.041, 0.002). Preoperative axial length, postoperative anterior chamber depth, IOL power, and residual spherical aberration showed significant differences between the 2 subgroups stratified according to internal spherical aberration (p = 0.020, 0.029, 0.048, 0.041 respectively). The corrective effect of an aspheric IOL is influenced by preoperative axial length and postoperative anterior chamber depth. Not only the amount of negative spherical aberration on the IOL surface but also the preoperative axial length should be considered to optimize spherical aberration after aspheric IOL implantation.

  12. Astigmatism and biometric optic components of diode laser-treated threshold retinopathy of prematurity at 9 years of age

    PubMed Central

    Yang, C-S; Wang, A-G; Shih, Y-F; Hsu, W-M

    2013-01-01

    Purpose To assess the prevalence of astigmatism and its relationship with biometric optic components in preterm school children with diode laser-treated threshold retinopathy of prematurity (ROP). Methods A prospective, cross-sectional study in which cycloplegic keratometry, refraction, and ultrasound biometric measurement of optic components were performed on 24 consecutive preterm children with diode laser-treated threshold ROP at the age of 9 years. The study results were compared with data on 1021 age-matched full-term control children from a national survey. Results The laser-treated eyes had a mean astigmatism of 3.47 D, with a mean spherical equivalent of −4.49 D. Of the 46 eyes studied, 98% of eyes showed astigmatism ≥0.5 D and 50% had high astigmatism (>3.0 D). Most astigmatic eyes (97.7%) showed with-the-rule astigmatism, with the mean plus cylinder axis at 89.30o. Further correlation analysis showed the astigmatism in refraction was highly correlated with the corneal astigmatism (r=0.921, P<0.001) and the vertical corneal curvature (r=0.405, P=0.005). There was significantly steeper vertical corneal curvature (P=0.003) and flatter horizontal corneal curvature (P=0.031) in eyes with laser-treated ROP when compared with age-matched full-term controls. The eyes with laser-treated ROP also show significantly thicker lens (3.93 mm) and shallower anterior chamber depth (ACD; 2.92 mm) than full-term controls (P<0.001). Conclusions There is significantly higher prevalence and greater magnitude of astigmatism in eyes with laser-treated threshold ROP compared with full-term controls. The steeper vertical corneal curvature component contributes to the increased astigmatism in eyes with laser-treated ROP. PMID:23222565

  13. A multibiometric face recognition fusion framework with template protection

    NASA Astrophysics Data System (ADS)

    Chindaro, S.; Deravi, F.; Zhou, Z.; Ng, M. W. R.; Castro Neves, M.; Zhou, X.; Kelkboom, E.

    2010-04-01

    In this work we present a multibiometric face recognition framework based on combining information from 2D with 3D facial features. The 3D biometrics channel is protected by a privacy enhancing technology, which uses error correcting codes and cryptographic primitives to safeguard the privacy of the users of the biometric system at the same time enabling accurate matching through fusion with 2D. Experiments are conducted to compare the matching performance of such multibiometric systems with the individual biometric channels working alone and with unprotected multibiometric systems. The results show that the proposed hybrid system incorporating template protection, match and in some cases exceed the performance of corresponding unprotected equivalents, in addition to offering the additional privacy protection.

  14. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    PubMed

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  15. Can soft biometric traits assist user recognition?

    NASA Astrophysics Data System (ADS)

    Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik

    2004-08-01

    Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.

  16. Ocular growth in the fetus. 1. Comparative study of axial length and biometric parameters in the fetus.

    PubMed

    Denis, D; Righini, M; Scheiner, C; Volot, F; Boubli, L; Dezard, X; Vola, J; Saracco, J B

    1993-01-01

    The knowledge of ocular growth during fetal life, when compared with other fetal biometric parameters, could not only provide a better definition of malformation syndromes but could also give a better understanding of certain pathological processes in premature babies and in newborns. As the literature concerning prenatal ocular dimensions contains few data, the aim of this study was to measure the axial length of the globe (AL) in fetuses and compare this measurement with their gestational age, weight, height, head circumference (HC) and thoracic circumference (TC) in order to compile a reference table. In the present study, 76 globes from 38 fetuses (18-41 weeks gestational age) from the Department of Pathology (Timone University Hospital, Marseille) were examined. Ultrasonography A and B were used to measure the AL, and a pathological examination determined fetal weight, HC, TC and height. We were interested to find out which of the parameters studied would give the best correlation with ocular growth. Statistical analysis showed that HC remained the most discriminant factor and correlated best with ocular growth. We thus obtained an equation for ocular size according to HC that could serve as a basis for detecting pre- or postnatal ocular defects.

  17. A survey of keystroke dynamics biometrics.

    PubMed

    Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  18. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    PubMed Central

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  19. Mark-recapture with multiple, non-invasive marks.

    PubMed

    Bonner, Simon J; Holmberg, Jason

    2013-09-01

    Non-invasive marks, including pigmentation patterns, acquired scars, and genetic markers, are often used to identify individuals in mark-recapture experiments. If animals in a population can be identified from multiple, non-invasive marks then some individuals may be counted twice in the observed data. Analyzing the observed histories without accounting for these errors will provide incorrect inference about the population dynamics. Previous approaches to this problem include modeling data from only one mark and combining estimators obtained from each mark separately assuming that they are independent. Motivated by the analysis of data from the ECOCEAN online whale shark (Rhincodon typus) catalog, we describe a Bayesian method to analyze data from multiple, non-invasive marks that is based on the latent-multinomial model of Link et al. (2010, Biometrics 66, 178-185). Further to this, we describe a simplification of the Markov chain Monte Carlo algorithm of Link et al. (2010, Biometrics 66, 178-185) that leads to more efficient computation. We present results from the analysis of the ECOCEAN whale shark data and from simulation studies comparing our method with the previous approaches. © 2013, The International Biometric Society.

  20. Improving Speaker Recognition by Biometric Voice Deconstruction

    PubMed Central

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  1. Lightweight Biometric Sensing for Walker Classification Using Narrowband RF Links

    PubMed Central

    Liang, Zhuo-qian

    2017-01-01

    This article proposes a lightweight biometric sensing system using ubiquitous narrowband radio frequency (RF) links for path-dependent walker classification. The fluctuated received signal strength (RSS) sequence generated by human motion is used for feature representation. To capture the most discriminative characteristics of individuals, a three-layer RF sensing network is organized for building multiple sampling links at the most common heights of upper limbs, thighs, and lower legs. The optimal parameters of sensing configuration, such as the height of link location and number of fused links, are investigated to improve sensory data distinctions among subjects, and the experimental results suggest that the synergistic sensing by using multiple links can contribute a better performance. This is the new consideration of using RF links in building a biometric sensing system. In addition, two types of classification methods involving vector quantization (VQ) and hidden Markov models (HMMs) are developed and compared for closed-set walker recognition and verification. Experimental studies in indoor line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios are conducted to validate the proposed method. PMID:29206188

  2. Lightweight Biometric Sensing for Walker Classification Using Narrowband RF Links.

    PubMed

    Liu, Tong; Liang, Zhuo-Qian

    2017-12-05

    This article proposes a lightweight biometric sensing system using ubiquitous narrowband radio frequency (RF) links for path-dependent walker classification. The fluctuated received signal strength (RSS) sequence generated by human motion is used for feature representation. To capture the most discriminative characteristics of individuals, a three-layer RF sensing network is organized for building multiple sampling links at the most common heights of upper limbs, thighs, and lower legs. The optimal parameters of sensing configuration, such as the height of link location and number of fused links, are investigated to improve sensory data distinctions among subjects, and the experimental results suggest that the synergistic sensing by using multiple links can contribute a better performance. This is the new consideration of using RF links in building a biometric sensing system. In addition, two types of classification methods involving vector quantization (VQ) and hidden Markov models (HMMs) are developed and compared for closed-set walker recognition and verification. Experimental studies in indoor line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios are conducted to validate the proposed method.

  3. Improving Speaker Recognition by Biometric Voice Deconstruction.

    PubMed

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  4. Comparative Performance Analysis of Different Fingerprint Biometric Scanners for Patient Matching.

    PubMed

    Kasiiti, Noah; Wawira, Judy; Purkayastha, Saptarshi; Were, Martin C

    2017-01-01

    Unique patient identification within health services is an operational challenge in healthcare settings. Use of key identifiers, such as patient names, hospital identification numbers, national ID, and birth date are often inadequate for ensuring unique patient identification. In addition approximate string comparator algorithms, such as distance-based algorithms, have proven suboptimal for improving patient matching, especially in low-resource settings. Biometric approaches may improve unique patient identification. However, before implementing the technology in a given setting, such as health care, the right scanners should be rigorously tested to identify an optimal package for the implementation. This study aimed to investigate the effects of factors such as resolution, template size, and scan capture area on the matching performance of different fingerprint scanners for use within health care settings. Performance analysis of eight different scanners was tested using the demo application distributed as part of the Neurotech Verifinger SDK 6.0.

  5. Methods for using a biometric parameter in the identification of persons

    DOEpatents

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  6. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... biometric as described in § 1311.115, it must comply with the following requirements. (b) The biometric subsystem must operate at a false match rate of 0.001 or lower. (c) The biometric subsystem must use... paragraph (h) of this section. (d) The biometric subsystem must conform to Personal Identity Verification...

  7. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... biometric as described in § 1311.115, it must comply with the following requirements. (b) The biometric subsystem must operate at a false match rate of 0.001 or lower. (c) The biometric subsystem must use... paragraph (h) of this section. (d) The biometric subsystem must conform to Personal Identity Verification...

  8. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    NASA Astrophysics Data System (ADS)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  9. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  10. Hand biometric recognition based on fused hand geometry and vascular patterns.

    PubMed

    Park, GiTae; Kim, Soowon

    2013-02-28

    A hand biometric authentication method based on measurements of the user's hand geometry and vascular pattern is proposed. To acquire the hand geometry, the thickness of the side view of the hand, the K-curvature with a hand-shaped chain code, the lengths and angles of the finger valleys, and the lengths and profiles of the fingers were used, and for the vascular pattern, the direction-based vascular-pattern extraction method was used, and thus, a new multimodal biometric approach is proposed. The proposed multimodal biometric system uses only one image to extract the feature points. This system can be configured for low-cost devices. Our multimodal biometric-approach hand-geometry (the side view of the hand and the back of hand) and vascular-pattern recognition method performs at the score level. The results of our study showed that the equal error rate of the proposed system was 0.06%.

  11. Hand Biometric Recognition Based on Fused Hand Geometry and Vascular Patterns

    PubMed Central

    Park, GiTae; Kim, Soowon

    2013-01-01

    A hand biometric authentication method based on measurements of the user's hand geometry and vascular pattern is proposed. To acquire the hand geometry, the thickness of the side view of the hand, the K-curvature with a hand-shaped chain code, the lengths and angles of the finger valleys, and the lengths and profiles of the fingers were used, and for the vascular pattern, the direction-based vascular-pattern extraction method was used, and thus, a new multimodal biometric approach is proposed. The proposed multimodal biometric system uses only one image to extract the feature points. This system can be configured for low-cost devices. Our multimodal biometric-approach hand-geometry (the side view of the hand and the back of hand) and vascular-pattern recognition method performs at the score level. The results of our study showed that the equal error rate of the proposed system was 0.06%. PMID:23449119

  12. A novel biometric authentication approach using ECG and EMG signals.

    PubMed

    Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi

    2015-05-01

    Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication.

  13. Heritability of refractive error and ocular biometrics: the Genes in Myopia (GEM) twin study.

    PubMed

    Dirani, Mohamed; Chamberlain, Matthew; Shekar, Sri N; Islam, Amirul F M; Garoufalis, Pam; Chen, Christine Y; Guymer, Robyn H; Baird, Paul N

    2006-11-01

    A classic twin study was undertaken to assess the contribution of genes and environment to the development of refractive errors and ocular biometrics in a twin population. A total of 1224 twins (345 monozygotic [MZ] and 267 dizygotic [DZ] twin pairs) aged between 18 and 88 years were examined. All twins completed a questionnaire consisting of a medical history, education, and zygosity. Objective refraction was measured in all twins, and biometric measurements were obtained using partial coherence interferometry. Intrapair correlations for spherical equivalent and ocular biometrics were significantly higher in the MZ than in the DZ twin pairs (P < 0.05), when refraction was considered as a continuous variable. A significant gender difference in the variation of spherical equivalent and ocular biometrics was found (P < 0.05). A genetic model specifying an additive, dominant, and unique environmental factor that was sex limited was the best fit for all measured variables. Heritability of spherical equivalents of 88% and 75% were found in the men and women, respectively, whereas, that of axial length was 94% and 92%, respectively. Additive genetic effects accounted for a greater proportion of the variance in spherical equivalent, whereas the variance in ocular biometrics, particularly axial length was explained mostly by dominant genetic effects. Genetic factors, both additive and dominant, play a significant role in refractive error (myopia and hypermetropia) as well as in ocular biometrics, particularly axial length. The sex limitation ADE model (additive genetic, nonadditive genetic, and environmental components) provided the best-fit genetic model for all parameters.

  14. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  15. A Survey of Keystroke Dynamics Biometrics

    PubMed Central

    Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions. PMID:24298216

  16. Biometric recognition using 3D ear shape.

    PubMed

    Yan, Ping; Bowyer, Kevin W

    2007-08-01

    Previous works have shown that the ear is a promising candidate for biometric identification. However, in prior work, the preprocessing of ear images has had manual steps and algorithms have not necessarily handled problems caused by hair and earrings. We present a complete system for ear biometrics, including automated segmentation of the ear in a profile view image and 3D shape matching for recognition. We evaluated this system with the largest experimental study to date in ear biometrics, achieving a rank-one recognition rate of 97.8 percent for an identification scenario and an equal error rate of 1.2 percent for a verification scenario on a database of 415 subjects and 1,386 total probes.

  17. OTM Machine Acceptance: In the Arab Culture

    NASA Astrophysics Data System (ADS)

    Rashed, Abdullah; Santos, Henrique

    Basically, neglecting the human factor is one of the main reasons for system failures or for technology rejection, even when important technologies are considered. Biometrics mostly have the characteristics needed for effortless acceptance, such as easiness and usefulness, that are essential pillars of acceptance models such as TAM (technology acceptance model). However, it should be investigated. Many studies have been carried out to research the issues of technology acceptance in different cultures, especially the western culture. Arabic culture lacks these types of studies with few publications in this field. This paper introduces a new biometric interface for ATM machines. This interface depends on a promising biometrics which is odour. To discover the acceptance of this biometrics, we distributed a questionnaire via a web site and called for participation in the Arab Area and found that most respondents would accept to use odour.

  18. Ear biometrics for patient identification in global health: a cross-sectional study to test the feasibility of a simplified algorithm.

    PubMed

    Ragan, Elizabeth J; Johnson, Courtney; Milton, Jacqueline N; Gill, Christopher J

    2016-11-02

    One of the greatest public health challenges in low- and middle-income countries (LMICs) is identifying people over time and space. Recent years have seen an explosion of interest in developing electronic approaches to addressing this problem, with mobile technology at the forefront of these efforts. We investigate the possibility of biometrics as a simple, cost-efficient, and portable solution. Common biometrics approaches include fingerprinting, iris scanning and facial recognition, but all are less than ideal due to complexity, infringement on privacy, cost, or portability. Ear biometrics, however, proved to be a unique and viable solution. We developed an identification algorithm then conducted a cross sectional study in which we photographed left and right ears from 25 consenting adults. We then conducted re-identification and statistical analyses to identify the accuracy and replicability of our approach. Through principal component analysis, we found the curve of the ear helix to be the most reliable anatomical structure and the basis for re-identification. Although an individual ear allowed for high re-identification rate (88.3%), when both left and right ears were paired together, our rate of re-identification amidst the pool of potential matches was 100%. The results of this study have implications on future efforts towards building a biometrics solution for patient identification in LMICs. We provide a conceptual platform for further investigation into the development of an ear biometrics identification mobile application.

  19. Feature Selection for Nonstationary Data: Application to Human Recognition Using Medical Biometrics.

    PubMed

    Komeili, Majid; Louis, Wael; Armanfard, Narges; Hatzinakos, Dimitrios

    2018-05-01

    Electrocardiogram (ECG) and transient evoked otoacoustic emission (TEOAE) are among the physiological signals that have attracted significant interest in biometric community due to their inherent robustness to replay and falsification attacks. However, they are time-dependent signals and this makes them hard to deal with in across-session human recognition scenario where only one session is available for enrollment. This paper presents a novel feature selection method to address this issue. It is based on an auxiliary dataset with multiple sessions where it selects a subset of features that are more persistent across different sessions. It uses local information in terms of sample margins while enforcing an across-session measure. This makes it a perfect fit for aforementioned biometric recognition problem. Comprehensive experiments on ECG and TEOAE variability due to time lapse and body posture are done. Performance of the proposed method is compared against seven state-of-the-art feature selection algorithms as well as another six approaches in the area of ECG and TEOAE biometric recognition. Experimental results demonstrate that the proposed method performs noticeably better than other algorithms.

  20. Secure biometric image sensor and authentication scheme based on compressed sensing.

    PubMed

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  1. Periorbital Biometric Measurements using ImageJ Software: Standardisation of Technique and Assessment Of Intra- and Interobserver Variability

    PubMed Central

    Rajyalakshmi, R.; Prakash, Winston D.; Ali, Mohammad Javed; Naik, Milind N.

    2017-01-01

    Purpose: To assess the reliability and repeatability of periorbital biometric measurements using ImageJ software and to assess if the horizontal visible iris diameter (HVID) serves as a reliable scale for facial measurements. Methods: This study was a prospective, single-blind, comparative study. Two clinicians performed 12 periorbital measurements on 100 standardised face photographs. Each individual’s HVID was determined by Orbscan IIz and used as a scale for measurements using ImageJ software. All measurements were repeated using the ‘average’ HVID of the study population as a measurement scale. Intraclass correlation coefficient (ICC) and Pearson product-moment coefficient were used as statistical tests to analyse the data. Results: The range of ICC for intra- and interobserver variability was 0.79–0.99 and 0.86–0.99, respectively. Test-retest reliability ranged from 0.66–1.0 to 0.77–0.98, respectively. When average HVID of the study population was used as scale, ICC ranged from 0.83 to 0.99, and the test-retest reliability ranged from 0.83 to 0.96 and the measurements correlated well with recordings done with individual Orbscan HVID measurements. Conclusion: Periorbital biometric measurements using ImageJ software are reproducible and repeatable. Average HVID of the population as measured by Orbscan is a reliable scale for facial measurements. PMID:29403183

  2. An Intelligent Fingerprint-Biometric Image Scrambling Scheme

    NASA Astrophysics Data System (ADS)

    Khan, Muhammad Khurram; Zhang, Jiashu

    To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.

  3. Biometric templates selection and update using quality measures

    NASA Astrophysics Data System (ADS)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  4. Tongue prints in biometric authentication: A pilot study

    PubMed Central

    Jeddy, Nadeem; Radhika, T; Nithya, S

    2017-01-01

    Background and Objectives: Biometric authentication is an important process for the identification and verification of individuals for security purposes. There are many biometric systems that are currently in use and also being researched. Tongue print is a new biometric authentication tool that is unique and cannot be easily forged because no two tongue prints are similar. The present study aims to evaluate the common morphological features of the tongue and its variations in males and females. The usefulness of alginate impression and dental cast in obtaining the lingual impression was also evaluated. Materials and Methods: The study sample included twenty participants. The participants were subjected to visual examination following which digital photographs of the dorsal surface of the tongue were taken. Alginate impressions of the tongue were made, and casts were prepared using dental stone. The photographs and the casts were analyzed by two observers separately for the surface morphology including shape, presence or absence of fissures and its pattern of distribution. Three reference points were considered to determine the shape of the tongue. Results: The most common morphological feature on the dorsum of the tongue was the presence of central fissures. Multiple vertical fissures were observed in males whereas single vertical fissure was a common finding in females. The fissures were predominantly shallow in males and deep in females. The tongue was predominantly U shaped in males and females. V-shaped tongue was observed in 25% of females. Conclusion: Tongue prints are useful in biometric authentication. The methodology used in the study is simple, easy and can be adopted by dentists on a regular basis. However, large-scale studies are required to validate the results and also identify other features of the tongue that can be used in forensics and biometric authentication process. PMID:28479712

  5. Tongue prints in biometric authentication: A pilot study.

    PubMed

    Jeddy, Nadeem; Radhika, T; Nithya, S

    2017-01-01

    Biometric authentication is an important process for the identification and verification of individuals for security purposes. There are many biometric systems that are currently in use and also being researched. Tongue print is a new biometric authentication tool that is unique and cannot be easily forged because no two tongue prints are similar. The present study aims to evaluate the common morphological features of the tongue and its variations in males and females. The usefulness of alginate impression and dental cast in obtaining the lingual impression was also evaluated. The study sample included twenty participants. The participants were subjected to visual examination following which digital photographs of the dorsal surface of the tongue were taken. Alginate impressions of the tongue were made, and casts were prepared using dental stone. The photographs and the casts were analyzed by two observers separately for the surface morphology including shape, presence or absence of fissures and its pattern of distribution. Three reference points were considered to determine the shape of the tongue. The most common morphological feature on the dorsum of the tongue was the presence of central fissures. Multiple vertical fissures were observed in males whereas single vertical fissure was a common finding in females. The fissures were predominantly shallow in males and deep in females. The tongue was predominantly U shaped in males and females. V-shaped tongue was observed in 25% of females. Tongue prints are useful in biometric authentication. The methodology used in the study is simple, easy and can be adopted by dentists on a regular basis. However, large-scale studies are required to validate the results and also identify other features of the tongue that can be used in forensics and biometric authentication process.

  6. The Impact of Dermatologist Examination and Biometric Feedback Delivered at the Beach on Skin Cancer Prevention

    PubMed Central

    Emmons, Karen M.; Geller, Alan C.; Puleo, Elaine; Savadatti, Sanghamitra S.; Hu, Stephanie W.; Gorham, Sue; Werchniak, Andrew E.

    2011-01-01

    Background There are limited data on the effectiveness of skin cancer prevention education and early detection programs at beaches. Objectives We evaluate four strategies for addressing skin cancer prevention in beach settings. Methods This prospective study at four beaches included 4 intervention conditions: (1) education only; or education plus (2) biometric feedback; (3) dermatologist skin examination; or (4) biometric feedback and dermatologist skin examination. Outcomes included sun protection behaviors, sunburns, and skin self-exams. Results There was a significant increase in hat wearing, sunscreen use, and a reduction in sunburns in the education plus biometric feedback group (OR = 1.97, 1.94, 1.07 respectively), as well as greater improvements in knowing what to look for in skin-self examinations (OR=1.13); there were no differences in frequency of self-examinations. Skin examinations plus biometric feedback led to greater reductions in sunburns. The dermatologist exams identified atypical moles in 28% of participants. Limitations Inclusion of only one beach per condition, use of self-report data, and a limited intervention period. Conclusions Education and biometric feedback may be more effective than education alone for impacting sun protective attitudes and behaviors in beach-going, high-risk populations. PMID:21163550

  7. CBEFF Common Biometric Exchange File Format

    DTIC Science & Technology

    2001-01-03

    and systems. Points of contact for CBEFF and liaisons to other organizations can be found in Appendix F. 2. Purpose The purpose of CBEFF is...0x40 Signature Dynamics 0x80 Keystroke Dynamics 0x100 Lip Movement 0x200 Thermal Face Image 0x400 Thermal Hand Image 0x800 Gait 0x1000 Body...this process is negligible from the Biometric Objects point of view, unless the process creating the livescan sample to compare against the

  8. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  9. Security analysis for biometric data in ID documents

    NASA Astrophysics Data System (ADS)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  10. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... signatures not based on biometrics. If you use electronic signatures that are not based upon biometrics you...) Electronic signatures based on biometrics. If you use electronic signatures based upon biometrics, they must...

  11. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... signatures not based on biometrics. If you use electronic signatures that are not based upon biometrics you...) Electronic signatures based on biometrics. If you use electronic signatures based upon biometrics, they must...

  12. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... signatures not based on biometrics. If you use electronic signatures that are not based upon biometrics you...) Electronic signatures based on biometrics. If you use electronic signatures based upon biometrics, they must...

  13. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... signatures not based on biometrics. If you use electronic signatures that are not based upon biometrics you...) Electronic signatures based on biometrics. If you use electronic signatures based upon biometrics, they must...

  14. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  15. Hand-Based Biometric Analysis

    NASA Technical Reports Server (NTRS)

    Bebis, George

    2013-01-01

    Hand-based biometric analysis systems and techniques provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an input image. Additionally, the analysis uses re-use of commonly seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  16. An improved biometrics-based authentication scheme for telecare medical information systems.

    PubMed

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  17. Biometric Changes After Trabeculectomy with Contact and Non-contact Biometry.

    PubMed

    Alvani, Azam; Pakravan, Mohammad; Esfandiari, Hamed; Yaseri, Mehdi; Yazdani, Shahin; Ghahari, Elham

    2016-02-01

    To compare biometric changes measured with contact and noncontact methods after mitomycin-C-augmented trabeculectomy. In this prospective study, 31 eyes from 31 glaucoma patients scheduled for primary trabeculectomy were enrolled. Biometric parameters including axial length (AL), anterior chamber depth (ACD), and lens thickness (LT) were measured using contact ultrasound biometry (UD-6000 Ultrasonic A/B scanner biometer; Tomey Corporation, Nagoya, Japan) and a noncontact optical biometry device (Lenstar; Haag-Streit AG, Koeniz, Switzerland). Measurements were taken the day before trabeculectomy and then compared with measurements obtained 3 and 6 months after surgery. The AL and ACD were significantly decreased at 3 and 6 months compared with baseline values taken with each biometry method. There was a significant increase in LT measured by the Lenstar device at the 3- and 6-month follow-up. At both the 3- and 6-month follow-up, the mean AL measurement reduction with the Lenstar device was significantly lower than that of the A-scan ultrasound measurements. The mean ACD changes between the two devices were not significantly different. There is a small but significant decrease in the AL and ACD after trabeculectomy as measured with both the contact and noncontact methods. The amount of AL reduction measured is significantly smaller using the noncontact method, making it the preferable method for intraocular lens power calculation for patients who need cataract surgery combined with or after trabeculectomy. The LT measured by the Lenstar device increased significantly after the operation, which can be an early sign of the progression of cataractous changes after trabeculectomy.

  18. Fusion of footsteps and face biometrics on an unsupervised and uncontrolled environment

    NASA Astrophysics Data System (ADS)

    Vera-Rodriguez, Ruben; Tome, Pedro; Fierrez, Julian; Ortega-Garcia, Javier

    2012-06-01

    This paper reports for the first time experiments on the fusion of footsteps and face on an unsupervised and not controlled environment for person authentication. Footstep recognition is a relatively new biometric based on signals extracted from people walking over floor sensors. The idea of the fusion between footsteps and face starts from the premise that in an area where footstep sensors are installed it is very simple to place a camera to capture also the face of the person that walks over the sensors. This setup may find application in scenarios like ambient assisted living, smart homes, eldercare, or security access. The paper reports a comparative assessment of both biometrics using the same database and experimental protocols. In the experimental work we consider two different applications: smart homes (small group of users with a large set of training data) and security access (larger group of users with a small set of training data) obtaining results of 0.9% and 5.8% EER respectively for the fusion of both modalities. This is a significant performance improvement compared with the results obtained by the individual systems.

  19. Multibiometric Systems: Fusion Strategies and Template Security

    DTIC Science & Technology

    2008-01-01

    Biometric authentication, or simply biometrics, offers a natural and reliable solution to the problem of identity determination by establishing the identity...applications [99]. Therefore, there is no universally best biometric trait and the choice of biometric depends on the nature and requirements of the...result in a significant reduction in the GAR of a biometric system [72,204]. • Non-universality: If every individual in the target population is able

  20. Biometric template revocation

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  1. Ocular Biometrics of Myopic Eyes With Narrow Angles.

    PubMed

    Chong, Gabriel T; Wen, Joanne C; Su, Daniel Hsien-Wen; Stinnett, Sandra; Asrani, Sanjay

    2016-02-01

    The purpose of this study was to compare the ocular biometrics between myopic patients with and without narrow angles. Patients with a stable myopic refraction (myopia worse than -1.00 D spherical equivalent) were prospectively recruited. Angle status was assessed using gonioscopy and biometric measurements were performed using an anterior segment optical coherence tomography and an IOLMaster. A total of 29 patients (58 eyes) were enrolled with 13 patients (26 eyes) classified as having narrow angles and 16 patients (32 eyes) classified as having open angles. Baseline demographics of age, sex, and ethnicity did not differ significantly between the 2 groups. The patients with narrow angles were on average older than those with open angles but the difference did not reach statistical significance (P=0.12). The central anterior chamber depth was significantly less in the eyes with narrow angles (P=0.05). However, the average lens thickness, although greater in the eyes with narrow angles, did not reach statistical significance (P=0.10). Refractive error, axial lengths, and iris thicknesses did not differ significantly between the 2 groups (P=0.32, 0.47, 0.15). Narrow angles can occur in myopic eyes. Routine gonioscopy is therefore recommended for all patients regardless of refractive error.

  2. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.

    PubMed

    Marcel, Sébastien; Millán, José Del R

    2007-04-01

    In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian Mixture Models and Maximum A Posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others.

  3. On the Design of Forgiving Biometric Security Systems

    NASA Astrophysics Data System (ADS)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  4. [Comparative study of the biometric measurements made by immersion and contact techniques].

    PubMed

    Kronbauer, Airton Leite; Kronbauer, Fernando Leite; Kronbauer, Cláudia Leite

    2006-01-01

    To compare clinical biometric findings between measurements of immersion technique and contact technique. Axial length was measured by A-scan in 120 medical examinations in 60 patients with cataract using a non-contact (immersion) and a contact technique in paired-samples by ultrasound. The mean axial length was found to be 23.19 mm (SD 1.32) with the immersion technique and 22.93 mm (SD 1.32) with the contact technique, using the same transducer probe. The difference of 0.255 mm (SD 0.3) was significant at the 0.01 level. The difference should be taken into account when evaluating the accuracy of IOL calculation. The mean standard deviation between recurrent measures in same eye was found to be 0.04 with the immersion technique and 0.19 with the contact technique. The difference of 0.15 was significant at the 0.01 level. The difference should be taken into account when evaluating the accuracy of reproductivity of technique examination. These data provide benchmark information that can be used to monitor clinical practice and to perform others studies.

  5. Biometric and structural ocular manifestations of Marfan syndrome.

    PubMed

    Gehle, Petra; Goergen, Barbara; Pilger, Daniel; Ruokonen, Peter; Robinson, Peter N; Salchow, Daniel J

    2017-01-01

    To study biometric and structural ocular manifestations of Marfan syndrome (MFS). Observational, retrospective, comparative cohort study in a tertiary referral center on 285 MFS patients and 267 controls. Structural and biometric ocular characteristic were compared. MFS eyes were longer (axial length 24.25 ± 1.74 mm versus 23.89 ± 1.31 mm, p < 0.001) and had a flatter cornea than control eyes (mean keratometry 41.78 ± 1.80 diopters (D) versus 43.05 ± 1.51 D, p < 0.001). Corneal astigmatism was greater and the central cornea was thinner in MFS eyes (530.14 ± 41.31 μm versus 547.02 ± 39.18 μm, p < 0.001). MFS eyes were more myopic than control eyes (spherical equivalent -2.16 ± 3.75 D versus -1.17 ± 2.58 D, p < 0.001). Visual acuity was reduced (0.13 ± 0.25 logMAR versus 0.05 ± 0.18 logMAR, p < 0.001) and intraocular pressure was lower in MFS eyes (14.6 ± 3.4 mmHg versus 15.1 ± 3.2 mmHg, p = 0.01). Iris transillumination defects (ITD) were significantly more common in MFS eyes (odds ratio for MFS in the presence of ITD, 3.7). Ectopia lentis (EL) was only present in MFS eyes (33.4%). History of retinal detachment was significantly more common in MFS eyes. Glaucoma was equally common in both groups. ITD and EL are most characteristic findings in MFS. ITD and corneal curvature should be studied as diagnostic criteria for MFS. Visual acuity is reduced in MFS. MFS patients need regular eye exams to identify serious ocular complications.

  6. Biometric and structural ocular manifestations of Marfan syndrome

    PubMed Central

    Gehle, Petra; Goergen, Barbara; Pilger, Daniel; Ruokonen, Peter; Robinson, Peter N.

    2017-01-01

    Background To study biometric and structural ocular manifestations of Marfan syndrome (MFS). Methods Observational, retrospective, comparative cohort study in a tertiary referral center on 285 MFS patients and 267 controls. Structural and biometric ocular characteristic were compared. Results MFS eyes were longer (axial length 24.25 ± 1.74 mm versus 23.89 ± 1.31 mm, p < 0.001) and had a flatter cornea than control eyes (mean keratometry 41.78 ± 1.80 diopters (D) versus 43.05 ± 1.51 D, p < 0.001). Corneal astigmatism was greater and the central cornea was thinner in MFS eyes (530.14 ± 41.31 μm versus 547.02 ± 39.18 μm, p < 0.001). MFS eyes were more myopic than control eyes (spherical equivalent -2.16 ± 3.75 D versus -1.17 ± 2.58 D, p < 0.001). Visual acuity was reduced (0.13 ± 0.25 logMAR versus 0.05 ± 0.18 logMAR, p < 0.001) and intraocular pressure was lower in MFS eyes (14.6 ± 3.4 mmHg versus 15.1 ± 3.2 mmHg, p = 0.01). Iris transillumination defects (ITD) were significantly more common in MFS eyes (odds ratio for MFS in the presence of ITD, 3.7). Ectopia lentis (EL) was only present in MFS eyes (33.4%). History of retinal detachment was significantly more common in MFS eyes. Glaucoma was equally common in both groups. Conclusions ITD and EL are most characteristic findings in MFS. ITD and corneal curvature should be studied as diagnostic criteria for MFS. Visual acuity is reduced in MFS. MFS patients need regular eye exams to identify serious ocular complications. PMID:28931008

  7. Characterization of ocular biometrics and aqueous humor dynamics in primary angle closure suspects.

    PubMed

    Guo, Li; Deng, Yuan; Fang, Li; Liu, Chaoqi; Guo, Tao

    2017-02-01

    Detailed characterizations of ocular biometrics and parameters of aqueous humor dynamics are lacking in primary angle closure suspect (PACS) patients. This study aims to characterize these parameters and compare them with age-matched healthy volunteers.Elderly healthy volunteers (60.6 ± 7.2 years of age, mean ± SD, n = 28) and PACS patients (64.1 ± 11.6 years, n = 30) completed the study. Parameters investigated were axial length (AXL), anterior chamber depth (ACD), anterior chamber volume (ACV), central cornea thickness (CCT), intraocular pressure (IOP), aqueous flow (Fa), outflow facility (C), episcleral venous pressure (EVP), and uveoscleral outflow (Fu). Comparisons and correlations were made between and within groups.In healthy volunteers, ocular biometric parameters, IOP, and EVP correlated very well between the 2 eyes of each individual, but Fa, C, and Fu were not significantly correlated. Biometric parameters of the PACS group significantly (P < 0.001) differed from those of the healthy controls: AXL (23.31 ± 1.03 mm [PACS] vs 22.39 ± 1.04 mm [Control]; mean ± SD), ACD (2.44 ± 0.33 mm [PACS] vs 1.86 ± 0.25 mm [Control]), ACV (136.0 ± 36.1 μL [PACS] vs 81.4 ± 21.8 μL [Control]), CCT (526.9 ± 37.0 μm [PACS] vs 556.1 ± 28.4 μm [Control]). There was no significant change in IOP, Fa, C, EVP, or Fu between Control and PACS. Furthermore, IOP showed no significant correlations with AXL, ACD, ACV, CCT, or C in both groups.The PACS eyes had a shorter AXL, a shallower ACD, and a smaller ACV, but a thicker CCT. Despite these morphological changes, the PACS eyes did not have any significant changes in IOP, and aqueous humor dynamics parameters. This is consistent with the findings that IOP did not show significant correlations with biometrics, or C.

  8. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    PubMed Central

    Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.

    2011-01-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485

  9. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    PubMed

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  10. Reader Reaction On the generalized Kruskal-Wallis test for genetic association studies incorporating group uncertainty

    PubMed Central

    Wu, Baolin; Guan, Weihua

    2015-01-01

    Summary Acar and Sun (2013, Biometrics, 69, 427-435) presented a generalized Kruskal-Wallis (GKW) test for genetic association studies that incorporated the genotype uncertainty and showed its robust and competitive performance compared to existing methods. We present another interesting way to derive the GKW test via a rank linear model. PMID:25351417

  11. Biometric assessment of prostate cancer's metastatic potential.

    PubMed

    Cooper, C R; Emmett, N; Harris-Hooker, S; Patterson, R; Cooke, D B

    1994-01-01

    Currently, no protocol exists that can assess the metastatic potential of prostate adenocarcinoma. The reason for this is partly due to the lack of information on cellular changes that result in a tumor cell's becoming metastatic. In this investigation, attempts were made to devise a method that correlated with the metastatic potential of AT-1, Mat-Lu, and Mat-LyLu cell lines of the Dunning R-3327 rat prostatic adenocarcinoma system. To accomplish this, we applied BioQuant biometric parameters, i.e., area, shape factor, and cell motility. AT-1 had a lower shape factor and a greater area as compared with the more highly metastatic Mat-Lu subline. No significant difference in area or shape factor was detected between the AT-1 cell line and the highly metastatic Mat-LyLu line. However, the lowly metastatic AT-1 line had less motility as compared with the Mat-Lu and Mat-LyLu lines. This study revealed that metastatic potential could be partially predicted via area and shape factor and accurately predicted via cell motility.

  12. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    NASA Astrophysics Data System (ADS)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  13. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  14. Societal and ethical implications of anti-spoofing technologies in biometrics.

    PubMed

    Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia

    2014-03-01

    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.

  15. Combining Cryptography with EEG Biometrics

    PubMed Central

    Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  16. Combining Cryptography with EEG Biometrics.

    PubMed

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  17. The link between national security and biometrics

    NASA Astrophysics Data System (ADS)

    Etter, Delores M.

    2005-03-01

    National security today requires identification of people, things and activities. Biometrics plays an important role in the identification of people, and indirectly, in the identification of things and activities. Therefore, the development of technology and systems that provide faster and more accurate biometric identification is critical to the defense of our country. In addition, the development of a broad range of biometrics is necessary to provide the range of options needed to address flexible and adaptive adversaries. This paper will discuss the importance of a number of critical areas in the development of an environment to support biometrics, including research and development, biometric education, standards, pilot projects, and privacy assurance.

  18. Biometric identification: a holistic perspective

    NASA Astrophysics Data System (ADS)

    Nadel, Lawrence D.

    2007-04-01

    Significant advances continue to be made in biometric technology. However, the global war on terrorism and our increasingly electronic society have created the societal need for large-scale, interoperable biometric capabilities that challenge the capabilities of current off-the-shelf technology. At the same time, there are concerns that large-scale implementation of biometrics will infringe our civil liberties and offer increased opportunities for identity theft. This paper looks beyond the basic science and engineering of biometric sensors and fundamental matching algorithms and offers approaches for achieving greater performance and acceptability of applications enabled with currently available biometric technologies. The discussion focuses on three primary biometric system aspects: performance and scalability, interoperability, and cost benefit. Significant improvements in system performance and scalability can be achieved through careful consideration of the following elements: biometric data quality, human factors, operational environment, workflow, multibiometric fusion, and integrated performance modeling. Application interoperability hinges upon some of the factors noted above as well as adherence to interface, data, and performance standards. However, there are times when the price of conforming to such standards can be decreased local system performance. The development of biometric performance-based cost benefit models can help determine realistic requirements and acceptable designs.

  19. 75 FR 39323 - Amendment to the Biometric Visa Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF STATE [Public Notice: 7047] Amendment to the Biometric Visa Program AGENCY: Department of State. ACTION: Notice of Amendment to the Biometric Visa Program. This public notice announces an amendment to the Biometric Visa Program. Section 303 of the Enhanced Border Security and Visa...

  20. Bridging the gap: from biometrics to forensics.

    PubMed

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  1. Multi-factor challenge/response approach for remote biometric authentication

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  2. Bridging the gap: from biometrics to forensics

    PubMed Central

    Jain, Anil K.; Ross, Arun

    2015-01-01

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. PMID:26101280

  3. Bat wing biometrics: using collagen-elastin bundles in bat wings as a unique individual identifier.

    PubMed

    Amelon, Sybill K; Hooper, Sarah E; Womack, Kathryn M

    2017-05-29

    The ability to recognize individuals within an animal population is fundamental to conservation and management. Identification of individual bats has relied on artificial marking techniques that may negatively affect the survival and alter the behavior of individuals. Biometric systems use biological characteristics to identify individuals. The field of animal biometrics has expanded to include recognition of individuals based upon various morphologies and phenotypic variations including pelage patterns, tail flukes, and whisker arrangement. Biometric systems use 4 biologic measurement criteria: universality, distinctiveness, permanence, and collectability. Additionally, the system should not violate assumptions of capture-recapture methods that include no increased mortality or alterations of behavior. We evaluated whether individual bats could be uniquely identified based upon the collagen-elastin bundles that are visible with gross examination of their wings. We examined little brown bats ( Myotis lucifugus ), northern long-eared bats ( M. septentrionalis ), big brown bats ( Eptesicus fuscus ), and tricolored bats ( Perimyotis subflavus ) to determine whether the "wing prints" from the bundle network would satisfy the biologic measurement criteria. We evaluated 1,212 photographs from 230 individual bats comparing week 0 photos with those taken at weeks 3 or 6 and were able to confirm identity of individuals over time. Two blinded evaluators were able to successfully match 170 individuals in hand to photographs taken at weeks 0, 3, and 6. This study suggests that bats can be successfully re-identified using photographs taken at previous times. We suggest further evaluation of this methodology for use in a standardized system that can be shared among bat conservationists.

  4. Bat wing biometrics: using collagen–elastin bundles in bat wings as a unique individual identifier

    PubMed Central

    Hooper, Sarah E.; Womack, Kathryn M.

    2017-01-01

    Abstract The ability to recognize individuals within an animal population is fundamental to conservation and management. Identification of individual bats has relied on artificial marking techniques that may negatively affect the survival and alter the behavior of individuals. Biometric systems use biological characteristics to identify individuals. The field of animal biometrics has expanded to include recognition of individuals based upon various morphologies and phenotypic variations including pelage patterns, tail flukes, and whisker arrangement. Biometric systems use 4 biologic measurement criteria: universality, distinctiveness, permanence, and collectability. Additionally, the system should not violate assumptions of capture–recapture methods that include no increased mortality or alterations of behavior. We evaluated whether individual bats could be uniquely identified based upon the collagen–elastin bundles that are visible with gross examination of their wings. We examined little brown bats (Myotis lucifugus), northern long-eared bats (M. septentrionalis), big brown bats (Eptesicus fuscus), and tricolored bats (Perimyotis subflavus) to determine whether the “wing prints” from the bundle network would satisfy the biologic measurement criteria. We evaluated 1,212 photographs from 230 individual bats comparing week 0 photos with those taken at weeks 3 or 6 and were able to confirm identity of individuals over time. Two blinded evaluators were able to successfully match 170 individuals in hand to photographs taken at weeks 0, 3, and 6. This study suggests that bats can be successfully re-identified using photographs taken at previous times. We suggest further evaluation of this methodology for use in a standardized system that can be shared among bat conservationists. PMID:29674784

  5. Face biometrics with renewable templates

    NASA Astrophysics Data System (ADS)

    van der Veen, Michiel; Kevenaar, Tom; Schrijen, Geert-Jan; Akkermans, Ton H.; Zuo, Fei

    2006-02-01

    In recent literature, privacy protection technologies for biometric templates were proposed. Among these is the so-called helper-data system (HDS) based on reliable component selection. In this paper we integrate this approach with face biometrics such that we achieve a system in which the templates are privacy protected, and multiple templates can be derived from the same facial image for the purpose of template renewability. Extracting binary feature vectors forms an essential step in this process. Using the FERET and Caltech databases, we show that this quantization step does not significantly degrade the classification performance compared to, for example, traditional correlation-based classifiers. The binary feature vectors are integrated in the HDS leading to a privacy protected facial recognition algorithm with acceptable FAR and FRR, provided that the intra-class variation is sufficiently small. This suggests that a controlled enrollment procedure with a sufficient number of enrollment measurements is required.

  6. Methodology of the determination of the uncertainties by using the biometric device the broadway 3D

    NASA Astrophysics Data System (ADS)

    Jasek, Roman; Talandova, Hana; Adamek, Milan

    2016-06-01

    The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structured light scanning and saves the template into the 3D model of face. The obtained data were evaluated by software Turnstile Enrolment Application (TEA). The measurements were used 3D face reader the Broadway 3D. First, the person was scanned and stored in the database. Thereafter person has already been compared with the stored template in the database for each method. Finally, a measure of reliability was evaluated for the Broadway 3D face reader.

  7. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  8. Biometric Analysis – A Reliable Indicator for Diagnosing Taurodontism using Panoramic Radiographs

    PubMed Central

    Hegde, Veda; Anegundi, Rajesh Trayambhak; Pravinchandra, K.R.

    2013-01-01

    Background: Taurodontism is a clinical entity with a morpho–anatomical change in the shape of the tooth, which was thought to be absent in modern man. Taurodontism is mostly observed as an isolated trait or a component of a syndrome. Various techniques have been devised to diagnose taurodontism. Aim: The aim of this study was to analyze whether a biometric analysis was useful in diagnosing taurodontism, in radiographs which appeared to be normal on cursory observations. Setting and Design: This study was carried out in our institution by using radiographs which were taken for routine procedures. Material and Methods: In this retrospective study, panoramic radiographs were obtained from dental records of children who were aged between 9–14 years, who did not have any abnormality on cursory observations. Biometric analyses were carried out on permanent mandibular first molar(s) by using a novel biometric method. The values were tabulated and analysed. Statistics: Fischer exact probability test, Chi square test and Chi-square test with Yates correction were used for statistical analysis of the data. Results: Cursory observation did not yield us any case of taurodontism. In contrast, the biometric analysis yielded us a statistically significant number of cases of taurodontism. However, there was no statistically significant difference in the number of cases with taurodontism, which was obtained between the genders and the age group which was considered. Conclusion: Thus, taurodontism was diagnosed on a biometric analysis, which was otherwise missed on a cursory observation. It is therefore necessary from the clinical point of view, to diagnose even the mildest form of taurodontism by using metric analysis rather than just relying on a visual radiographic assessment, as its occurrence has many clinical implications and a diagnostic importance. PMID:24086912

  9. Biometric Analysis - A Reliable Indicator for Diagnosing Taurodontism using Panoramic Radiographs.

    PubMed

    Hegde, Veda; Anegundi, Rajesh Trayambhak; Pravinchandra, K R

    2013-08-01

    Taurodontism is a clinical entity with a morpho-anatomical change in the shape of the tooth, which was thought to be absent in modern man. Taurodontism is mostly observed as an isolated trait or a component of a syndrome. Various techniques have been devised to diagnose taurodontism. The aim of this study was to analyze whether a biometric analysis was useful in diagnosing taurodontism, in radiographs which appeared to be normal on cursory observations. This study was carried out in our institution by using radiographs which were taken for routine procedures. In this retrospective study, panoramic radiographs were obtained from dental records of children who were aged between 9-14 years, who did not have any abnormality on cursory observations. Biometric analyses were carried out on permanent mandibular first molar(s) by using a novel biometric method. The values were tabulated and analysed. Fischer exact probability test, Chi square test and Chi-square test with Yates correction were used for statistical analysis of the data. Cursory observation did not yield us any case of taurodontism. In contrast, the biometric analysis yielded us a statistically significant number of cases of taurodontism. However, there was no statistically significant difference in the number of cases with taurodontism, which was obtained between the genders and the age group which was considered. Thus, taurodontism was diagnosed on a biometric analysis, which was otherwise missed on a cursory observation. It is therefore necessary from the clinical point of view, to diagnose even the mildest form of taurodontism by using metric analysis rather than just relying on a visual radiographic assessment, as its occurrence has many clinical implications and a diagnostic importance.

  10. Principal component analysis of biometric traits to reveal body confirmation in local hill cattle of Himalayan state of Himachal Pradesh, India.

    PubMed

    Verma, Deepak; Sankhyan, Varun; Katoch, Sanjeet; Thakur, Yash Pal

    2015-12-01

    In the present study, biometric traits (body length [BL], heart girth [HG], paunch girth (PG), forelimb length (FLL), hind limb length (HLL), face length, forehead width, forehead length, height at hump, hump length (HL), hook to hook distance, pin to pin distance, tail length (TL), TL up to switch, horn length, horn circumference, and ear length were studied in 218 adult hill cattle of Himachal Pradesh for phenotypic characterization. Morphological and biometrical observations were recorded on 218 hill cattle randomly selected from different districts within the breeding tract. Multivariate statistics and principal component analysis are used to account for the maximum portion of variation present in the original set of variables with a minimum number of composite variables through Statistical software, SAS 9.2. Five components were extracted which accounted for 65.9% of variance. The first component explained general body confirmation and explained 34.7% variation. It was represented by significant loading for BL, HG, PG, FLL, and HLL. Communality estimate ranged from 0.41 (HL) to 0.88 (TL). Second, third, fourth, and fifth component had a high loading for tail characteristics, horn characteristics, facial biometrics, and rear body, respectively. The result of component analysis of biometric traits suggested that indigenous hill cattle of Himachal Pradesh are small and compact size cattle with a medium hump, horizontally placed short ears, and a long tail. The study also revealed that factors extracted from the present investigation could be used in breeding programs with sufficient reduction in the number of biometric traits to be recorded to explain the body confirmation.

  11. Cancelable biometrics realization with multispace random projections.

    PubMed

    Teoh, Andrew Beng Jin; Yuang, Chong Tze

    2007-10-01

    Biometric characteristics cannot be changed; therefore, the loss of privacy is permanent if they are ever compromised. This paper presents a two-factor cancelable formulation, where the biometric data are distorted in a revocable but non-reversible manner by first transforming the raw biometric data into a fixed-length feature vector and then projecting the feature vector onto a sequence of random subspaces that were derived from a user-specific pseudorandom number (PRN). This process is revocable and makes replacing biometrics as easy as replacing PRNs. The formulation has been verified under a number of scenarios (normal, stolen PRN, and compromised biometrics scenarios) using 2400 Facial Recognition Technology face images. The diversity property is also examined.

  12. Novel wearable-type biometric devices based on skin tissue optics with multispectral LED-photodiode matrix

    NASA Astrophysics Data System (ADS)

    Jo, Young Chang; Kim, Hae Na; Kang, Jae Hwan; Hong, Hyuck Ki; Choi, Yeon Shik; Jung, Suk Won; Kim, Sung Phil

    2017-04-01

    In this study, we examined the possibility of using a multispectral skin photomatrix (MSP) module as a novel biometric device. The MSP device measures optical patterns of the wrist skin tissue. Optical patterns consist of 2 × 8 photocurrent intensities of photodiode arrays, which are generated by optical transmission and diffuse reflection of photons from LED light sources with variable wavelengths into the wrist skin tissue. Optical patterns detected by the MSP device provide information on both the surface and subsurface characteristics of the human skin tissue. We found that in the 21 subjects we studied, they showed their unique characteristics, as determined using several wavelengths of light. The experimental results show that the best personal identification accuracy can be acquired using a combination of infrared light and yellow light. This novel biometric device, the MSP module, exhibited an excellent false acceptance rate (FAR) of 0.3% and a false rejection rate (FRR) of 0.0%, which are better than those of commercialized biometric devices such as a fingerprint biometric system. From these experimental results, we found that people exhibit unique optical patterns of their inner-wrist skin tissue and this uniqueness could be used for developing novel high-accuracy personal identification devices.

  13. 8 CFR 215.8 - Requirements for biometric identifiers from aliens on departure from the United States.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Requirements for biometric identifiers from... Requirements for biometric identifiers from aliens on departure from the United States. (a)(1) The Secretary of... of entry, to provide fingerprints, photograph(s) or other specified biometric identifiers...

  14. 8 CFR 215.8 - Requirements for biometric identifiers from aliens on departure from the United States.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Requirements for biometric identifiers from... Requirements for biometric identifiers from aliens on departure from the United States. (a)(1) The Secretary of... of entry, to provide fingerprints, photograph(s) or other specified biometric identifiers...

  15. 8 CFR 215.8 - Requirements for biometric identifiers from aliens on departure from the United States.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Requirements for biometric identifiers from... Requirements for biometric identifiers from aliens on departure from the United States. (a)(1) The Secretary of... of entry, to provide fingerprints, photograph(s) or other specified biometric identifiers...

  16. 8 CFR 215.8 - Requirements for biometric identifiers from aliens on departure from the United States.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Requirements for biometric identifiers from... Requirements for biometric identifiers from aliens on departure from the United States. (a)(1) The Secretary of... of entry, to provide fingerprints, photograph(s) or other specified biometric identifiers...

  17. Biometrics and international migration.

    PubMed

    Redpath, Jillyanne

    2007-01-01

    This paper will focus on the impact of the rapid expansion in the use of biometric systems in migration management on the rights of individuals; it seeks to highlight legal issues for consideration in implementing such systems, taking as the starting point that the security interests of the state and the rights of the individual are not, and should not be, mutually exclusive. The first part of this paper briefly describes the type of biometric applications available, how biometric systems function, and those used in migration management. The second part examines the potential offered by biometrics for greater security in migration management, and focuses on developments in the use of biometrics as a result of September 11. The third part discusses the impact of the use of biometrics in the management of migration on the individual's right to privacy and ability to move freely and lawfully. The paper highlights the increasing need for domestic and international frameworks to govern the use of biometric applications in the migration/security context, and proposes a number of issues that such frameworks could address.

  18. Early biometric lag in the prediction of small for gestational age neonates and preeclampsia.

    PubMed

    Schwartz, Nadav; Pessel, Cara; Coletta, Jaclyn; Krieger, Abba M; Timor-Tritsch, Ilan E

    2011-01-01

    An early fetal growth lag may be a marker of future complications. We sought to determine the utility of early biometric variables in predicting adverse pregnancy outcomes. In this retrospective cohort study, the crown-rump length at 11 to 14 weeks and the head circumference, biparietal diameter, abdominal circumference, femur length, humerus length, transverse cerebellar diameter, and estimated fetal weight at 18 to 24 weeks were converted to an estimated gestational age using published regression formulas. Sonographic fetal growth (difference between each biometric gestational age and the crown-rump length gestational age) minus expected fetal growth (number of days elapsed between the two scans) yielded the biometric growth lag. These lags were tested as predictors of small for gestational age (SGA) neonates (≤10th percentile) and preeclampsia. A total of 245 patients were included. Thirty-two (13.1%) delivered an SGA neonate, and 43 (17.6%) had the composite outcome. The head circumference, biparietal diameter, abdominal circumference, and estimated fetal weight lags were identified as significant predictors of SGA neonates after adjusted analyses (P < .05). The addition of either the estimated fetal weight or abdominal circumference lag to maternal characteristics alone significantly improved the performance of the predictive model, achieving areas under the curve of 0.72 and 0.74, respectively. No significant association was found between the biometric lag variables and the development of preeclampsia. Routinely available biometric data can be used to improve the prediction of adverse outcomes such as SGA. These biometric lags should be considered in efforts to develop screening algorithms for adverse outcomes.

  19. Advanced quantitative methods in correlating sarcopenic muscle degeneration with lower extremity function biometrics and comorbidities

    PubMed Central

    Gíslason, Magnús; Sigurðsson, Sigurður; Guðnason, Vilmundur; Harris, Tamara; Carraro, Ugo; Gargiulo, Paolo

    2018-01-01

    Sarcopenic muscular degeneration has been consistently identified as an independent risk factor for mortality in aging populations. Recent investigations have realized the quantitative potential of computed tomography (CT) image analysis to describe skeletal muscle volume and composition; however, the optimum approach to assessing these data remains debated. Current literature reports average Hounsfield unit (HU) values and/or segmented soft tissue cross-sectional areas to investigate muscle quality. However, standardized methods for CT analyses and their utility as a comorbidity index remain undefined, and no existing studies compare these methods to the assessment of entire radiodensitometric distributions. The primary aim of this study was to present a comparison of nonlinear trimodal regression analysis (NTRA) parameters of entire radiodensitometric muscle distributions against extant CT metrics and their correlation with lower extremity function (LEF) biometrics (normal/fast gait speed, timed up-and-go, and isometric leg strength) and biochemical and nutritional parameters, such as total solubilized cholesterol (SCHOL) and body mass index (BMI). Data were obtained from 3,162 subjects, aged 66–96 years, from the population-based AGES-Reykjavik Study. 1-D k-means clustering was employed to discretize each biometric and comorbidity dataset into twelve subpopulations, in accordance with Sturges’ Formula for Class Selection. Dataset linear regressions were performed against eleven NTRA distribution parameters and standard CT analyses (fat/muscle cross-sectional area and average HU value). Parameters from NTRA and CT standards were analogously assembled by age and sex. Analysis of specific NTRA parameters with standard CT results showed linear correlation coefficients greater than 0.85, but multiple regression analysis of correlative NTRA parameters yielded a correlation coefficient of 0.99 (P<0.005). These results highlight the specificities of each muscle quality metric to LEF biometrics, SCHOL, and BMI, and particularly highlight the value of the connective tissue regime in this regard. PMID:29513690

  20. Advanced quantitative methods in correlating sarcopenic muscle degeneration with lower extremity function biometrics and comorbidities.

    PubMed

    Edmunds, Kyle; Gíslason, Magnús; Sigurðsson, Sigurður; Guðnason, Vilmundur; Harris, Tamara; Carraro, Ugo; Gargiulo, Paolo

    2018-01-01

    Sarcopenic muscular degeneration has been consistently identified as an independent risk factor for mortality in aging populations. Recent investigations have realized the quantitative potential of computed tomography (CT) image analysis to describe skeletal muscle volume and composition; however, the optimum approach to assessing these data remains debated. Current literature reports average Hounsfield unit (HU) values and/or segmented soft tissue cross-sectional areas to investigate muscle quality. However, standardized methods for CT analyses and their utility as a comorbidity index remain undefined, and no existing studies compare these methods to the assessment of entire radiodensitometric distributions. The primary aim of this study was to present a comparison of nonlinear trimodal regression analysis (NTRA) parameters of entire radiodensitometric muscle distributions against extant CT metrics and their correlation with lower extremity function (LEF) biometrics (normal/fast gait speed, timed up-and-go, and isometric leg strength) and biochemical and nutritional parameters, such as total solubilized cholesterol (SCHOL) and body mass index (BMI). Data were obtained from 3,162 subjects, aged 66-96 years, from the population-based AGES-Reykjavik Study. 1-D k-means clustering was employed to discretize each biometric and comorbidity dataset into twelve subpopulations, in accordance with Sturges' Formula for Class Selection. Dataset linear regressions were performed against eleven NTRA distribution parameters and standard CT analyses (fat/muscle cross-sectional area and average HU value). Parameters from NTRA and CT standards were analogously assembled by age and sex. Analysis of specific NTRA parameters with standard CT results showed linear correlation coefficients greater than 0.85, but multiple regression analysis of correlative NTRA parameters yielded a correlation coefficient of 0.99 (P<0.005). These results highlight the specificities of each muscle quality metric to LEF biometrics, SCHOL, and BMI, and particularly highlight the value of the connective tissue regime in this regard.

  1. Analysis of brute-force break-ins of a palmprint authentication system.

    PubMed

    Kong, Adams W K; Zhang, David; Kamel, Mohamed

    2006-10-01

    Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks.

  2. A method of ECG template extraction for biometrics applications.

    PubMed

    Zhou, Xiang; Lu, Yang; Chen, Meng; Bao, Shu-Di; Miao, Fen

    2014-01-01

    ECG has attracted widespread attention as one of the most important non-invasive physiological signals in healthcare-system related biometrics for its characteristics like ease-of-monitoring, individual uniqueness as well as important clinical value. This study proposes a method of dynamic threshold setting to extract the most stable ECG waveform as the template for the consequent ECG identification process. With the proposed method, the accuracy of ECG biometrics using the dynamic time wraping for difference measures has been significantly improved. Analysis results with the self-built electrocardiogram database show that the deployment of the proposed method was able to reduce the half total error rate of the ECG biometric system from 3.35% to 1.45%. Its average running time on the platform of android mobile terminal was around 0.06 seconds, and thus demonstrates acceptable real-time performance.

  3. A feasibility study of using event-related potential as a biometrics.

    PubMed

    Yih-Choung Yu; Sicheng Wang; Gabel, Lisa A

    2016-08-01

    The use of an individual's neural response to stimuli (the event-related potential or ERP) has potential as a biometric because it is highly resistant to fraud relative to other conventional authentication systems. P300 is an ERP in human electroencephalography (EEG) that occurs in response to an oddball stimulus when an individual is actively engaged in a target detection task. Because P300 is consistently detectable from almost every subject, it is considered a potential signal for biometric applications. This paper presents a feasibility study of using topological plots of P300 as a biometric in subject authentication. The variation in latency and location of P300 response of 24 participants performing the P300Speller task were studied. Data sets from four participants were used for algorithm training; data from the other 20 participants were used as imposters for algorithm validation. The result showed that the algorithm was able to correctly identify three out of these four participants. Validation test also proved that the algorithm was able to reject 95% of the imposters for those three authenticated participants.

  4. Altered Anterior Segment Biometric Parameters in Mice Deficient in SPARC.

    PubMed

    Ho, Henrietta; Htoon, Hla M; Yam, Gary Hin-Fai; Toh, Li Zhen; Lwin, Nyein Chan; Chu, Stephanie; Lee, Ying Shi; Wong, Tina T; Seet, Li-Fong

    2017-01-01

    Secreted protein acidic and rich in cysteine (SPARC) and Hevin are structurally related matricellular proteins involved in extracellular matrix assembly. In this study, we compared the anterior chamber biometric parameters and iris collagen properties in SPARC-, Hevin- and SPARC-/Hevin-null with wild-type (WT) mice. The right eyes of 53 WT, 35 SPARC-, 56 Hevin-, and 63 SPARC-/Hevin-null mice were imaged using the RTVue-100 Fourier-domain optical coherence tomography system. The parameters measured were anterior chamber depth (ACD), trabecular-iris space area (TISA), angle opening distance (AOD), and pupil diameter. Biometric data were analyzed using analysis of covariance and adjusted for age, sex, and pupil diameter. Expression of Col1a1, Col8a1, and Col8a2 transcripts in the irises was measured by quantitative polymerase chain reaction. Collagen fibril thickness was evaluated by transmission electron microscopy. Mice that were SPARC- and SPARC-/Hevin-null had 1.28- and 1.25-fold deeper ACD, 1.45- and 1.53-fold larger TISA, as well as 1.42- and 1.51-fold wider AOD than WT, respectively. These measurements were not significantly different between SPARC- and SPARC-/Hevin-null mice. The SPARC-null iris expressed lower Col1a1, but higher Col8a1 and Col8a2 transcripts compared with WT. Collagen fibrils in the SPARC- and SPARC-/Hevin-null irises were 1.5- and 1.7-fold thinner than WT, respectively. The Hevin-null iris did not differ from WT in these collagen properties. SPARC-null mice have deeper anterior chamber as well as wider drainage angles compared with WT. Therefore, SPARC plays a key role in influencing the spatial organization of the anterior segment, potentially via modulation of collagen properties, while Hevin is not likely to be involved.

  5. The Impact of User Privacy Concerns and Ethnic Cultural Values on Attitudes toward the Use of Biometric Technology

    ERIC Educational Resources Information Center

    Carpenter, Darrell R.

    2011-01-01

    Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology have not been well received by employees. One reason for resistance may be perceived privacy issues associated with biometrics. This research draws on previous organizational information…

  6. 8 CFR 215.8 - Requirements for biometric identifiers from aliens on departure from the United States.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Requirements for biometric identifiers from... Requirements for biometric identifiers from aliens on departure from the United States. (a)(1) The Secretary of... designated port of entry, to provide fingerprints, photograph(s) or other specified biometric identifiers...

  7. A definitional framework for the human/biometric sensor interaction model

    NASA Astrophysics Data System (ADS)

    Elliott, Stephen J.; Kukula, Eric P.

    2010-04-01

    Existing definitions for biometric testing and evaluation do not fully explain errors in a biometric system. This paper provides a definitional framework for the Human Biometric-Sensor Interaction (HBSI) model. This paper proposes six new definitions based around two classifications of presentations, erroneous and correct. The new terms are: defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to detect (FTD), failure to extract (FTX), and successfully acquired samples (SAS). As with all definitions, the new terms require a modification to the general biometric model developed by Mansfield and Wayman [1].

  8. A bimodal biometric identification system

    NASA Astrophysics Data System (ADS)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  9. SegAuth: A Segment-based Approach to Behavioral Biometric Authentication

    PubMed Central

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2016-01-01

    Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective—behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user’s distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user’s authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets. PMID:28573214

  10. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  11. SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.

    PubMed

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2016-10-01

    Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.

  12. Ultrasonic prediction of term birth weight in Hispanic women. Accuracy in an outpatient clinic.

    PubMed

    Nahum, Gerard G; Pham, Krystle Q; McHugh, John P

    2003-01-01

    To investigate the accuracy of ultrasonic fetal biometric algorithms for estimating term fetal weight. Ultrasonographic fetal biometric assessments were made in 74 Hispanic women who delivered at 37-42 weeks of gestation. Measurements were taken of the fetal biparietal diameter, head circumference, abdominal circumference and femur length. Twenty-seven standard fetal biometric algorithms were assessed for their accuracy in predicting fetal weight. Results were compared to those obtained by merely guessing the mean term birth weight in each case. The correlation between ultrasonically predicted and actual birth weights ranged from 0.52 to 0.79. The different ultrasonic algorithms estimated fetal weight to within +/- 8.6-15.0% (+/- 295-520 g) of actual birth weight as compared with +/- 13.6% (+/- 449 g) for guessing the mean birth weight in each case (mean +/- SD). The mean absolute prediction errors for 17 of the ultrasonic equations (63%) were superior to those obtained by guessing the mean birth weight by 3.2-5.0% (96-154 g) (P < .05). Fourteen algorithms (52%) were more accurate for predicting fetal weight to within +/- 15%, and 20 algorithms (74%) were more accurate for predicting fetal weight to within +/- 10% of actual birth weight than simply guessing the mean birth weight (P < .05). Ten ultrasonic equations (37%) showed significant utility for predicting fetal weight > 4,000 g (likelihood ratio > 5.0). Term fetal weight predictions using the majority of sonographic fetal biometric equations are more accurate, by up to 154 g and 5%, than simply guessing the population-specific mean birth weight.

  13. Artificial stone dust-induced functional and inflammatory abnormalities in exposed workers monitored quantitatively by biometrics.

    PubMed

    Ophir, Noa; Shai, Amir Bar; Alkalay, Yifat; Israeli, Shani; Korenstein, Rafi; Kramer, Mordechai R; Fireman, Elizabeth

    2016-01-01

    The manufacture of kitchen and bath countertops in Israel is based mainly on artificial stone that contains 93% silica as natural quartz, and ∼3500 workers are involved in cutting and processing it. Artificial stone produces high concentrations of silica dust. Exposure to crystalline silica may cause silicosis, an irreversible lung disease. Our aim was to screen exposed workers by quantitative biometric monitoring of functional and inflammatory parameters. 68 exposed artificial stone workers were compared to 48 nonexposed individuals (controls). Exposed workers filled in questionnaires, and all participants underwent pulmonary function tests and induced sputum analyses. Silica was quantitated by a Niton XL3 X-ray fluorescence spectrometer. Pulmonary function test results of exposed workers were significantly lower and induced sputa showed significantly higher neutrophilic inflammation compared to controls; both processes were slowed down by the use of protective measures in the workplace. Particle size distribution in induced sputum samples of exposed workers was similar to that of artificial stone dust, which contained aluminium, zirconium and titanium in addition to silica. In conclusion, the quantitation of biometric parameters is useful for monitoring workers exposed to artificial stone in order to avoid deterioration over time.

  14. Template protection and its implementation in 3D face recognition systems

    NASA Astrophysics Data System (ADS)

    Zhou, Xuebing

    2007-04-01

    As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper concentrates on a template protection algorithm that merges methods from cryptography, error correction coding and biometrics. The key component of the algorithm is to convert biometric templates into binary vectors. It is shown that the binary vectors should be robust, uniformly distributed, statistically independent and collision-free so that authentication performance can be optimized and information leakage can be avoided. Depending on statistical character of the biometric template, different approaches for transforming biometric templates into compact binary vectors are presented. The proposed methods are integrated into a 3D face recognition system and tested on the 3D facial images of the FRGC database. It is shown that the resulting binary vectors provide an authentication performance that is similar to the original 3D face templates. A high security level is achieved with reasonable false acceptance and false rejection rates of the system, based on an efficient statistical analysis. The algorithm estimates the statistical character of biometric templates from a number of biometric samples in the enrollment database. For the FRGC 3D face database, the small distinction of robustness and discriminative power between the classification results under the assumption of uniquely distributed templates and the ones under the assumption of Gaussian distributed templates is shown in our tests.

  15. Multimodal biometrics for identity documents (MBioID).

    PubMed

    Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej

    2007-04-11

    The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.

  16. Faculty Perceptions Regarding Authentication of Online Students' Identities and Academic Dishonesty

    ERIC Educational Resources Information Center

    McMillan, Stephanie Renee

    2012-01-01

    This study explored undergraduate teaching faculty's perceptions regarding using biometric-based technologies to reduce academic dishonesty in online classes. The first objective was to develop a baseline of the respondents' concerns toward and experience with using biometrics; attitudes, experience, and mitigation strategies used to…

  17. Molecular and biometric assessment of Myzodium mimulicola (Drew & Sampson) (Hemiptera, Aphididae), new synonymy, host, and distributional data

    USDA-ARS?s Scientific Manuscript database

    Molecular and biometric assessment and subsequent redescription of Myzodium mimulicola (Drew & Sampson) is provided. New host and distributional data for North America are presented, including the first record from Alaska. The current study determined that Myzodium knowltoni (Smith & Robinson) is a ...

  18. Palmprint and Face Multi-Modal Biometric Recognition Based on SDA-GSVD and Its Kernelization

    PubMed Central

    Jing, Xiao-Yuan; Li, Sheng; Li, Wen-Qian; Yao, Yong-Fang; Lan, Chao; Lu, Jia-Sen; Yang, Jing-Yu

    2012-01-01

    When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person's overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA). Specifically, one person's different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD) technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance. PMID:22778600

  19. Palmprint and face multi-modal biometric recognition based on SDA-GSVD and its kernelization.

    PubMed

    Jing, Xiao-Yuan; Li, Sheng; Li, Wen-Qian; Yao, Yong-Fang; Lan, Chao; Lu, Jia-Sen; Yang, Jing-Yu

    2012-01-01

    When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person's overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA). Specifically, one person's different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD) technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance.

  20. Financial Incentives, Workplace Wellness Program Participation, and Utilization of Health Care Services and Spending.

    PubMed

    Fronstin, Paul; Roebuck, M Christopher

    2015-08-01

    This paper analyzes data from a large employer that enhanced financial incentives to encourage participation in its workplace wellness programs. It examines, first, the effect of financial incentives on wellness program participation, and second, it estimates the impact of wellness program participation on utilization of health care services and spending. The Patient Protection and Affordable Care Act of 2010 (PPACA) allows employers to provide financial incentives of as much as 30 percent of the total cost of coverage when tied to participation in a wellness program. Participation in health risk assessments (HRAs) increased by 50 percentage points among members of unions that bargained in the incentive, and increased 22 percentage points among non-union employees. Participation in the biometric screening program increased 55 percentage points when financial incentives were provided. Biometric screenings led to an average increase of 0.31 annual prescription drug fills, with related spending higher by $56 per member per year. Otherwise, no significant effects of participation in HRAs or biometric screenings on utilization of health care services and spending were found. The largest increase in medication utilization as a result of biometric screening was for statins, which are widely used to treat high cholesterol. This therapeutic class accounted for one-sixth of the overall increase in prescription drug utilization. Second were antidepressants, followed by ACE inhibitors (for hypertension), and thyroid hormones (for hypothyroidism). Biometric screening also led to significantly higher utilization of biologic response modifiers and immunosuppressants. These specialty medications are used to treat autoimmune diseases, such as rheumatoid arthritis and multiple sclerosis, and are relatively expensive compared with non-specialty medications. The added spending associated with the combined increase in fills of 0.02 was $27 per member per year--about one-half of the overall increase in prescription drug spending from those who participated in biometric screenings.

  1. Biometrics and Policing: A Protocol for Multichannel Sensor Data Collection and Exploratory Analysis of Contextualized Psychophysiological Response During Law Enforcement Operations.

    PubMed

    Furberg, Robert D; Taniguchi, Travis; Aagaard, Brian; Ortiz, Alexa M; Hegarty-Craver, Meghan; Gilchrist, Kristin H; Ridenour, Ty A

    2017-03-17

    Stress experienced by law enforcement officers is often extreme and is in many ways unique among professions. Although past research on officer stress is informative, it is limited, and most studies measure stress using self-report questionnaires or observational studies that have limited generalizability. We know of no research studies that have attempted to track direct physiological stress responses in high fidelity, especially within an operational police setting. The outcome of this project will have an impact on both practitioners and policing researchers. To do so, we will establish a capacity to obtain complex, multisensor data; process complex datasets; and establish the methods needed to conduct idiopathic clinical trials on behavioral interventions in similar contexts. The objective of this pilot study is to demonstrate the practicality and utility of wrist-worn biometric sensor-based research in a law enforcement agency. We will use nonprobability convenience-based sampling to recruit 2-3 participants from the police department in Durham, North Carolina, USA. Data collection was conducted in 2016. We will analyze data in early 2017 and disseminate our results via peer reviewed publications in late 2017. We developed the Biometrics & Policing Demonstration project to provide a proof of concept on collecting biometric data in a law enforcement setting. This effort will enable us to (1) address the regulatory approvals needed to collect data, including human participant considerations, (2) demonstrate the ability to use biometric tracking technology in a policing setting, (3) link biometric data to law enforcement data, and (4) explore project results for law enforcement policy and training. ©Robert D Furberg, Travis Taniguchi, Brian Aagaard, Alexa M Ortiz, Meghan Hegarty-Craver, Kristin H Gilchrist, Ty A Ridenour. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 17.03.2017.

  2. 76 FR 29777 - Re-registration Procedures for Temporary Protected Status (TPS) Beneficiaries Under the Extended...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... Status for Haiti. Fees for the Form I-821, Form I-765, and biometric services fee are also described in 8 CFR 103.7(b). Biometric Services Fee Biometrics (such as fingerprints) are required for all applicants 14 years of age or older. Those applicants must submit a biometric services fee. As previously stated...

  3. Biometrics Enabling Capability Increment 1 (BEC Inc 1)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Biometrics Enabling Capability Increment 1 (BEC Inc 1) Defense Acquisition Management...Phone: 227-3119 DSN Fax: Date Assigned: July 15, 2015 Program Information Program Name Biometrics Enabling Capability Increment 1 (BEC Inc 1) DoD...therefore, no Original Estimate has been established. BEC Inc 1 2016 MAR UNCLASSIFIED 4 Program Description The Biometrics Enabling Capability (BEC

  4. Privacy-protected biometric templates: acoustic ear identification

    NASA Astrophysics Data System (ADS)

    Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.

    2004-08-01

    Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].

  5. Biometrics: Accessibility challenge or opportunity?

    PubMed

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  6. Biometrics: Accessibility challenge or opportunity?

    PubMed Central

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  7. Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics

    PubMed Central

    Kostyuk, Nataliya; Cole, Phyadragren; Meghanathan, Natarajan; Isokpehi, Raphael D.; Cohly, Hari H. P.

    2011-01-01

    The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases. PMID:21747817

  8. Gas discharge visualization: an imaging and modeling tool for medical biometrics.

    PubMed

    Kostyuk, Nataliya; Cole, Phyadragren; Meghanathan, Natarajan; Isokpehi, Raphael D; Cohly, Hari H P

    2011-01-01

    The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases.

  9. Anatomy of Biometric Passports

    PubMed Central

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  10. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines

    PubMed Central

    del Val, Lara; Izquierdo-Fuente, Alberto; Villacorta, Juan J.; Raboso, Mariano

    2015-01-01

    Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM). The preprocessing techniques used are spatial filtering, segmentation—based on a Gaussian Mixture Model (GMM) to separate the person from the background, masking—to reduce the dimensions of images—and binarization—to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements. PMID:26091392

  11. Anatomy of biometric passports.

    PubMed

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).

  12. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines.

    PubMed

    del Val, Lara; Izquierdo-Fuente, Alberto; Villacorta, Juan J; Raboso, Mariano

    2015-06-17

    Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM). The preprocessing techniques used are spatial filtering, segmentation-based on a Gaussian Mixture Model (GMM) to separate the person from the background, masking-to reduce the dimensions of images-and binarization-to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements.

  13. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  14. Estimating Gestational Age With Sonography: Regression-Derived Formula Versus the Fetal Biometric Average.

    PubMed

    Cawyer, Chase R; Anderson, Sarah B; Szychowski, Jeff M; Neely, Cherry; Owen, John

    2018-03-01

    To compare the accuracy of a new regression-derived formula developed from the National Fetal Growth Studies data to the common alternative method that uses the average of the gestational ages (GAs) calculated for each fetal biometric measurement (biparietal diameter, head circumference, abdominal circumference, and femur length). This retrospective cross-sectional study identified nonanomalous singleton pregnancies that had a crown-rump length plus at least 1 additional sonographic examination with complete fetal biometric measurements. With the use of the crown-rump length to establish the referent estimated date of delivery, each method's (National Institute of Child Health and Human Development regression versus Hadlock average [Radiology 1984; 152:497-501]), error at every examination was computed. Error, defined as the difference between the crown-rump length-derived GA and each method's predicted GA (weeks), was compared in 3 GA intervals: 1 (14 weeks-20 weeks 6 days), 2 (21 weeks-28 weeks 6 days), and 3 (≥29 weeks). In addition, the proportion of each method's examinations that had errors outside prespecified (±) day ranges was computed by using odds ratios. A total of 16,904 sonograms were identified. The overall and prespecified GA range subset mean errors were significantly smaller for the regression compared to the average (P < .01), and the regression had significantly lower odds of observing examinations outside the specified range of error in GA intervals 2 (odds ratio, 1.15; 95% confidence interval, 1.01-1.31) and 3 (odds ratio, 1.24; 95% confidence interval, 1.17-1.32) than the average method. In a contemporary unselected population of women dated by a crown-rump length-derived GA, the National Institute of Child Health and Human Development regression formula produced fewer estimates outside a prespecified margin of error than the commonly used Hadlock average; the differences were most pronounced for GA estimates at 29 weeks and later. © 2017 by the American Institute of Ultrasound in Medicine.

  15. First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data.

    PubMed

    Serwaa-Bonsu, Adwoa; Herbst, Abraham J; Reniers, Georges; Ijaa, Wilfred; Clark, Benjamin; Kabudula, Chodziwadziwa; Sankoh, Osman

    2010-02-24

    In developing countries, Health and Demographic Surveillance Systems (HDSSs) provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS). Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. Adult (18-65 years) fingerprint enrolment rates varied between 94.1% (95% CI 93.6-94.5) for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9-97.6) for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site) were only 55.1% (95% CI 52.7-57.4). By age 5, child fingerprint enrolment rates were comparable to those of adults. This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the more restrictive health service perspective.

  16. Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2: Initial Operational Test and Evaluation Report

    DTIC Science & Technology

    2015-05-01

    Director, Operational Test and Evaluation Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial...Operational Test and Evaluation Report May 2015 This report on the Department of Defense (DOD) Automated Biometric Identification System...COVERED - 4. TITLE AND SUBTITLE Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial Operational Test

  17. Correlations between different tonometries and ocular biometric parameters in patients with primary congenital glaucoma.

    PubMed

    Mendes, Marcio Henrique; Betinjane, Alberto Jorge; Quiroga, Veronica Andrea

    2013-01-01

    To identify the correlation between the difference of intraocular pressure measurements (IOP) obtained using the Goldmann applanation tonometer (GAT) and three others tonometers (Handheld applanation tonometer - HAT, Dynamic contour tonometer - DCT and Tono-Pen®) with biometric characteristics (corneal diameter, pachymetry, keratometry and axial length) in patients with congenital glaucoma. A cross-sectional study was performed on 46 eyes from 46 patients with congenital glaucoma. IOP measurements were obtained in all patients using GAT, HAT, DCT and Tono-Pen®. Keratometry, pachymetry, biometry and corneal diameter measurements were performed after the IOP measurement. The order of the tonometries was randomized. The correlations between the differences of IOP values of GAT and the other tonometers (Delta-IOP), and the different biometric parameters were studied. Tono-Pen® Delta IOP revealed moderate positive correlation to keratometry (r=0.41, p=0.004). The other Delta-IOPs showed no correlation with any of the biometric characteristics evaluated. IOP differences between GAT (gold standard) and GAT, HAT, DCT or Tono-Pen tonometers seem not to correlate with majority of ocular biometric characteristics. The only exception was the keratometry, which correlated in a positive and moderate way with Tono-Pen® Delta-IOP. This result suggests that the differences of IOP values of Tono-Pen® and GAT increase with the steepness of the cornea.

  18. Biometric Denture Space- Concept of Neutral Zone Revisited Using A Hydrocolloid Impression Material

    PubMed Central

    Umamaheswaran, Aruna; Nayar, Sanjna

    2015-01-01

    Though the concept of neutral zone in making complete denture and its significance are well known, the material of choice has always been experimented to achieve better results. Recording of neutral zone using irreversible hydrocolloid (Alginate) as a material of choice would make the way of recording the neutral zone easier, as well as comfortable for the patient, when compared with other materials used for the purpose. This article describes the method of recording the biometric denture space (neutral zone) using hydrocolloid impression material which is most commonly used in everyday dental practice. PMID:26673250

  19. Heart Sound Biometric System Based on Marginal Spectrum Analysis

    PubMed Central

    Zhao, Zhidong; Shen, Qinqin; Ren, Fangqin

    2013-01-01

    This work presents a heart sound biometric system based on marginal spectrum analysis, which is a new feature extraction technique for identification purposes. This heart sound identification system is comprised of signal acquisition, pre-processing, feature extraction, training, and identification. Experiments on the selection of the optimal values for the system parameters are conducted. The results indicate that the new spectrum coefficients result in a significant increase in the recognition rate of 94.40% compared with that of the traditional Fourier spectrum (84.32%) based on a database of 280 heart sounds from 40 participants. PMID:23429515

  20. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    NASA Astrophysics Data System (ADS)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.

  1. Biometric parameters of the bream (Abramis brama) as indicators for long-term changes in fish health and environmental quality--data from the German ESB.

    PubMed

    Teubner, Diana; Paulus, Martin; Veith, Michael; Klein, Roland

    2015-02-01

    Piscifaunal health depends upon the state and quality of the aquatic environment. Variations in physical condition of fish may therefore be attributed to changes in environmental quality. Based on time series of up to 20 years of biometric data of bream from multiple sampling sites of the German environmental specimen bank (ESB), this study assessed whether changes in biometric parameters are able to indicate long-term alterations in fish health and environmental quality. Evaluated biometric parameters of fish health comprised length and weight of individuals of a defined age class, the condition factor, lipid content and hepatosomatic index (HSI). Although there are negative trends of the HSI, the overall development of health parameters can be interpreted as positive. This seems to suggest that health parameters conclusively mirror the long-term improvement of water quality in the selected rivers. However, the applicability of the condition factor as well as lipid content as indicators for fish health remained subject to restrictions. Altogether, the results from the ESB confirmed the high value of biometric parameters for monitoring of long-term changes in state and quality of aquatic ecosystems.

  2. Prenatal Brain MR Imaging: Reference Linear Biometric Centiles between 20 and 24 Gestational Weeks.

    PubMed

    Conte, G; Milani, S; Palumbo, G; Talenti, G; Boito, S; Rustico, M; Triulzi, F; Righini, A; Izzo, G; Doneda, C; Zolin, A; Parazzini, C

    2018-05-01

    Evaluation of biometry is a fundamental step in prenatal brain MR imaging. While different studies have reported reference centiles for MR imaging biometric data of fetuses in the late second and third trimesters of gestation, no one has reported them in fetuses in the early second trimester. We report centiles of normal MR imaging linear biometric data of a large cohort of fetal brains within 24 weeks of gestation. From the data bases of 2 referral centers of fetal medicine, accounting for 3850 examinations, we retrospectively collected 169 prenatal brain MR imaging examinations of singleton pregnancies, between 20 and 24 weeks of gestational age, with normal brain anatomy at MR imaging and normal postnatal neurologic development. To trace the reference centiles, we used the CG-LMS method. Reference biometric centiles for the developing structures of the cerebrum, cerebellum, brain stem, and theca were obtained. The overall interassessor agreement was adequate for all measurements. Reference biometric centiles of the brain structures in fetuses between 20 and 24 weeks of gestational age may be a reliable tool in assessing fetal brain development. © 2018 by American Journal of Neuroradiology.

  3. Biometrics in support of special forces medical operations.

    PubMed

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  4. 76 FR 28057 - Agency Information Collection Activities: New Information Collection: Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... retrieves biometric and biographic data from the Automated Biometric Identification System (IDENT) within... information collection is necessary for USCIS to collect and process the required biometric and biographic...

  5. Cancelable ECG biometrics using GLRT and performance improvement using guided filter with irreversible guide signal.

    PubMed

    Kim, Hanvit; Minh Phuong Nguyen; Se Young Chun

    2017-07-01

    Biometrics such as ECG provides a convenient and powerful security tool to verify or identify an individual. However, one important drawback of biometrics is that it is irrevocable. In other words, biometrics cannot be re-used practically once it is compromised. Cancelable biometrics has been investigated to overcome this drawback. In this paper, we propose a cancelable ECG biometrics by deriving a generalized likelihood ratio test (GLRT) detector from a composite hypothesis testing in randomly projected domain. Since it is common to observe performance degradation for cancelable biometrics, we also propose a guided filtering (GF) with irreversible guide signal that is a non-invertibly transformed signal of ECG authentication template. We evaluated our proposed method using ECG-ID database with 89 subjects. Conventional Euclidean detector with original ECG template yielded 93.9% PD1 (detection probability at 1% FAR) while Euclidean detector with 10% compressed ECG (1/10 of the original data size) yielded 90.8% PD1. Our proposed GLRT detector with 10% compressed ECG yielded 91.4%, which is better than Euclidean with the same compressed ECG. GF with our proposed irreversible ECG template further improved the performance of our GLRT with 10% compressed ECG up to 94.3%, which is higher than Euclidean detector with original ECG. Lastly, we showed that our proposed cancelable ECG biometrics practically met cancelable biometrics criteria such as efficiency, re-usability, diversity and non-invertibility.

  6. Development of customized fetal growth charts in twins.

    PubMed

    Ghi, Tullio; Prefumo, Federico; Fichera, Anna; Lanna, Mariano; Periti, Enrico; Persico, Nicola; Viora, Elsa; Rizzo, Giuseppe

    2017-05-01

    Twin gestations are at significantly higher risk of fetal growth restriction in comparison with singletons. Using fetal biometric charts customized for obstetrical and parental characteristics may facilitate an accurate assessment of fetal growth. The objective of the study was to construct reference charts for the gestation of fetal biometric parameters stratified by chorionicity and customized for obstetrical and parental characteristics. Fetal biometric measurements obtained from serial ultrasound examinations in uncomplicated twin pregnancies delivering after 36 weeks of gestation were collected by 19 Italian fetal medicine units under the auspices of the Società Italiana di Ecografia Ostetrica e Ginecologica. The measurements acquired in each fetus at each examination included biparietal diameter, head circumference, abdominal circumference, and femur length. Multilevel linear regression models were used to adjust for the serial ultrasonographic measurements obtained and the clustering of each fetus in twin pregnancy. The impact of maternal and paternal characteristics (height, weight, ethnicity), parity, fetal sex, and mode of conception was also considered. Models for each parameter were stratified by fetal chorionicity and compared with our previously constructed growth curves for singletons. The data set included 1781 twin pregnancies (dichorionic, n = 1289; monochorionic diamniotic, n = 492) with 8923 ultrasonographic examinations with a median of 5 (range, 2-8) observations per pregnancy in dichorionic and 6 in (range, 2-11) monochorionic pregnancies. Growth curves of twin pregnancies differed from those of singletons, and differences were more marked in monochorionic twins and during the third trimester. A significant influence of parental characteristics was found. Curves of fetal biometric measurements in twins are influenced by parental characteristics. There is a reduction in the growth rate during the third trimester. The reference limits for gestation constructed in this study may provide a useful tool for a more accurate assessment of fetal growth in twin pregnancies. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Image quality guided approach for adaptive modelling of biometric intra-class variations

    NASA Astrophysics Data System (ADS)

    Abboud, Ali J.; Jassim, Sabah A.

    2010-04-01

    The high intra-class variability of acquired biometric data can be attributed to several factors such as quality of acquisition sensor (e.g. thermal), environmental (e.g. lighting), behavioural (e.g. change face pose). Such large fuzziness of biometric data can cause a big difference between an acquired and stored biometric data that will eventually lead to reduced performance. Many systems store multiple templates in order to account for such variations in the biometric data during enrolment stage. The number and typicality of these templates are the most important factors that affect system performance than other factors. In this paper, a novel offline approach is proposed for systematic modelling of intra-class variability and typicality in biometric data by regularly selecting new templates from a set of available biometric images. Our proposed technique is a two stage algorithm whereby in the first stage image samples are clustered in terms of their image quality profile vectors, rather than their biometric feature vectors, and in the second stage a per cluster template is selected from a small number of samples in each clusters to create an ultimate template sets. These experiments have been conducted on five face image databases and their results will demonstrate the effectiveness of proposed quality guided approach.

  8. Content-based video indexing and searching with wavelet transformation

    NASA Astrophysics Data System (ADS)

    Stumpf, Florian; Al-Jawad, Naseer; Du, Hongbo; Jassim, Sabah

    2006-05-01

    Biometric databases form an essential tool in the fight against international terrorism, organised crime and fraud. Various government and law enforcement agencies have their own biometric databases consisting of combination of fingerprints, Iris codes, face images/videos and speech records for an increasing number of persons. In many cases personal data linked to biometric records are incomplete and/or inaccurate. Besides, biometric data in different databases for the same individual may be recorded with different personal details. Following the recent terrorist atrocities, law enforcing agencies collaborate more than before and have greater reliance on database sharing. In such an environment, reliable biometric-based identification must not only determine who you are but also who else you are. In this paper we propose a compact content-based video signature and indexing scheme that can facilitate retrieval of multiple records in face biometric databases that belong to the same person even if their associated personal data are inconsistent. We shall assess the performance of our system using a benchmark audio visual face biometric database that has multiple videos for each subject but with different identity claims. We shall demonstrate that retrieval of relatively small number of videos that are nearest, in terms of the proposed index, to any video in the database results in significant proportion of that individual biometric data.

  9. C-A1-02: Evaluating Kaiser Permanente Georgia’s Worksite Wellness Programs in the Atlanta Area

    PubMed Central

    Roblin, Douglas; Robinson, Brandi; Benjamin-Stone, Staycee

    2010-01-01

    Background/Aims: There are few prospective evaluations of the effectiveness of worksite wellness programs in achieving improved lifestyle and health. Our study has two objectives: to assess the cross-sectional associations of biometric status, lifestyle, and health obtained at a wellness program’s enrollment session, and to assess changes in biometric status, lifestyle, and health between the enrollment and 6-month disenrollment sessions. Methods: For this prospective cohort study, participants were recruited from Kaiser Permanente Georgia (KPG) subscribers who were employed at a mid-sized private employer group. Participants completed a biometric assessment and written survey. The biometric measures included height, weight, blood pressure, hip/waist ratio, and total cholesterol. The written survey included measures of: health (SF-12), patient activation (PAM-13), leisure physical activity (BRFSS), food screeners (Block), and work presenteeism (SPS-6) and absenteeism. Over the next 6 months, participants will attend seminars on exercise, weight loss, and healthy cooking and eating. The biometric assessment and survey be repeated in February 2010. Results: Of the 63 eligible KPG subscribers, 60 (41 females and 19 males) consented to participate. Participant ages ranged from 28–77 years. Overall, physical and emotional health, activation, leisure physical activity, dietary intake, and BMI were comparable to results obtained among relatively healthy, low risk working age adults in a 2005 survey of KPG subscribers in large group employers. Total cholesterol was significantly (p<0.05), positively associated with percent fat in diet; and, percent fat in diet was significantly, inversely associated with activation. Participants with 1 or more days absent from work in the most recent 4-week period reported significantly higher total cholesterol and percent fat in diet and significantly lower activation. Participants with high levels of presenteeism were significantly less likely to report leisure physical activity at the recommended level. Conclusions: The initial results indicate that improving levels of activation (improved self-efficacy, motivation to pursue a healthy lifestyle and adhere to recommended care) might improve dietary intake (thereby reducing fat intake and cholesterol levels) and decrease BMI. The final wellness program evaluation will indicate how much change in these measures might occur in a relatively healthy group of working age adults.

  10. A new Watermarking System based on Discrete Cosine Transform (DCT) in color biometric images.

    PubMed

    Dogan, Sengul; Tuncer, Turker; Avci, Engin; Gulten, Arif

    2012-08-01

    This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

  11. Comparative study of multimodal biometric recognition by fusion of iris and fingerprint.

    PubMed

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results.

  12. Comparative Study of Multimodal Biometric Recognition by Fusion of Iris and Fingerprint

    PubMed Central

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results. PMID:24605065

  13. Inter-observer variability in fetal biometric measurements.

    PubMed

    Kilani, Rami; Aleyadeh, Wesam; Atieleh, Luay Abu; Al Suleimat, Abdul Mane; Khadra, Maysa; Hawamdeh, Hassan M

    2018-02-01

    To evaluate inter-observer variability and reproducibility of ultrasound measurements for fetal biometric parameters. A prospective cohort study was implemented in two tertiary care hospitals in Amman, Jordan; Prince Hamza Hospital and Albashir Hospital. 192 women with a singleton pregnancy at a gestational age of 18-36 weeks were the participants in the study. Transabdominal scans for fetal biometric parameter measurement were performed on study participants from the period of November 2014 to March 2015. Women who agreed to participate in the study were administered two ultrasound scans for head circumference, abdominal circumference and femur length. The correlation coefficient was calculated. Bland-Altman plots were used to analyze the degree of measurement agreement between observers. Limits of agreement ± 2 SD for the differences in fetal biometry measurements in proportions of the mean of the measurements were derived. Main outcome measures examine the reproducibility of fetal biometric measurements by different observers. High inter-observer inter-class correlation coefficient (ICC) was found for femur length (0.990) and abdominal circumference (0.996) where Bland-Altman plots showed high degrees of agreement. The highest degrees of agreement were noted in the measurement of abdominal circumference followed by head circumference. The lowest degree of agreement was found for femur length measurement. We used a paired-sample t-test and found that the mean difference between duplicate measurements was not significant (P > 0.05). Biometric fetal parameter measurements may be reproducible by different operators in the clinical setting with similar results. Fetal head circumference, abdominal circumference and femur length were highly reproducible. Large organized studies are needed to ensure accurate fetal measurements due to the important clinical implications of inaccurate measurements. Copyright © 2018. Published by Elsevier B.V.

  14. Interpretation of fingerprint image quality features extracted by self-organizing maps

    NASA Astrophysics Data System (ADS)

    Danov, Ivan; Olsen, Martin A.; Busch, Christoph

    2014-05-01

    Accurate prediction of fingerprint quality is of significant importance to any fingerprint-based biometric system. Ensuring high quality samples for both probe and reference can substantially improve the system's performance by lowering false non-matches, thus allowing finer adjustment of the decision threshold of the biometric system. Furthermore, the increasing usage of biometrics in mobile contexts demands development of lightweight methods for operational environment. A novel two-tier computationally efficient approach was recently proposed based on modelling block-wise fingerprint image data using Self-Organizing Map (SOM) to extract specific ridge pattern features, which are then used as an input to a Random Forests (RF) classifier trained to predict the quality score of a propagated sample. This paper conducts an investigative comparative analysis on a publicly available dataset for the improvement of the two-tier approach by proposing additionally three feature interpretation methods, based respectively on SOM, Generative Topographic Mapping and RF. The analysis shows that two of the proposed methods produce promising results on the given dataset.

  15. Laser speckle decorrelation for fingerprint acquisition

    NASA Astrophysics Data System (ADS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-09-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases.

  16. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  17. Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing

    NASA Astrophysics Data System (ADS)

    Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie

    Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.

  18. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  19. Promising developments and biometric testing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.

    1993-04-01

    Biometric identity research and development activities are being conducted in universities, government, and private industry. This paper discusses some of the factors that limit the performance of biometric identity devices, looks at some new developments, and speculates on future developments.

  20. Transfer Function Control for Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Chmiel, Alan J. (Inventor); Grodinsky, Carlos M. (Inventor); Humphreys, Bradley T. (Inventor)

    2015-01-01

    A modular apparatus for acquiring biometric data may include circuitry operative to receive an input signal indicative of a biometric condition, the circuitry being configured to process the input signal according to a transfer function thereof and to provide a corresponding processed input signal. A controller is configured to provide at least one control signal to the circuitry to programmatically modify the transfer function of the modular system to facilitate acquisition of the biometric data.

  1. Defense Biometric and Forensic Office Research, Development, Test and Evaluation Strategy

    DTIC Science & Technology

    2015-01-06

    investments in biometric and forensic RDT&E. From refining biometric modalities to exploring ‘ game changing’ forensic technologies such as rapid DNA to the... ASD (R&E)), is to identify, fund, manage and transition projects that support biometric and/or forensic requirements. In the second role, the DBFO...forensic stakeholders cannot fund, to the COIs for consideration.  Increase contacts with ASD (R&E) divisions/laboratories focused on basic research

  2. Handwriting: Feature Correlation Analysis for Biometric Hashes

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  3. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  4. Preoperative Biometric Parameters Predict the Vault after ICL Implantation: A Retrospective Clinical Study.

    PubMed

    Zheng, Qian-Yin; Xu, Wen; Liang, Guan-Lu; Wu, Jing; Shi, Jun-Ting

    2016-01-01

    To investigate the correlation between the preoperative biometric parameters of the anterior segment and the vault after implantable Collamer lens (ICL) implantation via this retrospective study. Retrospective clinical study. A total of 78 eyes from 41 patients who underwent ICL implantation surgery were included in this study. Preoperative biometric parameters, including white-to-white (WTW) diameter, central corneal thickness, keratometer, pupil diameter, anterior chamber depth, sulcus-to-sulcus diameter, anterior chamber area (ACA) and central curvature radius of the anterior surface of the lens (Lenscur), were measured. Lenscur and ACA were measured with Rhinoceros 5.0 software on the image scanned with ultrasound biomicroscopy (UBM). The vault was assessed by UBM 3 months after surgery. Multiple stepwise regression analysis was employed to identify the variables that were correlated with the vault. The results showed that the vault was correlated with 3 variables: ACA (22.4 ± 4.25 mm2), WTW (11.36 ± 0.29 mm) and Lenscur (9.15 ± 1.21 mm). The regressive equation was: vault (mm) = 1.785 + 0.017 × ACA + 0.051 × Lenscur - 0.203 × WTW. Biometric parameters of the anterior segment (ACA, WTW and Lenscur) can predict the vault after ICL implantation using a new regression equation. © 2016 The Author(s) Published by S. Karger AG, Basel.

  5. Biometrics can help protect and safeguard.

    PubMed

    Oakes, Shaun

    2017-06-01

    Shaun Oakes, managing director at ievo, a north-east England-based manufacturer of biometric fingerprint readers, argues that growing use of biometrics technology can improve security and afford better protection to premises, valuable items, and people, across an ever-busier NHS.

  6. 8 CFR 103.7 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.7 Fees. (a) Remittances... copies: $2.00 per copy. (B) Attestation under seal: $2.00 each. (C) Biometric services (Biometric Fee...

  7. 8 CFR 103.7 - Fees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.7 Fees. (a) Remittances... copies: $2.00 per copy. (B) Attestation under seal: $2.00 each. (C) Biometric services (Biometric Fee...

  8. 8 CFR 103.7 - Fees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.7 Fees. (a) Remittances... copies: $2.00 per copy. (B) Attestation under seal: $2.00 each. (C) Biometric services (Biometric Fee...

  9. Feasibility of correlation mapping optical coherence tomography (cmOCT) for anti-spoof sub-surface fingerprinting.

    PubMed

    Zam, Azhar; Dsouza, Roshan; Subhash, Hrebesh M; O'Connell, Marie-Louise; Enfield, Joey; Larin, Kirill; Leahy, Martin J

    2013-09-01

    We propose the use of correlation mapping optical coherence tomography (cmOCT) to deliver additional biometrics associated with the finger that could complement existing fingerprint technology for law enforcement applications. The current study extends the existing fingerprint paradigm by measuring additional biometrics associated with sub-surface finger tissue such as sub-surface fingerprints, sweat glands, and the pattern of the capillary bed to yield a user-friendly cost effective and anti-spoof multi-mode biometric solution associated with the finger. To our knowledge no other method has been able to capture sub-surface fingerprint, papillary pattern and horizontal vessel pattern in a single scan or to show the correspondence between these patterns in live adult human fingertip. Unlike many current technologies this approach incorporates 'liveness' testing by default. The ultimate output is a biometric module which is difficult to defeat and complements fingerprint scanners that currently are used in border control and law enforcement applications. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. The Potential of Using Brain Images for Authentication

    PubMed Central

    Zhou, Zongtan; Shen, Hui; Hu, Dewen

    2014-01-01

    Biometric recognition (also known as biometrics) refers to the automated recognition of individuals based on their biological or behavioral traits. Examples of biometric traits include fingerprint, palmprint, iris, and face. The brain is the most important and complex organ in the human body. Can it be used as a biometric trait? In this study, we analyze the uniqueness of the brain and try to use the brain for identity authentication. The proposed brain-based verification system operates in two stages: gray matter extraction and gray matter matching. A modified brain segmentation algorithm is implemented for extracting gray matter from an input brain image. Then, an alignment-based matching algorithm is developed for brain matching. Experimental results on two data sets show that the proposed brain recognition system meets the high accuracy requirement of identity authentication. Though currently the acquisition of the brain is still time consuming and expensive, brain images are highly unique and have the potential possibility for authentication in view of pattern recognition. PMID:25126604

  11. The potential of using brain images for authentication.

    PubMed

    Chen, Fanglin; Zhou, Zongtan; Shen, Hui; Hu, Dewen

    2014-01-01

    Biometric recognition (also known as biometrics) refers to the automated recognition of individuals based on their biological or behavioral traits. Examples of biometric traits include fingerprint, palmprint, iris, and face. The brain is the most important and complex organ in the human body. Can it be used as a biometric trait? In this study, we analyze the uniqueness of the brain and try to use the brain for identity authentication. The proposed brain-based verification system operates in two stages: gray matter extraction and gray matter matching. A modified brain segmentation algorithm is implemented for extracting gray matter from an input brain image. Then, an alignment-based matching algorithm is developed for brain matching. Experimental results on two data sets show that the proposed brain recognition system meets the high accuracy requirement of identity authentication. Though currently the acquisition of the brain is still time consuming and expensive, brain images are highly unique and have the potential possibility for authentication in view of pattern recognition.

  12. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach

    PubMed Central

    Tan, Robin; Perkowski, Marek

    2017-01-01

    Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the effectiveness and robustness of a biometric recognition system using ECG data acquired from a biosensor integrated into mobile devices. The proposed algorithm is evaluated using a mixed dataset from 184 subjects under different health conditions. The proposed two-stage classifier achieves a total of 99.52% subject verification accuracy, better than the 98.33% accuracy from random forest alone and 96.31% accuracy from wavelet distance measure algorithm alone. These results demonstrate the superiority of the proposed algorithm for biometric identification, hence supporting its practicality in areas such as cloud data security, cyber-security or remote healthcare systems. PMID:28230745

  13. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach.

    PubMed

    Tan, Robin; Perkowski, Marek

    2017-02-20

    Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the effectiveness and robustness of a biometric recognition system using ECG data acquired from a biosensor integrated into mobile devices. The proposed algorithm is evaluated using a mixed dataset from 184 subjects under different health conditions. The proposed two-stage classifier achieves a total of 99.52% subject verification accuracy, better than the 98.33% accuracy from random forest alone and 96.31% accuracy from wavelet distance measure algorithm alone. These results demonstrate the superiority of the proposed algorithm for biometric identification, hence supporting its practicality in areas such as cloud data security, cyber-security or remote healthcare systems.

  14. Biometric and Emotion Identification: An ECG Compression Based Method.

    PubMed

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  15. Biometric and Emotion Identification: An ECG Compression Based Method

    PubMed Central

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  16. The Distinct Biometric Features of High Myopia Compared to Moderate Myopia.

    PubMed

    Chung, Hye Jin; Park, Chan Kee

    2016-12-01

    To evaluate changes in biometric parameters in myopic eyes. 412 eyes of 412 young myopic patients underwent ophthalmic examinations including assessments of refractive error, axial length (AL), anterior chamber depth (ACD), and central corneal thickness (CCT). By using spectral domain optical coherence tomography (SD-OCT), peripapillary retinal nerve fiber layer (pRNFL) thickness was measured. Subjects were divided into two groups: a moderate-myope group (-6 diopters (D) or more) and a high-myope group (less than -6 D). The relationships among ocular biometric parameters including pRNFL thickness, AL, ACD, and CCT were calculated for each group. In the moderate-myopia group, the anterior chamber deepened as AL increased (Pearson's coefficient = 0.346, p < 0.01). However, in the high-myopia group, ACD did not correlate with AL (Pearson's r = 0.065, p = 0.383). Average pRNFL thickness was also more related to SE than AL in highly myopic eyes. In highly myopic eyes, ACD did not increase as AL increased. pRNFL thickness was more related to SE than to AL. That might be due to the uneven elongation of anterior and posterior portions of the eyeball and the discrepancy between distance from the cornea to the fovea and distance from the cornea to the bottom of the eyeball as axial eye elongation. Interpretation of ocular biometric parameter in highly myopic eyes should consider these differences.

  17. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  18. The biometric recognition on contactless multi-spectrum finger images

    NASA Astrophysics Data System (ADS)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  19. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NASA Astrophysics Data System (ADS)

    Kelkboom, Emile J. C.; Breebaart, Jeroen; Buhan, Ileana; Veldhuis, Raymond N. J.

    2010-04-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved protection depends on the size of the key and its closeness to being random. In the literature it can be observed that there is a large variation on the reported key lengths at similar classification performance of the same template protection system, even when based on the same biometric modality and database. In this work we determine the analytical relationship between the system performance and the theoretical maximum key size given a biometric source modeled by parallel Gaussian channels. We consider the case where the source capacity is evenly distributed across all channels and the channels are independent. We also determine the effect of the parameters such as the source capacity, the number of enrolment and verification samples, and the operating point selection on the maximum key size. We show that a trade-off exists between the privacy protection of the biometric system and its convenience for its users.

  20. Super Bowl Surveillance: Facing Up to Biometrics

    DTIC Science & Technology

    2001-05-01

    Biometric facial recognition can provide significant benefits to society. At the same time, the rapid growth and improvement in the technology could...using facial recognition where it can produce positive benefits. Biometric facial recognition is by no means a perfect technology, and much technical

  1. Review of modern biometric user authentication and their development prospects

    NASA Astrophysics Data System (ADS)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  2. Biometrical evaluation of the performance of the revised OECD Test Guideline 402 for assessing acute dermal toxicity.

    PubMed

    Mielke, H; Strickland, J; Jacobs, M N; Mehta, J M

    2017-10-01

    A comprehensive biometrical assessment was conducted to compare the performance of multiple test designs for acute dermal systemic toxicity to support the animal welfare update to the original OECD Test Guideline (TG) 402 for acute dermal toxicity. The test designs evaluated included: (1) two, three, or five animals per dose group (2) evident toxicity or lethality endpoints and (3) absence or presence of a one-animal sighting study. The revision of TG 402 respected the 3R principles (replace, reduce, refine) of animal testing. The results demonstrate that the TG 402 test design can be optimised with reduced animal numbers per test group, such that a scenario of two animals per group following a sighting study at a starting dose of 200 mg/kg bw (unless further information is available to better define the starting dose) would provide a classification which in most cases is conservative, without compromising both the statistical ability of the study to assess dermal toxicity, or the relevant classification outcome. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. The use of three-dimensional ultrasound does not improve training in fetal biometric measurements.

    PubMed

    Chan, Lin W; Ting, Yuen H; Lao, Terence T; Chau, Macy M C; Fung, Tak Y; Leung, Tak Y; Sahota, Daljit S; Lau, Tze K

    2011-09-01

    To investigate whether three-dimensional (3D) technology offers any advantage over two-dimensional (2D) ultrasound in fetal biometric measurement training. Ten midwives with no hands-on experience in ultrasound were randomized to receive training on 2D or 3D ultrasound fetal biometry assessment. Midwives were taught how to obtain fetal biometric measurements (biparietal diameter (BPD), head circumference (HC), abdominal circumference (AC), and femur length (FL)) by a trainer. Subsequently, each midwife measured the parameters on another 10 fetuses. The same set of measurements was repeated by the trainer. The percentage deviation between the midwives' and the trainer's measurements was determined and compared between training groups. Time required for completion was recorded. Frozen images were reviewed by another sonographer to assess the image quality using a standardized scoring system. The median time for the complete set of measurements was significantly shorter in the 2D than in 3D group (13.4 min versus 17.8 min, P = 0.03). The mean percentage deviations did not reach statistical significance between the two groups except for FL (3.83% in 2D group versus 2.23% in 3D group (P = 0.046)). There were no significant differences in the quality scores. This study showed that the only demonstrable advantage of 3D ultrasound was a slightly more accurate measurement of FL, at the expense of a significantly longer time required.

  4. Customized Fetal Growth Charts for Parents' Characteristics, Race, and Parity by Quantile Regression Analysis: A Cross-sectional Multicenter Italian Study.

    PubMed

    Ghi, Tullio; Cariello, Luisa; Rizzo, Ludovica; Ferrazzi, Enrico; Periti, Enrico; Prefumo, Federico; Stampalija, Tamara; Viora, Elsa; Verrotti, Carla; Rizzo, Giuseppe

    2016-01-01

    The purpose of this study was to construct fetal biometric charts between 16 and 40 weeks' gestation that were customized for parental characteristics, race, and parity, using quantile regression analysis. In a multicenter cross-sectional study, 8070 sonographic examinations from low-risk pregnancies between 16 and 40 weeks' gestation were analyzed. The fetal measurements obtained were biparietal diameter, head circumference, abdominal circumference, and femur diaphysis length. Quantile regression was used to examine the impact of parental height and weight, parity, and race across biometric percentiles for the fetal measurements considered. Paternal and maternal height were significant covariates for all of the measurements considered (P < .05). Maternal weight significantly influenced head circumference, abdominal circumference, and femur diaphysis length. Parity was significantly associated with biparietal diameter and head circumference. Central African race was associated with head circumference and femur diaphysis length, whereas North African race was only associated with femur diaphysis length. In this study we constructed customized biometric growth charts using quantile regression in a large cohort of low-risk pregnancies. These charts offer the advantage of defining individualized normal ranges of fetal biometric parameters at each specific percentile corrected for parental height and weight, parity, and race. This study supports the importance of including these variables in routine sonographic screening for fetal growth abnormalities.

  5. NIST biometric evaluations and developments

    NASA Astrophysics Data System (ADS)

    Garris, Michael D.; Wilson, Charles L.

    2005-05-01

    This paper presents an R&D framework used by the National Institute of Standards and Technology (NIST) for biometric technology testing and evaluation. The focus of this paper is on fingerprint-based verification and identification. Since 9-11 the NIST Image Group has been mandated by Congress to run a program for biometric technology assessment and biometric systems certification. Four essential areas of activity are discussed: 1) developing test datasets, 2) conducting performance assessment; 3) technology development; and 4) standards participation. A description of activities and accomplishments are provided for each of these areas. In the process, methods of performance testing are described and results from specific biometric technology evaluations are presented. This framework is anticipated to have broad applicability to other technology and application domains.

  6. Human body as a set of biometric features identified by means of optoelectronics

    NASA Astrophysics Data System (ADS)

    Podbielska, Halina; Bauer, Joanna

    2005-09-01

    Human body posses many unique, singular features that are impossible to copy or forge. Nowadays, to establish and to ensure the public security requires specially designed devices and systems. Biometrics is a field of science and technology, exploiting human body characteristics for people recognition. It identifies the most characteristic and unique ones in order to design and construct systems capable to recognize people. In this paper some overview is given, presenting the achievements in biometrics. The verification and identification process is explained, along with the way of evaluation of biometric recognition systems. The most frequently human biometrics used in practice are shortly presented, including fingerprints, facial imaging (including thermal characteristic), hand geometry and iris patterns.

  7. Demographics and ocular biometric characteristics of patients undergoing cataract surgery in Auckland, New Zealand.

    PubMed

    Yoon, Jinny J; Misra, Stuti L; McGhee, Charles Nj; Patel, Dipika V

    2016-03-01

    The aim is to investigate ethnic variation, in presentation and biometric parameters, within the population undergoing cataract surgery in Auckland. The design is a retrospective study. Four thousand nine hundred thirty-one eyes of 3524 consecutive patients undergoing cataract surgery in Auckland Public Hospital over 18 months were included in the study. Analysis of preoperative medical records was performed. Age, gender, self-reported ethnicity, keratometry, anterior chamber depth, axial length and intraocular lens (IOL) power data were collected. Māori (4.7%) were under-represented compared with the proportion of Māori attending the eye clinic (5.5%) and in the major patient catchment area (8.2%). People of Māori, Pacific and Indian ethnicities presented at a significantly younger age (66.4, 65.9 and 67.9 years, respectively) than those of Caucasian and Asian ethnicities (76.4 and 71.3 years, respectively, P < 0.001). Advanced cataract was more likely in Pacific peoples and Māori than Caucasians. The mean axial length was longest in Asian eyes (23.83 ± 1.52 mm). The mean anterior chamber depth in the eyes of Pacific peoples (3.20 ± 0.39 mm) was significantly greater than that of Caucasians (3.09 ± 0.42 mm, P = 0.001) and Asians (3.05 ± 0.49 mm, P < 0.001). The mean IOL power in Asian eyes was 19.45D. This was significantly lower than the IOL power required by Caucasian (20.72D, P < 0.001) and Pacific ethnicities (20.61D, P = 0.001). With-the-rule astigmatism was highly prevalent in Māori and Pacific peoples, whereas in all other ethnicities, against-the-rule astigmatism was more common. This study identified significant ethnic variation in presentation for cataract surgery and ocular biometric parameters. These data may help identify potential biometric refinements and those at risk of developing ocular morbidities known to be associated with these parameters. © 2015 Royal Australian and New Zealand College of Ophthalmologists.

  8. The effect of fetal sex on customized fetal growth charts.

    PubMed

    Rizzo, Giuseppe; Prefumo, Federico; Ferrazzi, Enrico; Zanardini, Cristina; Di Martino, Daniela; Boito, Simona; Aiello, Elisa; Ghi, Tullio

    2016-12-01

    To evaluate the effect of fetal sex on singleton pregnancy growth charts customized for parental characteristics, race, and parity Methods: In a multicentric cross-sectional study, 8070 ultrasonographic examinations from low-risk singleton pregnancies between 16 and 40 weeks of gestation were considered. The fetal measurements obtained were biparietal diameter (BPD), head circumference (HC), abdominal circumference (AC), and femur length (FL). Quantile regression was used to examine the impact of fetal sex across the biometric percentiles of the fetal measurements considered together with parents' height, weight, parity, and race. Fetal gender resulted to be a significant covariate for BDP, HC, and AC with higher values for male fetuses (p ≤ 0.0009). Minimal differences were found among sexes for FL. Parity, maternal race, paternal height and maternal height, and weight resulted significantly related to the fetal biometric parameters considered independently from fetal gender. In this study, we constructed customized biometric growth charts for fetal sex, parental, and obstetrical characteristics using quantile regression. The use of gender-specific charts offers the advantage to define individualized normal ranges of fetal biometric parameters at each specific centile. This approach may improve the antenatal identification of abnormal fetal growth.

  9. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    NASA Astrophysics Data System (ADS)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  10. The biometric menagerie.

    PubMed

    Yager, Neil; Dunstone, Ted

    2010-02-01

    It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

  11. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOEpatents

    Strait, Robert S.; Pearson, Peter K.; Sengupta, Sailes K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  12. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  13. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  14. 77 FR 36406 - Exemption From Transportation Worker Identification Credential (TWIC) Expiration Provisions for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... threat assessment (STA) and receive a biometric credential called the Transportation Worker... providing new biometric and biographic information at an enrollment center, new STA, payment of the renewal... trips to an enrollment center, and avoid providing new biometric and biographic enrollment information...

  15. Biometric Communication Research for Television.

    ERIC Educational Resources Information Center

    Malik, M. F.

    Biometric communication research is defined as research dealing with the information impact of a film or television show, photographic picture, painting, exhibition, display, or any literary or functional texts or verbal stimuli on human beings, both as individuals and in groups (mass audiences). Biometric communication research consists of a…

  16. 76 FR 44945 - Agency Information Collection Activities: New Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    ... an Internet-based tool that processes, displays, and retrieves biometric and biographic data from the Automated Biometric Identification System (IDENT) within the US- Visitor and Immigrant Status Indicator... process the required biometric and biographic data from an applicant, petitioner, sponsor, beneficiary, or...

  17. 8 CFR 1208.10 - Failure to appear at a scheduled hearing before an immigration judge; failure to follow...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... before an immigration judge; failure to follow requirements for biometrics and other biographical... to follow requirements for biometrics and other biographical information processing. Failure to... requirements for biometrics and other biographical information within the time allowed will result in dismissal...

  18. 8 CFR 1208.10 - Failure to appear at a scheduled hearing before an immigration judge; failure to follow...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... before an immigration judge; failure to follow requirements for biometrics and other biographical... to follow requirements for biometrics and other biographical information processing. Failure to... requirements for biometrics and other biographical information within the time allowed will result in dismissal...

  19. 8 CFR 1208.10 - Failure to appear at a scheduled hearing before an immigration judge; failure to follow...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... before an immigration judge; failure to follow requirements for biometrics and other biographical... to follow requirements for biometrics and other biographical information processing. Failure to... requirements for biometrics and other biographical information within the time allowed will result in dismissal...

  20. 8 CFR 1208.10 - Failure to appear at a scheduled hearing before an immigration judge; failure to follow...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... before an immigration judge; failure to follow requirements for biometrics and other biographical... to follow requirements for biometrics and other biographical information processing. Failure to... requirements for biometrics and other biographical information within the time allowed will result in dismissal...

  1. 78 FR 22522 - Privacy Act of 1974: New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... Privacy Act of 1974 (5 U.S.C. 552a), as amended, titled ``Biometric Verification System (CSOSA-20).'' This... Biometric Verification System allows individuals under supervision to electronically check-in for office... determination. ADDRESSES: You may submit written comments, identified by ``Biometric Verification System, CSOSA...

  2. Reading between the Lines

    ERIC Educational Resources Information Center

    Waters, John K.

    2009-01-01

    Biometrics has been making its way into school districts for the past decade. Biometric tools draw information from a person's identifying physical components, providing a virtually fail-safe level of protection for K-12 schools. In addition to their security uses, biometric systems are currently used in schools for cafeteria purchases, library…

  3. 76 FR 52970 - In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-720] In the Matter of Certain Biometric... accessing its Internet server at http://www.usitc.gov . The public record for this investigation may be... certain biometric scanning devices, components thereof, associated software, and products containing the...

  4. Risk-Based Neuro-Grid Architecture for Multimodal Biometrics

    NASA Astrophysics Data System (ADS)

    Venkataraman, Sitalakshmi; Kulkarni, Siddhivinayak

    Recent research indicates that multimodal biometrics is the way forward for a highly reliable adoption of biometric identification systems in various applications, such as banks, businesses, government and even home environments. However, such systems would require large distributed datasets with multiple computational realms spanning organisational boundaries and individual privacies.

  5. Modular Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2017-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to control communication of data, via the bus, with each of the plurality of data acquisition modules.

  6. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    NASA Astrophysics Data System (ADS)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  7. A cancelable biometric scheme based on multi-lead ECGs.

    PubMed

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition N train = 10 and N test = 10.

  8. Biometrics IRB best practices and data protection

    NASA Astrophysics Data System (ADS)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  9. Multimodal biometric system using rank-level fusion approach.

    PubMed

    Monwar, Md Maruf; Gavrilova, Marina L

    2009-08-01

    In many real-world applications, unimodal biometric systems often face significant limitations due to sensitivity to noise, intraclass variability, data quality, nonuniversality, and other factors. Attempting to improve the performance of individual matchers in such situations may not prove to be highly effective. Multibiometric systems seek to alleviate some of these problems by providing multiple pieces of evidence of the same identity. These systems help achieve an increase in performance that may not be possible using a single-biometric indicator. This paper presents an effective fusion scheme that combines information presented by multiple domain experts based on the rank-level fusion integration method. The developed multimodal biometric system possesses a number of unique qualities, starting from utilizing principal component analysis and Fisher's linear discriminant methods for individual matchers (face, ear, and signature) identity authentication and utilizing the novel rank-level fusion method in order to consolidate the results obtained from different biometric matchers. The ranks of individual matchers are combined using the highest rank, Borda count, and logistic regression approaches. The results indicate that fusion of individual modalities can improve the overall performance of the biometric system, even in the presence of low quality data. Insights on multibiometric design using rank-level fusion and its performance on a variety of biometric databases are discussed in the concluding section.

  10. Reference charts of fetal biometric parameters in 31,476 Brazilian singleton pregnancies.

    PubMed

    Araujo Júnior, Edward; Martins Santana, Eduardo Félix; Martins, Wellington P; Júnior, Julio Elito; Ruano, Rodrigo; Pires, Claudio Rodrigues; Filho, Sebastião Marques Zanforlin

    2014-07-01

    The purpose of this study was to establish reference charts of fetal biometric parameters measured by 2-dimensional sonography in a large Brazilian population. A cross-sectional retrospective study was conducted including 31,476 low-risk singleton pregnancies between 18 and 38 weeks' gestation. The following fetal parameters were measured: biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight. To assess the correlation between the fetal biometric parameters and gestational age, polynomial regression models were created, with adjustments made by the determination coefficient (R(2)). The means ± SDs of the biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight measurements at 18 and 38 weeks were 4.2 ± 2.34 and 9.1 ± 4.0 cm, 15.3 ± 7.56 and 32.3 ± 11.75 cm, 13.3 ± 10.42 and 33.4 ± 20.06 cm, 2.8 ± 2.17 and 7.2 ± 3.58 cm, and 256.34 ± 34.03 and 3169.55 ± 416.93 g, respectively. Strong correlations were observed between all fetal biometric parameters and gestational age, best represented by second-degree equations, with R(2) values of 0.95, 0.96, 0.95, 0.95, and 0.95 for biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight. Fetal biometric parameters were determined for a large Brazilian population, and they may serve as reference values in cases with a high risk of intrauterine growth disorders. © 2014 by the American Institute of Ultrasound in Medicine.

  11. Possibility of spoof attack against robustness of multibiometric authentication systems

    NASA Astrophysics Data System (ADS)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bolme, David S; Tokola, Ryan A; Boehnen, Chris Bensing

    Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive modelsmore » relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.« less

  13. [Biometric ranging of the corpses destroyed at the site of a catastrophe in terms of gender, longitudinal and circumferencial dimensions, and the degree of subcutaneous fat distribution].

    PubMed

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    The quantitative criteria for biometric ranging of destroyed corpses in terms of anatomical localization, gender, longitudinal length, trunk circumference, and the folds of subcutaneous fat are proposed. The wealth of anthropometric materials obtained in the studies of various Caucasoid populations was used to calculate the normative tables for biometric ranging of the decomposed corpses. The proposed technology excludes the subjective assessments for the purpose of such classification at the sites of catastrophes. Moreover, it promotes the accumulation of the variety of valuable information, such as the size of the collar, headwear, and footwear, clothing size and height, and portrait features, that can be used for victim identification.

  14. Secular trend: morphology and performance.

    PubMed

    Sedeaud, Adrien; Marc, Andy; Schipman, Julien; Schaal, Karine; Danial, Mario; Guillaume, Marion; Berthelot, Geoffroy; Toussaint, Jean-François

    2014-01-01

    In a context of morphological expansion of the general population, how do athletes follow such a pattern of anthropometric growth? Is there any relation to performance? Biometric data including mass, height, body mass index (BMI) and age were collected for 50,376 American athletes representing 249,336 annual performers playing in professional baseball, football, ice hockey and basketball. Distributions by mass in National Football League (NFL) players are described by periods. Field goals have been studied in relation to players' height in the National Basketball Association (NBA). Between 1871 and 2011, athletes from the four sports have increased significantly in mass, height and BMI, following a multi-exponential function series. Consequently, biometric differences between athletes and the general population are increasing gradually. Changes in the mass distribution within the NFL show the emergence of a biometrical specificity in relation to the field position. At the professional level, performance remains structured around precise biometric values. In the NBA, a height-attractor at 201.3 ± 6.3 cm for the best scorers is invariant, regardless of the level of play. These results suggest that laws of growth and biometrics drive high-level sport and organise performance around the specific constraint of each field position. Discrepancies between some mass and height developments question the (disproportionate) large mass increase (relative to the height increase) during the 1980s and 1990s.

  15. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  16. 49 CFR 1572.17 - Applicant information required for TWIC security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Border Protection Arrival-Departure Record, Form I-94. (9) Except as described in paragraph (a)(9)(i) of... renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d...

  17. 49 CFR 1572.17 - Applicant information required for TWIC security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Border Protection Arrival-Departure Record, Form I-94. (9) Except as described in paragraph (a)(9)(i) of... renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d...

  18. 75 FR 70290 - In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-17

    ... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-720] In the Matter of Certain Biometric Scanning... also be obtained by accessing its Internet server ( http://www.usitc.gov ). The public record for this... for importation, and sale within the United States after importation of certain biometric scanning...

  19. 49 CFR 1572.17 - Applicant information required for TWIC security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Border Protection Arrival-Departure Record, Form I-94. (9) Except as described in paragraph (a)(9)(i) of... renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d...

  20. 49 CFR 1572.17 - Applicant information required for TWIC security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Border Protection Arrival-Departure Record, Form I-94. (9) Except as described in paragraph (a)(9)(i) of... renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d...

  1. 49 CFR 1572.17 - Applicant information required for TWIC security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Border Protection Arrival-Departure Record, Form I-94. (9) Except as described in paragraph (a)(9)(i) of... renew a TWIC, must submit biometric information to be used for identity verification purposes. If an individual cannot provide the selected biometric, TSA will collect an alternative biometric identifier. (d...

  2. Logistic Map for Cancellable Biometrics

    NASA Astrophysics Data System (ADS)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  3. Entropy Measurement for Biometric Verification Systems.

    PubMed

    Lim, Meng-Hui; Yuen, Pong C

    2016-05-01

    Biometric verification systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter's difficulty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quantifies biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach.

  4. Anterior chamber angle assessment using gonioscopy and ultrasound biomicroscopy.

    PubMed

    Narayanaswamy, Arun; Vijaya, Lingam; Shantha, B; Baskaran, Mani; Sathidevi, A V; Baluswamy, Sukumar

    2004-01-01

    Comparison of anterior chamber angle measurements using ultrasound biomicroscopy (UBM) and gonioscopy. Five hundred subjects were evaluated for grading of angle width by the Shaffer method. UBM was done in the same group to document angle width, angle opening distance (AOD 500), and anterior chamber depth. Biometric parameters were documented in all subjects. UBM and gonioscopic findings were compared. A study was conducted in 282 men and 218 women with a mean age of 57.32 +/- 12.48 years. Gonioscopic grading was used to segregate occludable (slit-like, grades 1 and 2) from nonoccludable (grades 3 and 4) angles. Subjective assessment by gonioscopy resulted in an overestimation of angle width within the occludable group when compared with values obtained by UBM. This did not affect the segregation of occludable versus nonoccludable angles by gonioscopy. Biometric parameters in eyes with occludable angles were significantly lower in comparison with eyes with nonoccludable angles, except for lens thickness. AOD 500 correlated well with angle width. We concluded that clinical segregation into occludable and nonoccludable angles by an experienced observer using gonioscopy is fairly accurate. However, UBM is required for objective quantification of angles, and AOD 500 can be a reliable and standard parameter to grade angle width.

  5. Gaussian Multiscale Aggregation Applied to Segmentation in Hand Biometrics

    PubMed Central

    de Santos Sierra, Alberto; Ávila, Carmen Sánchez; Casanova, Javier Guerra; del Pozo, Gonzalo Bailador

    2011-01-01

    This paper presents an image segmentation algorithm based on Gaussian multiscale aggregation oriented to hand biometric applications. The method is able to isolate the hand from a wide variety of background textures such as carpets, fabric, glass, grass, soil or stones. The evaluation was carried out by using a publicly available synthetic database with 408,000 hand images in different backgrounds, comparing the performance in terms of accuracy and computational cost to two competitive segmentation methods existing in literature, namely Lossy Data Compression (LDC) and Normalized Cuts (NCuts). The results highlight that the proposed method outperforms current competitive segmentation methods with regard to computational cost, time performance, accuracy and memory usage. PMID:22247658

  6. Gaussian multiscale aggregation applied to segmentation in hand biometrics.

    PubMed

    de Santos Sierra, Alberto; Avila, Carmen Sánchez; Casanova, Javier Guerra; del Pozo, Gonzalo Bailador

    2011-01-01

    This paper presents an image segmentation algorithm based on Gaussian multiscale aggregation oriented to hand biometric applications. The method is able to isolate the hand from a wide variety of background textures such as carpets, fabric, glass, grass, soil or stones. The evaluation was carried out by using a publicly available synthetic database with 408,000 hand images in different backgrounds, comparing the performance in terms of accuracy and computational cost to two competitive segmentation methods existing in literature, namely Lossy Data Compression (LDC) and Normalized Cuts (NCuts). The results highlight that the proposed method outperforms current competitive segmentation methods with regard to computational cost, time performance, accuracy and memory usage.

  7. Facial biometrics of peri-oral changes in Crohn's disease.

    PubMed

    Zou, L; Adegun, O K; Willis, A; Fortune, Farida

    2014-05-01

    Crohn's disease is a chronic relapsing and remitting inflammatory condition which affects any part of the gastrointestinal tract. In the oro-facial region, patients can present peri-oral swellings which results in severe facial disfigurement. To date, assessing the degree of facial changes and evaluation of treatment outcomes relies on clinical observation and semi-quantitative methods. In this paper, we describe the development of a robust and reproducible measurement strategy using 3-D facial biometrics to objectively quantify the extent and progression of oro-facial Crohn's disease. Using facial laser scanning, 32 serial images from 13 Crohn's patients attending the Oral Medicine clinic were acquired during relapse, remission, and post-treatment phases. Utilising theories of coordinate metrology, the facial images were subjected to registration, regions of interest identification, and reproducible repositioning prior to obtaining volume measurements. To quantify the changes in tissue volume, scan images from consecutive appointments were compared to the baseline (first scan image). Reproducibility test was performed to ascertain the degree of uncertainty in volume measurements. 3-D facial biometric imaging is a reliable method to identify and quantify peri-oral swelling in Crohn's patients. Comparison of facial scan images at different phases of the disease revealed precisely profile and volume changes. The volume measurements were highly reproducible as adjudged from the 1% standard deviation. 3-D facial biometrics measurements in Crohn's patients with oro-facial involvement offers a quick, robust, economical and objective approach for guided therapeutic intervention and routine assessment of treatment efficacy on the clinic.

  8. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program

    PubMed Central

    Wein, Lawrence M.; Baveja, Manas

    2005-01-01

    Motivated by the difficulty of biometric systems to correctly match fingerprints with poor image quality, we formulate and solve a game-theoretic formulation of the identification problem in two settings: U.S. visa applicants are checked against a list of visa holders to detect visa fraud, and visitors entering the U.S. are checked against a watchlist of criminals and suspected terrorists. For three types of biometric strategies, we solve the game in which the U.S. Government chooses the strategy's optimal parameter values to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses the image quality to minimize the detection probability. At current inspector staffing levels at ports of entry, our model predicts that a quality-dependent two-finger strategy achieves a detection probability of 0.733, compared to 0.526 under the quality-independent two-finger strategy that is currently implemented at the U.S. border. Increasing the staffing level of inspectors offers only minor increases in the detection probability for these two strategies. Using more than two fingers to match visitors with poor image quality allows a detection probability of 0.949 under current staffing levels, but may require major changes to the current U.S. biometric program. The detection probabilities during visa application are ≈11–22% smaller than at ports of entry for all three strategies, but the same qualitative conclusions hold. PMID:15894628

  9. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program.

    PubMed

    Wein, Lawrence M; Baveja, Manas

    2005-05-24

    Motivated by the difficulty of biometric systems to correctly match fingerprints with poor image quality, we formulate and solve a game-theoretic formulation of the identification problem in two settings: U.S. visa applicants are checked against a list of visa holders to detect visa fraud, and visitors entering the U.S. are checked against a watchlist of criminals and suspected terrorists. For three types of biometric strategies, we solve the game in which the U.S. Government chooses the strategy's optimal parameter values to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses the image quality to minimize the detection probability. At current inspector staffing levels at ports of entry, our model predicts that a quality-dependent two-finger strategy achieves a detection probability of 0.733, compared to 0.526 under the quality-independent two-finger strategy that is currently implemented at the U.S. border. Increasing the staffing level of inspectors offers only minor increases in the detection probability for these two strategies. Using more than two fingers to match visitors with poor image quality allows a detection probability of 0.949 under current staffing levels, but may require major changes to the current U.S. biometric program. The detection probabilities during visa application are approximately 11-22% smaller than at ports of entry for all three strategies, but the same qualitative conclusions hold.

  10. Playful biometrics: controversial technology through the lens of play.

    PubMed

    Ellerbrok, Ariane

    2011-01-01

    This article considers the role of play in the context of technological emergence and expansion, particularly as it relates to recently emerging surveillance technologies. As a case study, I consider the trajectory of automated face recognition—a biometric technology of numerous applications, from its more controversial manifestations under the rubric of national security to a clearly emerging orientation toward play. This shift toward “playful” biometrics—or from a technology traditionally coded as “hard” to one now increasingly coded as “soft”—is critical insofar as it renders problematic the traditional modes of critique that have, up until this point, challenged the expansion of biometric systems into increasingly ubiquitous realms of everyday life. In response to this dynamic, I propose theorizing the expansion of face recognition specifically in relation to “play,” a step that allows us to broaden the critical space around newly emerging playful biometrics, as well as playful surveillance more generally. In addition, play may also have relevance for theorizing other forms of controversial technology, particularly given its potential role in processes of obfuscation, normalization, and marginalization.

  11. Person identification in irregular cardiac conditions using electrocardiogram signals.

    PubMed

    Sidek, Khairul Azami; Khalil, Ibrahim

    2011-01-01

    This paper presents a person identification mechanism in irregular cardiac conditions using ECG signals. A total of 30 subjects were used in the study from three different public ECG databases containing various abnormal heart conditions from the Paroxysmal Atrial Fibrillation Predicition Challenge database (AFPDB), MIT-BIH Supraventricular Arrthymia database (SVDB) and T-Wave Alternans Challenge database (TWADB). Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. In order to measure the efficiency of this simple yet effective matching algorithm, two biometric performance metrics were used which are false acceptance rate (FAR) and false reject rate (FRR). Our experimentation results suggest that ECG based biometric identification with irregular cardiac condition gives a higher recognition rate of different ECG signals when tested for three different abnormal cardiac databases yielding false acceptance rate (FAR) of 2%, 3% and 2% and false reject rate (FRR) of 1%, 2% and 0% for AFPDB, SVDB and TWADB respectively. These results also indicate the existence of salient biometric characteristics in the ECG morphology within the QRS complex that tends to differentiate individuals.

  12. Biometric values, C-reactive protein, and proteinogram of healthy blonde capuchin (Sapajus flavius) kept in northeast of Brazil.

    PubMed

    Mota, Stéphanie Machado; Ferreira, Adriano Fernandes; Azevedo, Jair; Nery, Thiago Lopes; Zermiani, Fabiana; Queiroga, Felisbina Luisa

    2016-12-01

    Sapajus flavius is a species of capuchin monkey classified as critically endangered. Studies related to their biometric values are scarce with incomplete external measurement reports available from only four specimens. Moreover, information regarding proteinogram is limited with no reference to C-reactive protein (CRP) and globulin fractions for this species. Biometric values, CRP, and proteinogram were determined for 12 clinically healthy S. flavius, kept in captivity in João Pessoa, Brazil. The measured values in biometric parameters present a tendency to be higher in males. The CRP mean values from 12 S. flavius were 1.2±0.2 mg/dL. For albumin, alpha, beta, and gamma globulin fraction parameters, the reference interval was calculated. Authors believe that with certain limitations, results obtained can be helpful for the populations in the wild, which could be of great aid in detecting unhealthy individuals and therefore contributing to the conservation of this species. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  13. A Collaborative Evaluation Framework for Biometric Connected Devices in Healthcare.

    PubMed

    Farnia, Troskah; Jaulent, Marie Christine; Marchand, Guillaume; Yasini, Mobin

    2017-01-01

    A large number of biometric connected devices are currently available with a variety of designs. Healthcare users cannot easily choose the reliable ones that correspond the best to their healthcare problems. The existing evaluation methods do not consider at the same time aspects of connectivity and healthcare usage. In this study, a collaborative evaluation framework for biometric connected devices in healthcare usage is proposed. This framework contains six dimensions: medical validity, technical reliability, usability, ergonomy, legal compliance, and accuracy of measurements. In a first step, these dimensions were assessed by designing a self administered questionnaire answered by the stakeholders (patients, health professionals, payers, and manufacturers). A case study was then carried out in a second step to test this framework in a project of telemonitoring for heart failure patients. The results are in favor of the efficiency of the proposed framework as a decision making tool in healthcare usage.

  14. Comparing Multiple Criteria for Species Identification in Two Recently Diverged Seabirds

    PubMed Central

    Militão, Teresa; Gómez-Díaz, Elena; Kaliontzopoulou, Antigoni; González-Solís, Jacob

    2014-01-01

    Correct species identification is a crucial issue in systematics with key implications for prioritising conservation effort. However, it can be particularly challenging in recently diverged species due to their strong similarity and relatedness. In such cases, species identification requires multiple and integrative approaches. In this study we used multiple criteria, namely plumage colouration, biometric measurements, geometric morphometrics, stable isotopes analysis (SIA) and genetics (mtDNA), to identify the species of 107 bycatch birds from two closely related seabird species, the Balearic (Puffinus mauretanicus) and Yelkouan (P. yelkouan) shearwaters. Biometric measurements, stable isotopes and genetic data produced two stable clusters of bycatch birds matching the two study species, as indicated by reference birds of known origin. Geometric morphometrics was excluded as a species identification criterion since the two clusters were not stable. The combination of plumage colouration, linear biometrics, stable isotope and genetic criteria was crucial to infer the species of 103 of the bycatch specimens. In the present study, particularly SIA emerged as a powerful criterion for species identification, but temporal stability of the isotopic values is critical for this purpose. Indeed, we found some variability in stable isotope values over the years within each species, but species differences explained most of the variance in the isotopic data. Yet this result pinpoints the importance of examining sources of variability in the isotopic data in a case-by-case basis prior to the cross-application of the SIA approach to other species. Our findings illustrate how the integration of several methodological approaches can help to correctly identify individuals from recently diverged species, as each criterion measures different biological phenomena and species divergence is not expressed simultaneously in all biological traits. PMID:25541978

  15. First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data

    PubMed Central

    Serwaa-Bonsu, Adwoa; Herbst, Abraham J.; Reniers, Georges; Ijaa, Wilfred; Clark, Benjamin; Kabudula, Chodziwadziwa; Sankoh, Osman

    2010-01-01

    Background In developing countries, Health and Demographic Surveillance Systems (HDSSs) provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS). Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. Objective To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. Methodology Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. Results Adult (18–65 years) fingerprint enrolment rates varied between 94.1% (95% CI 93.6–94.5) for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9–97.6) for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site) were only 55.1% (95% CI 52.7–57.4). By age 5, child fingerprint enrolment rates were comparable to those of adults. Conclusion This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the more restrictive health service perspective. PMID:20200659

  16. Indexation of cardiac output to biometric parameters in critically ill patients: A systematic analysis of a transpulmonary thermodilution-derived database.

    PubMed

    Saugel, Bernd; Mair, Sebastian; Götz, Simon Q; Tschirdewahn, Julia; Frank, Johanna; Höllthaler, Josef; Schmid, Roland M; Huber, Wolfgang

    2015-10-01

    Cardiac output (CO) (liters per minute) is usually normalized (ie, indexed) to the patient's body surface area (BSA) resulting in the hemodynamic variable cardiac index (CI) (liters per minute per square meter). We aimed (1) to evaluate the impact of different body weight-based CO indexations on the resulting CI values and (2) to identify biometric parameters independently associated with CO in critically ill patients. The study is an analysis of a database containing transpulmonary thermodilution-derived hemodynamic variables of 234 medical intensive care unit patients. Cardiac index indexed to actual BSA was statistically significantly lower compared with CI indexed to predicted BSA in the totality of patients and in the subgroups of patients with body mass index greater than or equal to 25 kg/m(2) but less than 30 kg/m(2) and body mass index greater than or equal to 30 kg/m(2) (with a statistically significant difference in the proportion of low and high CI measurements). Multivariate analysis of the first CO measurement of each patient demonstrated that CO was independently associated with age (P < .001), height (P = .001), and actual body weight (BWact) (P = .030). Multivariate analysis of the mean of the patients' CO measurements confirmed age (P < .001), height (P = .001), and BWact (P < .001) as biometric factors independently associated with CO. Age was identified as the most important factor with each year of age decreasing CO by 66 mL/min (95% confidence interval, 47-86 mL/min). The indexation of CO to BSA is highly dependent on the body weight estimation formula used to calculate BSA. Cardiac output is independently associated with the biometric factors age, height, and BWact. These factors might be considered for indexation of CO. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Biometric Authentication for Gender Classification Techniques: A Review

    NASA Astrophysics Data System (ADS)

    Mathivanan, P.; Poornima, K.

    2017-12-01

    One of the challenging biometric authentication applications is gender identification and age classification, which captures gait from far distance and analyze physical information of the subject such as gender, race and emotional state of the subject. It is found that most of the gender identification techniques have focused only with frontal pose of different human subject, image size and type of database used in the process. The study also classifies different feature extraction process such as, Principal Component Analysis (PCA) and Local Directional Pattern (LDP) that are used to extract the authentication features of a person. This paper aims to analyze different gender classification techniques that help in evaluating strength and weakness of existing gender identification algorithm. Therefore, it helps in developing a novel gender classification algorithm with less computation cost and more accuracy. In this paper, an overview and classification of different gender identification techniques are first presented and it is compared with other existing human identification system by means of their performance.

  18. Biometric studies on premetamorphic eel larvae of Anguilla anguilla (Anguilliformes: Anguillidae) in comparison with younger developmental stages of the species

    NASA Astrophysics Data System (ADS)

    Strehlow, B.

    1996-09-01

    387 premetamorphic leptocephali of the family Anguillidae caught off the west coast of Europe were examined taxonomically and compared with the youngest developmental stages of larvae of Anguilla anguilla caught in the Sargasso Sea 1979 (Schoth, 1982). The total number of myomeres and the number of myomeres up to the third, opistonephritic blood vessel present features of this species which are significantly different from those of the larvae of Anguilla rostrata and do not change during the whole larval phase. A combination of these two biometric features enables an infallible species identification of the Atlantic Anguilla larvae at all developmental stages. The number of predorsal and preanal myomeres, the preanal length and features of the head cannot be used for a distinction of Anguilla larvae. One larva, 68.7 mm long, with 107 myomeres, and 44 myomeres to the opistonephritic blood vessel represents the hitherto southernmost record of an A. rostrata larva in the eastern North Atlantic.

  19. A penalized framework for distributed lag non-linear models.

    PubMed

    Gasparrini, Antonio; Scheipl, Fabian; Armstrong, Ben; Kenward, Michael G

    2017-09-01

    Distributed lag non-linear models (DLNMs) are a modelling tool for describing potentially non-linear and delayed dependencies. Here, we illustrate an extension of the DLNM framework through the use of penalized splines within generalized additive models (GAM). This extension offers built-in model selection procedures and the possibility of accommodating assumptions on the shape of the lag structure through specific penalties. In addition, this framework includes, as special cases, simpler models previously proposed for linear relationships (DLMs). Alternative versions of penalized DLNMs are compared with each other and with the standard unpenalized version in a simulation study. Results show that this penalized extension to the DLNM class provides greater flexibility and improved inferential properties. The framework exploits recent theoretical developments of GAMs and is implemented using efficient routines within freely available software. Real-data applications are illustrated through two reproducible examples in time series and survival analysis. © 2017 The Authors Biometrics published by Wiley Periodicals, Inc. on behalf of International Biometric Society.

  20. Developing a multimodal biometric authentication system using soft computing methods.

    PubMed

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  1. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  2. Morphological study of the palatal rugae in western Indian population.

    PubMed

    Gondivkar, Shailesh M; Patel, Swetal; Gadbail, Amol R; Gaikwad, Rahul N; Chole, Revant; Parikh, Rima V

    2011-10-01

    The aim of this study was to identify and compare the different morphological rugae patterns in males and females of western Indian population, which may be an additional method of identification in cases of crimes or aircraft accidents. A total of 108 plaster casts, equally distributed between the sexes and belonging to similar age-group, were examined for different biometric characteristics of the palatal rugae including number, shape, length, direction and unification and their incidence recorded. Association between these rugae biometric characteristics and sex were tested using chi-square analysis and statistical descriptors were identified for each of these parameters using the SPSS 15.0. The study revealed a statistically significant difference in the total number of rugae between the two sexes (P = 0.000). The different types of rugae between the males and females were statistically compared. The female showed a highly significant difference in the sinuous (P = 0.002) and primary type (P = 0.000) while the male had a significant difference in the unification (P = 0.005). The predominant direction of the rugae was found to be forward relative to backward. It may be concluded that the rugae pattern can be an additional method of differentiation between the male and female in conjunction with the other methods such as visual, fingerprints, and dental characteristics in forensic sciences. Copyright © 2011 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  3. Biometric template transformation: a security analysis

    NASA Astrophysics Data System (ADS)

    Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.

    2010-01-01

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

  4. Dental x-ray image segmentation

    NASA Astrophysics Data System (ADS)

    Said, Eyad; Fahmy, Gamal F.; Nassar, Diaa; Ammar, Hany

    2004-08-01

    Law enforcement agencies have been exploiting biometric identifiers for decades as key tools in forensic identification. With the evolution in information technology and the huge volume of cases that need to be investigated by forensic specialists, it has become important to automate forensic identification systems. While, ante mortem (AM) identification, that is identification prior to death, is usually possible through comparison of many biometric identifiers, postmortem (PM) identification, that is identification after death, is impossible using behavioral biometrics (e.g. speech, gait). Moreover, under severe circumstances, such as those encountered in mass disasters (e.g. airplane crashers) or if identification is being attempted more than a couple of weeks postmortem, under such circumstances, most physiological biometrics may not be employed for identification, because of the decay of soft tissues of the body to unidentifiable states. Therefore, a postmortem biometric identifier has to resist the early decay that affects body tissues. Because of their survivability and diversity, the best candidates for postmortem biometric identification are the dental features. In this paper we present an over view about an automated dental identification system for Missing and Unidentified Persons. This dental identification system can be used by both law enforcement and security agencies in both forensic and biometric identification. We will also present techniques for dental segmentation of X-ray images. These techniques address the problem of identifying each individual tooth and how the contours of each tooth are extracted.

  5. Fusion of Dependent and Independent Biometric Information Sources

    DTIC Science & Technology

    2005-03-01

    palmprint , DNA, ECG, signature, etc. The comparison of various biometric techniques is given in [13] and is presented in Table 1. Since, each...theory. Experimental studies on the M2VTS database [32] showed that a reduction in error rates is up to about 40%. Four combination strategies are...taken from the CEDAR benchmark database . The word recognition results were the highest (91%) among published results for handwritten words (before 2001

  6. The influence of maternal smoking on transferrin sialylation and fetal biometric parameters.

    PubMed

    Wrześniak, Marta; Królik, Małgorzata; Kepinska, Marta; Milnerowicz, Halina

    2016-10-01

    Transferrin is a glycosylated protein responsible for transporting iron, an essential metal responsible for proper fetal development. Tobacco is a heavily used xenobiotic having a negative impact on the human body and pregnancy outcomes. Aims of this study was to examine the influence of tobacco smoking on transferrin sialic acid residues and their connection with fetal biometric parameters in women with iron-deficiency. The study involved 173 samples from pregnant women, smokers and non-smokers, iron deficient and not. Transferrin sialylation was determined by capillary electrophoresis. The cadmium (Cd) level was measured by atomic absorption and the sialic acid concentration by the resorcinol method. Women with iron deficiencies who smoked gave birth earlier than non-smoking, non-iron-deficient women. The Cd level, but not the cotinine level, was positively correlated with transferrin sialylation in the blood of iron-deficient women who smoked; 3-, 4-, 5- and 6-sialoTf correlated negatively with fetal biometric parameters in the same group. It has been shown the relationship between Cd from tobacco smoking and fetal biometric parameters observed only in the iron deficient group suggests an additive effect of these two factors, and indicate that mothers with anemia may be more susceptible to Cd toxicity and disturbed fetal development. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Biometrics Technology

    DTIC Science & Technology

    2012-03-13

    aspects associated with the use of fingerprinting. Another form of physical biometrics is facial recognition . ― Facial recognition unlike other...have originated back to the early 1960s. ―One of the leading pioneers in facial recognition biometrics was Woodrow W. Bledsoe who developed a...identified match. There are several advantages associated with Facial recognition . It is highly reliable, used extensively in security systems, and

  8. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  9. Effect of Cycloplegia on Corneal Biometrics and Refractive State.

    PubMed

    Bagheri, Abbas; Feizi, Mohadeseh; Shafii, Aliakbar; Faramarzi, Amir; Tavakoli, Mehdi; Yazdani, Shahin

    2018-01-01

    To determine changes in refractive state and corneal parameters after cycloplegia with cyclopentolate hydrochloride 1% using a dual Scheimpflug imaging system. In this prospective cross-sectional study patients aged 10 to 40 years who were referred for optometric evaluation enrolled and underwent autorefraction and corneal imaging with the Galilei dual Scheimpflug system before and 30 minutes after twice instillation of medication. Changes in refraction and astigmatism were investigated. Corneal biometrics including anterior and posterior corneal curvatures, total corneal power and corneal pachymetry were compared before and after cycloplegia. Two hundred and twelve eyes of 106 subjects with mean age of 28 ± 5 years including 201 myopic and 11 hyperopic eyes were evaluated. Mean spherical equivalent refractive error before cycloplegia was -3.4 ± 2.6 D. A mean hyperopic shift of 0.4 ± 0.5 D occurred after cycloplegia ( P < 0.001). The astigmatism power did not significantly change ( P = 0.8), however, 26.8% of eyes with significant astigmatism experienced a change of more than 5 degrees in the axis of astigmatism. Changes in posterior corneal curvature were scant but statistically significant ( P = 0.001). Moreover, corneal thickness was slightly increased in the central and paracentral regions ( P < 0.001 and P < 0.001, respectively). Cycloplegia causes a hyperopic shift and astigmatism axis changes, along with an increase in central and paracentral corneal thickness and change in posterior corneal curvature. The effects of cycloplegia on refraction and corneal biometrics should be considered before cataract and refractive surgeries.

  10. Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence

    NASA Astrophysics Data System (ADS)

    Hildebrandt, Mario; Dittmann, Jana

    2015-03-01

    Optical, nano-meter range, contactless, non-destructive sensor devices are promising acquisition techniques in crime scene trace forensics, e.g. for digitizing latent fingerprint traces. Before new approaches are introduced in crime investigations, innovations need to be positively tested and quality ensured. In this paper we investigate sensor reproducibility by studying different scans from four sensors: two chromatic white light sensors (CWL600/CWL1mm), one confocal laser scanning microscope, and one NIR/VIS/UV reflection spectrometer. Firstly, we perform an intra-sensor reproducibility testing for CWL600 with a privacy conform test set of artificial-sweat printed, computer generated fingerprints. We use 24 different fingerprint patterns as original samples (printing samples/templates) for printing with artificial sweat (physical trace samples) and their acquisition with contactless sensory resulting in 96 sensor images, called scan or acquired samples. The second test set for inter-sensor reproducibility assessment consists of the first three patterns from the first test set, acquired in two consecutive scans using each device. We suggest using a simple feature space set in spatial and frequency domain known from signal processing and test its suitability for six different classifiers classifying scan data into small differences (reproducible) and large differences (non-reproducible). Furthermore, we suggest comparing the classification results with biometric verification scores (calculated with NBIS, with threshold of 40) as biometric reproducibility score. The Bagging classifier is nearly for all cases the most reliable classifier in our experiments and the results are also confirmed with the biometric matching rates.

  11. Biometric recognition via fixation density maps

    NASA Astrophysics Data System (ADS)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  12. Integrating Iris and Signature Traits for Personal Authentication Using User-Specific Weighting

    PubMed Central

    Viriri, Serestina; Tapamo, Jules R.

    2012-01-01

    Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR) of 0.08% and a false acceptance rate (FAR) of 0.01%. PMID:22666032

  13. Genetics, biometrics and the informatization of the body.

    PubMed

    van der Ploeg, Irma

    2007-01-01

    "Genetics" is a term covering a wide set of theories, practices, and technologies, only some of which overlap with the practices and technologies of biometrics. In this paper some current technological developments relating to biometric applications of genetics will be highlighted. Next, the author will elaborate the notion of the informatization of the body, by means of a brief philosophical detour on the dualisms of language and reality, words and things. In the subsequent sections she will then draw out some of the questions relevant to the purposes of Biometrics Identification Technology Ethics (BITE), and discuss the ethical problems associated with the informatization of the body. There are, however some problems and limitations to the currently dominant ethical discourse to deal with all things ethical in relation to information technology in general, and biometrics or genetics in particular. The final section will discuss some of these meta-problems.

  14. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers.

    PubMed

    Sun, Yunlian; Zhang, Man; Sun, Zhenan; Tan, Tieniu

    2018-02-01

    Biometrics is the technique of automatically recognizing individuals based on their biological or behavioral characteristics. Various biometric traits have been introduced and widely investigated, including fingerprint, iris, face, voice, palmprint, gait and so forth. Apart from identity, biometric data may convey various other personal information, covering affect, age, gender, race, accent, handedness, height, weight, etc. Among these, analysis of demographics (age, gender, and race) has received tremendous attention owing to its wide real-world applications, with significant efforts devoted and great progress achieved. This survey first presents biometric demographic analysis from the standpoint of human perception, then provides a comprehensive overview of state-of-the-art advances in automated estimation from both academia and industry. Despite these advances, a number of challenging issues continue to inhibit its full potential. We second discuss these open problems, and finally provide an outlook into the future of this very active field of research by sharing some promising opportunities.

  15. Optimization of a Biometric System Based on Acoustic Images

    PubMed Central

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J.; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  16. Use of Biometrics within Sub-Saharan Refugee Communities

    DTIC Science & Technology

    2013-12-01

    fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity. Biometrics creates and...Biometrics typically comprises fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity...authentication because it identifies an individual based on mathematical analysis of the random pattern visible within the iris. Facial recognition is

  17. Public Enlightenment Education on the Acceptance of Fingerprint Biometric Technology for Administration in Academic Institutions and Other Organizations

    ERIC Educational Resources Information Center

    Eze, Samuel Godwin; Chijioke, Edmond Ogochukwu

    2016-01-01

    This research presents the overview of the origin of fingerprint biometric technology, the opinion of the public on the acceptance of fingerprint biometric technology and the means of instilling confidence on the public for the total acceptance of the technology. Data was collected with the aid of a lecture and structured questionnaires…

  18. Using Biometric Measurement in Real-Time as a Sympathetic System in Computer Games

    ERIC Educational Resources Information Center

    Charij, Stephanie; Oikonomou, Andreas

    2013-01-01

    With the increasing potential for gaming hardware and peripherals to support biometrics, their application within the games industry for software and design should be considered. This paper assesses the ability to use a form of biometric measurement, heart rate, in real-time to improve the challenge and enjoyment of a game by catering it to…

  19. Robust and Reusable Fuzzy Extractors

    NASA Astrophysics Data System (ADS)

    Boyen, Xavier

    The use of biometric features as key material in security protocols has often been suggested to relieve their owner from the need to remember long cryptographic secrets. The appeal of biometric data as cryptographic secrets stems from their high apparent entropy, their availability to their owner, and their relative immunity to loss. In particular, they constitute a very effective basis for user authentication, especially when combined with complementary credentials such as a short memorized password or a physical token. However, the use of biometrics in cryptography does not come without problems. Some difficulties are technical, such as the lack of uniformity and the imperfect reproducibility of biometrics, but some challenges are more fundamental.

  20. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  1. Data Acquisition for Modular Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Grodsinsky, Carlos M. (Inventor); Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  2. Biometrics, identification and surveillance.

    PubMed

    Lyon, David

    2008-11-01

    Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the lived experience of the body including the orientation to others. It is proposed that creators of national ID systems in particular address these crucial deficiencies in their attempt to provide new modes of verification.

  3. Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

    PubMed Central

    Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729

  4. Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

    PubMed

    Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  5. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  6. Secure voice-based authentication for mobile devices: vaulted voice verification

    NASA Astrophysics Data System (ADS)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  7. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  8. Modular biometric system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Viazanko, Michael; O'Looney, Jimmy; Szu, Harold

    2009-04-01

    Modularity Biometric System (MBS) is an approach to support AiTR of the cooperated and/or non-cooperated standoff biometric in an area persistent surveillance. Advanced active and passive EOIR and RF sensor suite is not considered here. Neither will we consider the ROC, PD vs. FAR, versus the standoff POT in this paper. Our goal is to catch the "most wanted (MW)" two dozens, separately furthermore ad hoc woman MW class from man MW class, given their archrivals sparse front face data basis, by means of various new instantaneous input called probing faces. We present an advanced algorithm: mini-Max classifier, a sparse sample realization of Cramer-Rao Fisher bound of the Maximum Likelihood classifier that minimize the dispersions among the same woman classes and maximize the separation among different man-woman classes, based on the simple feature space of MIT Petland eigen-faces. The original aspect consists of a modular structured design approach at the system-level with multi-level architectures, multiple computing paradigms, and adaptable/evolvable techniques to allow for achieving a scalable structure in terms of biometric algorithms, identification quality, sensors, database complexity, database integration, and component heterogenity. MBS consist of a number of biometric technologies including fingerprints, vein maps, voice and face recognitions with innovative DSP algorithm, and their hardware implementations such as using Field Programmable Gate arrays (FPGAs). Biometric technologies and the composed modularity biometric system are significant for governmental agencies, enterprises, banks and all other organizations to protect people or control access to critical resources.

  9. Crop biometric maps: the key to prediction.

    PubMed

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-09-23

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  10. Crop Biometric Maps: The Key to Prediction

    PubMed Central

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-01-01

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed. PMID:24064605

  11. New biometric modalities using internal physical characteristics

    NASA Astrophysics Data System (ADS)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  12. Biometrics: A Look at Facial Recognition

    DTIC Science & Technology

    a facial recognition system in the city’s Oceanfront tourist area. The system has been tested and has recently been fully implemented. Senator...Kenneth W. Stolle, the Chairman of the Virginia State Crime Commission, established a Facial Recognition Technology Sub-Committee to examine the issue of... facial recognition technology. This briefing begins by defining biometrics and discussing examples of the technology. It then explains how biometrics

  13. Biometrics in Government, Post-9/11: Advancing Science, Enhancing Operations

    DTIC Science & Technology

    2008-08-01

    responsibilities include advising the President in policy formulation and budget development on all questions in which S&T are important elements; articulating the...group of approximately 30 individuals from government, industry, and academia were in a hotel conference room in Orlando, Fla., at a Biometric...of a set of usability guidelines for biometric systems that enhance performance (throughput and quality), improve user satisfaction and acceptance

  14. Real-time Identification System using Mobile Hand-held Devices: Mobile Biometrics Evaluation Framework

    DTIC Science & Technology

    2014-04-01

    must be done to determine current infrastructure and capabilities so that necessary updates and changes can be addressed up front. Mobile biometric...with existing satellite communications infrastructure . 20 PSTP 03-427BIOM 4 State of Mobile Biometric Device Market 4.1 Fingerprint...is a wireless information system highlighted by Real-time wireless data collection mobile device independence, wireless infrastructure independence

  15. Sagittal Thoracic and Lumbar Spine Profiles in Upright Standing and Lying Prone Positions Among Healthy Subjects: Influence of Various Biometric Features.

    PubMed

    Salem, Walid; Coomans, Ysaline; Brismée, Jean-Michel; Klein, Paul; Sobczak, Stéphane; Dugailly, Pierre-Michel

    2015-08-01

    A prospective study was performed on the assessment of both thoracic and lumbar spine sagittal profiles (from C7 to S1). To propose a new noninvasive method for measuring the spine curvatures in standing and lying prone positions and to analyze their relationship with various biometric characteristics. Modifications of spine curvatures (i.e. lordosis or kyphosis) are of importance in the development of spinal disorders. Studies have emphasized the development of new devices to measure the spine sagittal profiles using a noninvasive and low-cost method. To date, it has not been applied for analyzing both lumbar and thoracic alterations for various positioning. Seventy-five healthy subjects (mean 22.6 ± 4.3 yr) were recruited to participate in this study. Thoracic and lumbar sagittal profiles were assessed in standing and lying prone positions using a 3D digitizer. In addition, several biometric data were collected including maximal trunk isometric strength for flexion and extension movement. Statistical analysis consisted in data comparisons of spine profiles and a multivariate analysis including biometric features, to classify individuals considering low within- and high between-variability. Kyphosis and lordosis angles decreased significantly from standing to lying prone position by an average of 13.4° and 16.6°, respectively. Multivariate analysis showed a sample clustering of 3 homogenous subgroups. The first group displayed larger lordosis and flexibility, and had low data values for height, weight, and strength. The second group had lower values than the overall trend of the whole sample, whereas the third group had larger score values for the torques, height, weight, waist, body mass index, and kyphosis angle but a reduced flexibility. The present results demonstrate a significant effect of the positioning on both thoracic and lumbar spine sagittal profiles and highlight the use of cluster analysis to categorize subgroups after biometric characteristics including curvature measurement. N/A.

  16. Seasonal variations in red deer (Cervus elaphus) hematology related to antler growth and biometrics measurements.

    PubMed

    Gaspar-López, Enrique; Landete-Castillejos, Tomás; Estevez, Jose Antonio; Ceacero, Francisco; Gallego, Laureano; García, Andrés Jose

    2011-04-01

    The aim of the study was to relate seasonal hematology changes with the rest of physiological variations suffered by red deer, such as antler and biometrics cycle, and to assess the relationship between hematology and the effort performed in antler development. Blood samples were taken from 21 male red deer every 4 weeks during 18 months. Samples were analyzed for the main hematological parameters. Simultaneously, biometrics measurements were taken, such as antler length, body weight, body condition score, testicular diameter (TD), and thoracic and neck girth. All the blood cell types (erythrocytes, leukocytes, and platelets) showed seasonal variations, increasing as antler cleaning approached, as did hematocrit and hemoglobin. The final size of antlers was negatively related to leukocyte count, nonlymphoid leukocyte count, red cell distribution width, mean corpuscular hemoglobin, mean platelet volume, and TD, whereas it was positively related to body condition during antler growth. Huge seasonal variations in some hematological values have been found to be related to changes in antler and biometrics measurements. Since these variations are even greater than the caused by deer handling, they should be taken into account when evaluating hematology in deer populations. Copyright © 2011 Wiley-Liss, Inc., A Wiley Company.

  17. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  18. Fetal Biometric Charts and Reference Equations for Pregnant Women Living in Port Said and Ismailia Governorates in Egypt.

    PubMed

    Hegab, Moustafa; Midan, Mahmoud Farouk; Taha, Tamer; Bibars, Mamdouh; Wakeel, Khaled Helmi El; Amer, Hesham; Azmy, Osama

    2018-05-20

    To construct new fetal biometric charts and equations for some fetal biometric parameters for women between 12 th and 41 st weeks living in Ismailia and Port Said Governorates in Egypt. This cross-sectional study was carried out on 656 Egyptian women (from Ismailia and Port Said governorates) with an uncomplicated pregnancy, and all were sure of their dates. The selected group was between the 12 th and 41 st weeks of gestation, recruited from the district general hospital in Ismailia and Port Said to measure ultrasonographically biparietal diameter (BPD), head circumference (HC), abdominal circumference (AC) and femur length (FL), then for each measurement separate regression models were fitted to estimate both the mean and the Standard deviation at each gestational age. New Egyptian charts were reported for BPD, HC, AC, and FL. Reference equations for the dating of pregnancy were presented. The mean of the previous measurements at 12 th and 41 st weeks were as follows: (23.37, 98.72), (83.05, 336.12), (67.85, 332.57) and (12.50, 74.92) respectively. New fetal biometric charts and regression equations for pregnant women living in Port Said & Ismailia governorates in Egypt.

  19. On continuous user authentication via typing behavior.

    PubMed

    Roth, Joseph; Liu, Xiaoming; Metaxas, Dimitris

    2014-10-01

    We hypothesize that an individual computer user has a unique and consistent habitual pattern of hand movements, independent of the text, while typing on a keyboard. As a result, this paper proposes a novel biometric modality named typing behavior (TB) for continuous user authentication. Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. Unlike the typical continuous biometrics, such as keystroke dynamics (KD), TB provides a reliable authentication with a short delay, while avoiding explicit key-logging. We collect a video database where 63 unique subjects type static text and free text for multiple sessions. For one typing video, the hands are segmented in each frame and a unique descriptor is extracted based on the shape and position of hands, as well as their temporal dynamics in the video sequence. We propose a novel approach, named bag of multi-dimensional phrases, to match the cross-feature and cross-temporal pattern between a gallery sequence and probe sequence. The experimental results demonstrate a superior performance of TB when compared with KD, which, together with our ultrareal-time demo system, warrant further investigation of this novel vision application and biometric modality.

  20. Eye safety related to near infrared radiation exposure to biometric devices.

    PubMed

    Kourkoumelis, Nikolaos; Tzaphlidou, Margaret

    2011-03-01

    Biometrics has become an emerging field of technology due to its intrinsic security features concerning the identification of individuals by means of measurable biological characteristics. Two of the most promising biometric modalities are iris and retina recognition, which primarily use nonionizing radiation in the infrared region. Illumination of the eye is achieved by infrared light emitting diodes (LEDs). Even if few LED sources are capable of causing direct eye damage as they emit incoherent light, there is a growing concern about the possible use of LED arrays that might pose a potential threat. Exposure to intense coherent infrared radiation has been proven to have significant effects on living tissues. The purpose of this study is to explore the biological effects arising from exposing the eye to near infrared radiation with reference to international legislation.

  1. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  2. Atlantic Bluefin Tuna (Thunnus thynnus) Biometrics and Condition.

    PubMed

    Rodriguez-Marin, Enrique; Ortiz, Mauricio; Ortiz de Urbina, José María; Quelle, Pablo; Walter, John; Abid, Noureddine; Addis, Piero; Alot, Enrique; Andrushchenko, Irene; Deguara, Simeon; Di Natale, Antonio; Gatt, Mark; Golet, Walter; Karakulak, Saadet; Kimoto, Ai; Macias, David; Saber, Samar; Santos, Miguel Neves; Zarrad, Rafik

    2015-01-01

    The compiled data for this study represents the first Atlantic and Mediterranean-wide effort to pool all available biometric data for Atlantic bluefin tuna (Thunnus thynnus) with the collaboration of many countries and scientific groups. Biometric relationships were based on an extensive sampling (over 140,000 fish sampled), covering most of the fishing areas for this species in the North Atlantic Ocean and Mediterranean Sea. Sensitivity analyses were carried out to evaluate the representativeness of sampling and explore the most adequate procedure to fit the weight-length relationship (WLR). The selected model for the WLRs by stock included standardized data series (common measurement types) weighted by the inverse variability. There was little difference between annual stock-specific round weight-straight fork length relationships, with an overall difference of 6% in weight. The predicted weight by month was estimated as an additional component in the exponent of the weight-length function. The analyses of monthly variations of fish condition by stock, maturity state and geographic area reflect annual cycles of spawning and feeding behavior. We update and improve upon the biometric relationships for bluefin currently used by the International Commission for the Conservation of Atlantic Tunas, by incorporating substantially larger datasets than ever previously compiled, providing complete documentation of sources and employing robust statistical fitting. WLRs and other conversion factors estimated in this study differ from the ones used in previous bluefin stock assessments.

  3. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  4. Extracting forensic evidence from biometric devices

    NASA Astrophysics Data System (ADS)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  5. Trends in Biometric Health Indices Within an Employer-Sponsored Wellness Program With Outcome-Based Incentives.

    PubMed

    Fu, Patricia Lin; Bradley, Kent L; Viswanathan, Sheila; Chan, June M; Stampfer, Meir

    2016-07-01

    To evaluate changes in employees' biometrics over time relative to outcome-based incentive thresholds. Retrospective cohort analysis of biometric screening participants (n = 26 388). Large employer primarily in Western United States. Office, retail, and distribution workforce. A voluntary outcome-based biometric screening program, incentivized with health insurance premium discounts. Body mass index (BMI), cholesterol, blood glucose, blood pressure, and nicotine. Followed were participants from their first year of participation, evaluating changes in measures. On average, participants who did not meet the incentive threshold at baseline decreased their BMI (1%), glucose (8%), blood pressure (systolic 9%, diastolic 8%), and total cholesterol (8%) by year 2 with improvements generally sustained or continued during each additional year of participation. On average, individuals at high health risk who participated in a financially incentivized biometric assessment program improved their health indices over time. Further research is needed to understand key determinants that drive health improvement indicated here. © The Author(s) 2016.

  6. Tongue prints: A novel biometric and potential forensic tool.

    PubMed

    Radhika, T; Jeddy, Nadeem; Nithya, S

    2016-01-01

    Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated.

  7. Quantum Biometrics with Retinal Photon Counting

    NASA Astrophysics Data System (ADS)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  8. Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems

    NASA Astrophysics Data System (ADS)

    Riley, Chris; Johnson, Graham; McCracken, Heather; Al-Saffar, Ahmed

    Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diverse range of contexts from immigration control, to banking and personal computing. As is often the case with emerging technologies, the usability aspects of system design have received less attention than technical aspects. Fingerprint systems pose a number of challenges for users and past research has identified issues with correct finger placement, system feedback and instruction. This paper describes the development of an interface for fingerprint systems using an iterative, participative design approach. During this process, several different methods for the presentation of instruction and feedback were identified. The different types of instruction and feedback were tested in a study involving 82 participants. The results showed that feedback had a statistically significant effect on overall system performance, but instruction did not. The design recommendations emerging from this study, and the use of participatory design in this context, are discussed.

  9. Report of the Defense Science Board Task Force on Defense Biometrics

    DTIC Science & Technology

    2007-03-01

    certificates, crypto variables, and encoded biometric indices. The Department of Defense has invested prestige and resources in its Common Access Card (CAC...in turn, could be used to unlock an otherwise secret key or crypto variable which would support the remote authentication. A new key variable...The PSA for biometrics should commission development of appropriate threat model(s) and assign responsibility for maintaining currency of the model

  10. Legal Implications of the Use of Biometrics as a Tool to Fight the Global War on Terrorism

    DTIC Science & Technology

    2008-06-13

    suspects, thwarting their plan to terrorize innocent citizens. A biometric identification system would certainly present law enforcement officials...with a powerful tool for the identification of known or suspected terrorists and other criminals, however, the system must adhere to the laws...terrorize innocent citizens. A biometric identification system would certainly present law enforcement officials with a powerful tool for the

  11. 2010 Biometrics Conference Held in Arlington, Virginia on January 20-21, 2010

    DTIC Science & Technology

    2010-01-21

    testing of mobile biometric collection devices during future biometric field exercises, we hope to provide NOVARIS officials connectivity and an...environmental factors – Extreme Outdoor Mobile Conditions – Non-cooperative users – Field-collected samples of mixed quality – Real-time access to match results...Physics: Mobile 10-print Slap Capture Robust Face/Iris Capture Contactless Fingerprints 10 Human Factors Behavioral Sciences Division The Hard

  12. Biometrics for electronic health records.

    PubMed

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  13. Association of Wage With Employee Participation in Health Assessments and Biometric Screening.

    PubMed

    Sherman, Bruce W; Addy, Carol

    2018-02-01

    To understand differences in health risk assessment (HRA) and biometric screening participation rates among benefits-enrolled employees in association with wage category. Cross-sectional analysis of employee eligibility file and health benefits (wellness and claims) data. Data from self-insured employers participating in the RightOpt private exchange (Conduent HR Services) during 2014. Active employees from 4 companies continuously enrolled in health insurance for which wage data were available. Measures included HRA and biometric screening participation rates and wage status, with employee age, sex, employer, job tenure, household income, geographic location, and health benefits deductible as a percentage of total wages serving as covariates. Employees were separated into 5 groups based on wage status. Logistic regression analysis incorporated other measures as covariates to adjust for differences between groups, with HRA and biometric screening participation rates determined as binary outcomes. Participation rates for HRA and biometric screening were 90% and 87%, respectively, in the highest wage category, decreasing to 67% and 60%, respectively, among the lowest wage category. Employee wage status is associated with significant differences in HRA and biometric participation rates. Generalizing the results generated by modest participation in these offerings to entire populations may risk misinterpretation of results based on variable participation rates across wage categories.

  14. Mental State Assessment and Validation Using Personalized Physiological Biometrics

    PubMed Central

    Patel, Aashish N.; Howard, Michael D.; Roach, Shane M.; Jones, Aaron P.; Bryant, Natalie B.; Robinson, Charles S. H.; Clark, Vincent P.; Pilly, Praveen K.

    2018-01-01

    Mental state monitoring is a critical component of current and future human-machine interfaces, including semi-autonomous driving and flying, air traffic control, decision aids, training systems, and will soon be integrated into ubiquitous products like cell phones and laptops. Current mental state assessment approaches supply quantitative measures, but their only frame of reference is generic population-level ranges. What is needed are physiological biometrics that are validated in the context of task performance of individuals. Using curated intake experiments, we are able to generate personalized models of three key biometrics as useful indicators of mental state; namely, mental fatigue, stress, and attention. We demonstrate improvements to existing approaches through the introduction of new features. Furthermore, addressing the current limitations in assessing the efficacy of biometrics for individual subjects, we propose and employ a multi-level validation scheme for the biometric models by means of k-fold cross-validation for discrete classification and regression testing for continuous prediction. The paper not only provides a unified pipeline for extracting a comprehensive mental state evaluation from a parsimonious set of sensors (only EEG and ECG), but also demonstrates the use of validation techniques in the absence of empirical data. Furthermore, as an example of the application of these models to novel situations, we evaluate the significance of correlations of personalized biometrics to the dynamic fluctuations of accuracy and reaction time on an unrelated threat detection task using a permutation test. Our results provide a path toward integrating biometrics into augmented human-machine interfaces in a judicious way that can help to maximize task performance.

  15. Mental State Assessment and Validation Using Personalized Physiological Biometrics.

    PubMed

    Patel, Aashish N; Howard, Michael D; Roach, Shane M; Jones, Aaron P; Bryant, Natalie B; Robinson, Charles S H; Clark, Vincent P; Pilly, Praveen K

    2018-01-01

    Mental state monitoring is a critical component of current and future human-machine interfaces, including semi-autonomous driving and flying, air traffic control, decision aids, training systems, and will soon be integrated into ubiquitous products like cell phones and laptops. Current mental state assessment approaches supply quantitative measures, but their only frame of reference is generic population-level ranges. What is needed are physiological biometrics that are validated in the context of task performance of individuals. Using curated intake experiments, we are able to generate personalized models of three key biometrics as useful indicators of mental state; namely, mental fatigue, stress, and attention. We demonstrate improvements to existing approaches through the introduction of new features. Furthermore, addressing the current limitations in assessing the efficacy of biometrics for individual subjects, we propose and employ a multi-level validation scheme for the biometric models by means of k -fold cross-validation for discrete classification and regression testing for continuous prediction. The paper not only provides a unified pipeline for extracting a comprehensive mental state evaluation from a parsimonious set of sensors (only EEG and ECG), but also demonstrates the use of validation techniques in the absence of empirical data. Furthermore, as an example of the application of these models to novel situations, we evaluate the significance of correlations of personalized biometrics to the dynamic fluctuations of accuracy and reaction time on an unrelated threat detection task using a permutation test. Our results provide a path toward integrating biometrics into augmented human-machine interfaces in a judicious way that can help to maximize task performance.

  16. Evaluation and comparison of current fetal ultrasound image segmentation methods for biometric measurements: a grand challenge.

    PubMed

    Rueda, Sylvia; Fathima, Sana; Knight, Caroline L; Yaqub, Mohammad; Papageorghiou, Aris T; Rahmatullah, Bahbibi; Foi, Alessandro; Maggioni, Matteo; Pepe, Antonietta; Tohka, Jussi; Stebbing, Richard V; McManigle, John E; Ciurte, Anca; Bresson, Xavier; Cuadra, Meritxell Bach; Sun, Changming; Ponomarev, Gennady V; Gelfand, Mikhail S; Kazanov, Marat D; Wang, Ching-Wei; Chen, Hsiang-Chou; Peng, Chun-Wei; Hung, Chu-Mei; Noble, J Alison

    2014-04-01

    This paper presents the evaluation results of the methods submitted to Challenge US: Biometric Measurements from Fetal Ultrasound Images, a segmentation challenge held at the IEEE International Symposium on Biomedical Imaging 2012. The challenge was set to compare and evaluate current fetal ultrasound image segmentation methods. It consisted of automatically segmenting fetal anatomical structures to measure standard obstetric biometric parameters, from 2D fetal ultrasound images taken on fetuses at different gestational ages (21 weeks, 28 weeks, and 33 weeks) and with varying image quality to reflect data encountered in real clinical environments. Four independent sub-challenges were proposed, according to the objects of interest measured in clinical practice: abdomen, head, femur, and whole fetus. Five teams participated in the head sub-challenge and two teams in the femur sub-challenge, including one team who tackled both. Nobody attempted the abdomen and whole fetus sub-challenges. The challenge goals were two-fold and the participants were asked to submit the segmentation results as well as the measurements derived from the segmented objects. Extensive quantitative (region-based, distance-based, and Bland-Altman measurements) and qualitative evaluation was performed to compare the results from a representative selection of current methods submitted to the challenge. Several experts (three for the head sub-challenge and two for the femur sub-challenge), with different degrees of expertise, manually delineated the objects of interest to define the ground truth used within the evaluation framework. For the head sub-challenge, several groups produced results that could be potentially used in clinical settings, with comparable performance to manual delineations. The femur sub-challenge had inferior performance to the head sub-challenge due to the fact that it is a harder segmentation problem and that the techniques presented relied more on the femur's appearance.

  17. Biometric measurements in highly myopic eyes.

    PubMed

    Shen, Peiyang; Zheng, Yingfeng; Ding, Xiaohu; Liu, Bin; Congdon, Nathan; Morgan, Ian; He, Mingguang

    2013-02-01

    To assess the repeatability and accuracy of optical biometry (Lenstar LS900 optical low-coherence reflectometry [OLCR] and IOLMaster partial coherence interferometry [PCI]) and applanation ultrasound biometry in highly myopic eyes. Division of Preventive Ophthalmology, Zhongshan Ophthalmic Center, Guangzhou, China. Comparative evaluation of diagnostic technology. Biometric measurements were taken in highly myopic subjects with a spherical equivalent (SE) of -6.00 diopters (D) or higher and an axial length (AL) longer than 25.0 mm. Measurements of AL and anterior chamber depth (ACD) obtained by OLCR were compared with those obtained by PCI and applanation A-scan ultrasound. Right eyes were analyzed. Repeatability was evaluated using the coefficient of variation (CoV) and agreement, using Bland-Altman analyses. The mean SE was -11.20 D ± 4.65 (SD). The CoVs for repeated AL measurements using OLCR, PCI, and applanation ultrasound were 0.06%, 0.07%, and 0.20%, respectively. The limits of agreement (LoA) for AL were 0.11 mm between OLCR and PCI, 1.01 mm between OLCR and applanation ultrasound, and 1.03 mm between PCI and ultrasound. The ACD values were 0.29 mm, 0.53 mm, and 0.51 mm, respectively. These repeatability and agreement results were comparable in eyes with extreme myopia (AL ≥ 27.0 mm) or posterior staphyloma. The mean radius of corneal curvature was similar between OLCR and PCI (7.66 ± 0.24 mm versus 7.64 ± 0.25 mm), with an LoA of 0.12 mm. Optical biometry provided more repeatable and precise measurements of biometric parameters, including AL and ACD, than applanation ultrasound biometry in highly myopic eyes. No author has a financial or proprietary interest in any material or method mentioned. Copyright © 2012 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  18. [Are biometric parameters of anterior segment of the eyeball influenced by type 2 diabetes?].

    PubMed

    Dmuchowska, Diana A; Kraśnicki, Paweł; Mariak, Zofia

    2012-01-01

    To answer the question whether biometric parameters of anterior segment of the eyeball are influenced by type 2 diabetes, at the stage when the lens is still transparent, so before cataract development. Fifty subjects (28 women and 22 men), at the age of 63.3 +/- 11.3 years were enrolled in this prospective study. They were divided in 2 groups: patients with type 2 diabetes (24 subjects) and analogous age group in good general health - control group (26 subjects). None of the tested individuals presented lens opacities. The planned biometric measurements included: central corneal thickness, anterior chamber depth and axial lens thickness. The data were statistically analyzed. There was no difference between the groups of both proven and potential parameters that are associated with biometric measurements of the anterior segment of the eyeball, such as: gender, age, smoking and axial length of the eye. In diabetic patients, as opposed to the subjects in the control group, statistically significantly increased lens thickness (4.78 +/- 0.50 mm vs 4.43 +/- 0.50; p = 0.016), central corneal thickness (561.5 +/- 31.6 microm vs 542.2 +/- 35.2; p = 0.047), and the tendency for shallow anterior chamber (3.06 +/- 0.40 mm vs 3.22 +/- 0.38; p = 0.159), were observed. In patients with diabetes there was no association of the biometric parameters values with the duration of diabetes and presence of diabetic retinopathy. Type 2 diabetes contributes to increased axial corneal and lens thickness at the stage when the lens is transparent, albeit it does not significantly affect anterior chamber depth.

  19. Biometric correspondence between reface computerized facial approximations and CT-derived ground truth skin surface models objectively examined using an automated facial recognition system.

    PubMed

    Parks, Connie L; Monson, Keith L

    2018-05-01

    This study employed an automated facial recognition system as a means of objectively evaluating biometric correspondence between a ReFace facial approximation and the computed tomography (CT) derived ground truth skin surface of the same individual. High rates of biometric correspondence were observed, irrespective of rank class (R k ) or demographic cohort examined. Overall, 48% of the test subjects' ReFace approximation probes (n=96) were matched to his or her corresponding ground truth skin surface image at R 1 , a rank indicating a high degree of biometric correspondence and a potential positive identification. Identification rates improved with each successively broader rank class (R 10 =85%, R 25 =96%, and R 50 =99%), with 100% identification by R 57 . A sharp increase (39% mean increase) in identification rates was observed between R 1 and R 10 across most rank classes and demographic cohorts. In contrast, significantly lower (p<0.01) increases in identification rates were observed between R 10 and R 25 (8% mean increase) and R 25 and R 50 (3% mean increase). No significant (p>0.05) performance differences were observed across demographic cohorts or CT scan protocols. Performance measures observed in this research suggest that ReFace approximations are biometrically similar to the actual faces of the approximated individuals and, therefore, may have potential operational utility in contexts in which computerized approximations are utilized as probes in automated facial recognition systems. Copyright © 2018. Published by Elsevier B.V.

  20. Ocular biometric measurements in cataract surgery candidates in Portugal.

    PubMed

    Ferreira, Tiago B; Hoffer, Kenneth J; Ribeiro, Filomena; Ribeiro, Paulo; O'Neill, João G

    2017-01-01

    Describe the ocular biometric parameters and their associations in a population of cataract surgery candidates. A cross-sectional study of 13,012 eyes of 6,506 patients was performed. Biometric parameters of the eyes were measured by optical low-coherence reflectometry. The axial length (AL), mean keratometry (K) and astigmatism, anterior chamber depth (ACD) (epithelium to lens), lens thickness (LT), and Corneal Diameter (CD) were evaluated. The mean age was 69 ± 10 years (44-99 years). Mean AL, Km, and ACD were 23.87 ± 1.55 mm (19.8-31.92 mm), 43.91 ± 1.71 D (40.61-51.14 D), and 3.25 ± 0.44 mm (2.04-5.28 mm), respectively. The mean LT was 4.32 ± 0.49 mm (2.73-5.77 mm) and the mean CD was 12.02 ± 0.46 mm (10.50-14.15 mm). The mean corneal astigmatism was 1.08 ± 0.84 D (0.00-7.58 D) and 43.5% of eyes had astigmatism ≥ 1.00 D. Male patients had longer AL and ACDs (p < .001) and flatter corneas (p < .001). In regression models considering age, gender, Km, ACD, LT, and CD, a longer AL was associated with being male and having higher ACD, LT and CD. These data represent normative biometric values for the Portuguese population. The greatest predictor of ocular biometrics was gender. There was no significant correlation between age and AL, ACD, or Km. These results may be relevant in the evaluation of refractive error and in the calculation of intraocular lens power.

  1. Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices

    DTIC Science & Technology

    2014-03-01

    ledger accounting, payroll , and supply chain management. 4During our review, one of these programs—Air Force’s Air and Space Operations Center- Weapon...intended to provide an Army tactical biometric collection capability to capture an adversary or neutral person’s biometric data (e.g., fingerprint, iris...image, and facial image) and enroll them into DOD’s enterprise authoritative biometric database to positively identify and verify the identity of

  2. Medical information security in the era of artificial intelligence.

    PubMed

    Wang, Yufeng; Wang, Liwei; Xue, Chang-Ao

    2018-06-01

    In recent years, biometric technologies, such as iris, facial, and finger vein recognition, have reached consumers and are being increasingly applied. However, it remains unknown whether these highly specific biometric technologies are as safe as declared by their manufacturers. As three-dimensional (3D) reconstruction based on medical imaging and 3D printing are being developed, these biometric technologies may face severe challenges. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Zeroing Biometrics: Collecting Biometrics Before the Shooting Starts

    DTIC Science & Technology

    2012-04-01

    structure, prison, or a border crossing. Facial Photo Facial recognition is the least radical of the modes of biometric collection and may offer the...most promise for the future. Facial recognition is the ability to recognize an individual from a photo or other visual representation. It is no...speed, unfortunately facial recognition programs are more susceptible to acts of disguise than a human observer.24 In the field the use of photos

  4. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    DTIC Science & Technology

    2005-02-07

    joints, and knuckles, has been used for about 30 years to control access to secure facilities such as nuclear power plants. Facial recognition analyzes...this end, however, DOS has also begun phasing in the use of facial recognition technologies with visa and passport photos, but these technologies are...party, have approved interoperable biometric standards, and the baseline biometric will be facial recognition . Member states will also have the option

  5. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  6. A reference system for animal biometrics: application to the northern leopard frog

    USGS Publications Warehouse

    Petrovska-Delacretaz, D.; Edwards, A.; Chiasson, J.; Chollet, G.; Pilliod, D.S.

    2014-01-01

    Reference systems and public databases are available for human biometrics, but to our knowledge nothing is available for animal biometrics. This is surprising because animals are not required to give their agreement to be in a database. This paper proposes a reference system and database for the northern leopard frog (Lithobates pipiens). Both are available for reproducible experiments. Results of both open set and closed set experiments are given.

  7. The use of biometrics in the Personal Health Record (PHR).

    PubMed

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  8. Adjusted regression trend test for a multicenter clinical trial.

    PubMed

    Quan, H; Capizzi, T

    1999-06-01

    Studies using a series of increasing doses of a compound, including a zero dose control, are often conducted to study the effect of the compound on the response of interest. For a one-way design, Tukey et al. (1985, Biometrics 41, 295-301) suggested assessing trend by examining the slopes of regression lines under arithmetic, ordinal, and arithmetic-logarithmic dose scalings. They reported the smallest p-value for the three significance tests on the three slopes for safety assessments. Capizzi et al. (1992, Biometrical Journal 34, 275-289) suggested an adjusted trend test, which adjusts the p-value using a trivariate t-distribution, the joint distribution of the three slope estimators. In this paper, we propose an adjusted regression trend test suitable for two-way designs, particularly for multicenter clinical trials. In a step-down fashion, the proposed trend test can be applied to a multicenter clinical trial to compare each dose with the control. This sequential procedure is a closed testing procedure for a trend alternative. Therefore, it adjusts p-values and maintains experimentwise error rate. Simulation results show that the step-down trend test is overall more powerful than a step-down least significant difference test.

  9. Effect of Cycloplegia on Corneal Biometrics and Refractive State

    PubMed Central

    Bagheri, Abbas; Feizi, Mohadeseh; Shafii, Aliakbar; Faramarzi, Amir; Tavakoli, Mehdi; Yazdani, Shahin

    2018-01-01

    Purpose: To determine changes in refractive state and corneal parameters after cycloplegia with cyclopentolate hydrochloride 1% using a dual Scheimpflug imaging system. Methods: In this prospective cross-sectional study patients aged 10 to 40 years who were referred for optometric evaluation enrolled and underwent autorefraction and corneal imaging with the Galilei dual Scheimpflug system before and 30 minutes after twice instillation of medication. Changes in refraction and astigmatism were investigated. Corneal biometrics including anterior and posterior corneal curvatures, total corneal power and corneal pachymetry were compared before and after cycloplegia. Results: Two hundred and twelve eyes of 106 subjects with mean age of 28 ± 5 years including 201 myopic and 11 hyperopic eyes were evaluated. Mean spherical equivalent refractive error before cycloplegia was -3.4 ± 2.6 D. A mean hyperopic shift of 0.4 ± 0.5 D occurred after cycloplegia (P < 0.001). The astigmatism power did not significantly change (P = 0.8), however, 26.8% of eyes with significant astigmatism experienced a change of more than 5 degrees in the axis of astigmatism. Changes in posterior corneal curvature were scant but statistically significant (P = 0.001). Moreover, corneal thickness was slightly increased in the central and paracentral regions (P < 0.001 and P < 0.001, respectively). Conclusion: Cycloplegia causes a hyperopic shift and astigmatism axis changes, along with an increase in central and paracentral corneal thickness and change in posterior corneal curvature. The effects of cycloplegia on refraction and corneal biometrics should be considered before cataract and refractive surgeries. PMID:29719636

  10. A Set of Handwriting Features for Use in Automated Writer Identification.

    PubMed

    Miller, John J; Patterson, Robert Bradley; Gantz, Donald T; Saunders, Christopher P; Walch, Mark A; Buscaglia, JoAnn

    2017-05-01

    A writer's biometric identity can be characterized through the distribution of physical feature measurements ("writer's profile"); a graph-based system that facilitates the quantification of these features is described. To accomplish this quantification, handwriting is segmented into basic graphical forms ("graphemes"), which are "skeletonized" to yield the graphical topology of the handwritten segment. The graph-based matching algorithm compares the graphemes first by their graphical topology and then by their geometric features. Graphs derived from known writers can be compared against graphs extracted from unknown writings. The process is computationally intensive and relies heavily upon statistical pattern recognition algorithms. This article focuses on the quantification of these physical features and the construction of the associated pattern recognition methods for using the features to discriminate among writers. The graph-based system described in this article has been implemented in a highly accurate and approximately language-independent biometric recognition system of writers of cursive documents. © 2017 American Academy of Forensic Sciences.

  11. A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health.

    PubMed

    Zhang, G H; Poon, Carmen C Y; Zhang, Y T

    2010-01-01

    Body sensor networks (BSNs) have emerged as a new technology for healthcare applications, but the security of communication in BSNs remains a formidable challenge yet to be resolved. The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications. The approach was tested on 900 segments of electrocardiogram. Each segment was 4 seconds long and used to generate a 128-bit key. The results of the study found that entropy of 96% of the keys were above 0.95 and 99% of the hamming distances calculated from any two keys were above 50 bits. Based on the randomness and distinctiveness of these keys, it is concluded that the fast biometric based approach has great potential to be used to secure communication in BSNs for health applications.

  12. Performance of biometric quality measures.

    PubMed

    Grother, Patrick; Tabassi, Elham

    2007-04-01

    We document methods for the quantitative evaluation of systems that produce a scalar summary of a biometric sample's quality. We are motivated by a need to test claims that quality measures are predictive of matching performance. We regard a quality measurement algorithm as a black box that converts an input sample to an output scalar. We evaluate it by quantifying the association between those values and observed matching results. We advance detection error trade-off and error versus reject characteristics as metrics for the comparative evaluation of sample quality measurement algorithms. We proceed this with a definition of sample quality, a description of the operational use of quality measures. We emphasize the performance goal by including a procedure for annotating the samples of a reference corpus with quality values derived from empirical recognition scores.

  13. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  14. BossPro: a biometrics-based obfuscation scheme for software protection

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  15. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Pearson, P.K.; Sengupta, S.K.

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a reference value. To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced valuemore » is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.« less

  17. Hand Grasping Synergies As Biometrics.

    PubMed

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies-postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  18. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  19. Iris biometric system design using multispectral imaging

    NASA Astrophysics Data System (ADS)

    Widhianto, Benedictus Yohanes Bagus Y. B.; Nasution, Aulia M. T.

    2016-11-01

    An identity recognition system is a vital component that cannot be separated from life, iris biometric is one of the biometric that has the best accuracy reaching 99%. Usually, iris biometric systems use infrared spectrum lighting to reduce discomfort caused by radiation when the eye is given direct light, while the eumelamin that is forming the iris has the most flourescent radiation when given a spectrum of visible light. This research will be conducted by detecting iris wavelengths of 850 nm, 560 nm, and 590 nm, where the detection algorithm will be using Daugman algorithm by using a Gabor wavelet extraction feature, and matching feature using a Hamming distance. Results generated will be analyzed to identify how much differences there are, and to improve the accuracy of the multispectral biometric system and as a detector of the authenticity of the iris. The results obtained from the analysis of wavelengths 850 nm, 560 nm, and 590 nm respectively has an accuracy of 99,35 , 97,5 , 64,5 with a matching score of 0,26 , 0,23 , 0,37.

  20. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  1. Correlating Corneal Biomechanics and Ocular Biometric Properties with Lamina Cribrosa Measurements in Healthy Subjects.

    PubMed

    Pérez Bartolomé, Francisco; Martínez de la Casa, Jose María; Camacho Bosca, Irene; Sáenz-Francés, Federico; Aguilar Munoa, Soledad; Martín Juan, Alberto; Garcia-Feijoo, Julian

    2018-01-01

    To examine interrelations between corneal biomechanics, ocular biometric variables and optic disc size (ODS), lamina cribosa depth (LCD) or thickness (LCT) in a healthy population. In a cross-sectional case-control study, the following measurements were made in 81 eyes of 81 participants: axial length, anterior chamber depth, lens thickness, and central corneal thickness using the optical biometer Lenstar LS900; and corneal hysteresis (CH), corneal resistance factor (CRF), Goldman-correlated intraocular pressure (IOPg), and corneal-compensated IOP (IOPcc) using the Ocular Response Analyzer. Serial horizontal enhanced depth imaging optical coherence tomography (EDI OCT) B-scans of the optic nerve head were obtained in each participant. Mean ODS, mean LCD, and mean LCT were measured in 11 equally spaced horizontal B-scans, excluding the LC insertion area under Bruch's membrane and scleral rim. LCD was measured in 74 of 81 eyes (91.36%); LCT in 60/81 (75.3%); ODS in 81/81 (100%). CRF was poorly, but significantly, correlated with LCT (Pearson's R = 0.264; P = 0.045). IOPcc, IOPg, CH, and ocular biometrics variables were poorly (non-significantly) correlated with LCD, LCT, and ODS. CRF was poorly but directly correlated with LCT. No association was detected between CH or ocular biometric variables and ODS, LCD, or LCT.

  2. Biometric Authentication Using the PPG: A Long-Term Feasibility Study

    PubMed Central

    Alesanco, Álvaro

    2018-01-01

    The photoplethysmogram (PPG) is a biomedical signal that can be used to estimate volumetric blood flow changes in the peripheral circulation. During the past few years, several works have been published in order to assess the potential for PPGs to be used in biometric authentication systems, but results are inconclusive. In this paper we perform an analysis of the feasibility of using the PPG as a realistic biometric alternative in the long term. Several feature extractors (based on the time domain and the Karhunen–Loève transform) and matching metrics (Manhattan and Euclidean distances) have been tested using four different PPG databases (PRRB, MIMIC-II, Berry, and Nonin). We show that the false match rate (FMR) and false non-match rate (FNMR) values remain constant in different time instances for a selected threshold, which is essential for using the PPG for biometric authentication purposes. On the other hand, obtained equal error rate (EER) values for signals recorded during the same session range from 1.0% for high-quality signals recorded in controlled conditions to 8% for those recorded in conditions closer to real-world scenarios. Moreover, in certain scenarios, EER values rise up to 23.2% for signals recorded over different days, signaling that performance degradation could take place with time. PMID:29751681

  3. Biometric Authentication Using the PPG: A Long-Term Feasibility Study.

    PubMed

    Sancho, Jorge; Alesanco, Álvaro; García, José

    2018-05-11

    The photoplethysmogram (PPG) is a biomedical signal that can be used to estimate volumetric blood flow changes in the peripheral circulation. During the past few years, several works have been published in order to assess the potential for PPGs to be used in biometric authentication systems, but results are inconclusive. In this paper we perform an analysis of the feasibility of using the PPG as a realistic biometric alternative in the long term. Several feature extractors (based on the time domain and the Karhunen⁻Loève transform) and matching metrics (Manhattan and Euclidean distances) have been tested using four different PPG databases (PRRB, MIMIC-II, Berry, and Nonin). We show that the false match rate ( FMR ) and false non-match rate ( FNMR ) values remain constant in different time instances for a selected threshold, which is essential for using the PPG for biometric authentication purposes. On the other hand, obtained equal error rate (EER) values for signals recorded during the same session range from 1.0% for high-quality signals recorded in controlled conditions to 8% for those recorded in conditions closer to real-world scenarios. Moreover, in certain scenarios, EER values rise up to 23.2% for signals recorded over different days, signaling that performance degradation could take place with time.

  4. Biometric Borders and Counterterrorism

    DTIC Science & Technology

    2010-12-01

    105 Gildas Avoine, Kassem Kalach and Jean-Jaques Quisquater, "EPassport: Securing International Contacts...2006): 336. Ashbourn, Julian. Practical Biometrics: From Aspiration to Implementation. London; New York: Springer, 2004. Avoine, Gildas, Kassem

  5. Remote secure proof of identity using biometrics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to providemore » a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.« less

  6. Animal biometrics: quantifying and detecting phenotypic appearance.

    PubMed

    Kühl, Hjalmar S; Burghardt, Tilo

    2013-07-01

    Animal biometrics is an emerging field that develops quantified approaches for representing and detecting the phenotypic appearance of species, individuals, behaviors, and morphological traits. It operates at the intersection between pattern recognition, ecology, and information sciences, producing computerized systems for phenotypic measurement and interpretation. Animal biometrics can benefit a wide range of disciplines, including biogeography, population ecology, and behavioral research. Currently, real-world applications are gaining momentum, augmenting the quantity and quality of ecological data collection and processing. However, to advance animal biometrics will require integration of methodologies among the scientific disciplines involved. Such efforts will be worthwhile because the great potential of this approach rests with the formal abstraction of phenomics, to create tractable interfaces between different organizational levels of life. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Multiple-stage pure phase encoding with biometric information

    NASA Astrophysics Data System (ADS)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  8. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  9. Normal fetal posterior fossa in MR imaging: new biometric data and possible clinical significance.

    PubMed

    Ber, R; Bar-Yosef, O; Hoffmann, C; Shashar, D; Achiron, R; Katorza, E

    2015-04-01

    Posterior fossa malformations are a common finding in prenatal diagnosis. The objectives of this study are to re-evaluate existing normal MR imaging biometric data of the fetal posterior fossa, suggest and evaluate new parameters, and demonstrate the possible clinical applications of these data. This was a retrospective review of 215 fetal MR imaging examinations with normal findings and 5 examinations of fetuses with a suspected pathologic posterior fossa. Six previously reported parameters and 8 new parameters were measured. Three new parameter ratios were calculated. Interobserver agreement was calculated by using the intraclass correlation coefficient. For measuring each structure, 151-211 MR imaging examinations were selected, resulting in a normal biometry curve according to gestational age for each parameter. Analysis of the ratio parameters showed that vermian lobe ratio and cerebellar hemisphere ratio remain constant with gestational age and that the vermis-to-cisterna magna ratio varies with gestational age. Measurements of the 5 pathologic fetuses are presented on the normal curves. Interobserver agreement was excellent, with the intraclass correlation coefficients of most parameters above 0.9 and only 2 parameters below 0.8. The biometry curves derived from new and existing biometric data and presented in this study may expand and deepen the biometry we use today, while keeping it simple and repeatable. By applying these extensive biometric data on suspected abnormal cases, diagnoses may be confirmed, better classified, or completely altered. © 2015 by American Journal of Neuroradiology.

  10. Adoption of Telehealth: Remote Biometric Monitoring Among Peritoneal Dialysis Patients in the United States.

    PubMed

    Lew, Susie Q; Sikka, Neal; Thompson, Clinton; Cherian, Teena; Magnus, Manya

    2017-01-01

    We examined participant uptake and utilization of remote monitoring devices, and the relationship between remote biometric monitoring (RBM) of weight (Wt) and blood pressure (BP) with self-monitoring requirements. Participants on peritoneal dialysis (PD) ( n = 269) participated in a Telehealth pilot study of which 253 used remote monitoring of BP and 255 for Wt. Blood pressure and Wt readings were transmitted in real time to a Telehealth call center, which were then forwarded to the PD nurses for real-time review. Uptake of RBM was substantial, with 89.7% accepting RBM, generating 74,266 BP and 52,880 Wt measurements over the study period. We found no significant correlates of RBM uptake with regard to gender, marital, educational, socio-economic or employment status, or baseline experience with computers; frequency of use of BP RBM by Black participants was less than non-Black participants, as was Wt RBM, and participants over 55 years old were more likely to use the Wt RBM than their younger counterparts. Having any review of the breach by a nurse was associated with reduced odds of a subsequent BP breach after adjusting for sex, age, and race. Remote biometric monitoring was associated with adherence to self-monitoring BP and Wt requirements associated with PD. Remote biometric monitoring was feasible, allowing for increased communication between patient and PD clinical staff with real-time patient data for providers to act on to potentially improve adherence and outcomes. Copyright © 2017 International Society for Peritoneal Dialysis.

  11. Effect of morphological and functional changes in the secundines on biometric parameters of newborns from dichorionic twin pregnancies.

    PubMed

    Waszak, Małgorzata; Cieślik, Krystyna; Pietryga, Marek; Lewandowski, Jacek; Chuchracki, Marek; Nowak-Markwitz, Ewa; Bręborowicz, Grzegorz

    2016-01-01

    The aim of the study was to determine if, and to what extent, structural and functional changes of the secundines influence biometric parameters of neonates from dichorionic twin pregnancies. The study included neonates from dichorionic, diamniotic twin pregnancies, along with their secundines. Based on histopathological examination of the secundines, the mass and dimensions of the placenta, length and condition of the umbilical cord, chorionicity, focal lesions, and microscopic placental abnormalities were determined for 445 pairs of twins. Morphological development of examined twins was characterized on the basis of their six somatic traits, while birth status of the newborns was assessed based on their Apgar scores. Statistical analysis included Student t-tests, Snedecor's F-tests, post-hoc tests, non-parametric chi-squared Pearson's tests, and determination of Spearman coefficients of rank correlation. The lowest values of analyzed somatic traits were observed in twins who had placentas with velamentous or marginal cord insertion. Inflammatory lesions in the placenta and placental abruption turned out to have the greatest impact of all analyzed abnormalities of the secundines. Inflammatory lesions in the placenta were associated with lower values of biometric parameters and a greater likelihood of preterm birth. Neonates with a history of placental abruption were characterized by significantly lower birth weight and smaller chest circumference. Morphological changes in the secundines have a limited impact on biometric parameters of neonates from dichorionic twin pregnancies. In turn, functional changes exert a significant effect and more often contribute to impaired fetal development.

  12. Impact of a workplace physical activity tracking program on biometric health outcomes.

    PubMed

    Yu, Jiani; Abraham, Jean M; Dowd, Bryan; Higuera, Lucas F; Nyman, John A

    2017-12-01

    Wellness programs are a popular strategy utilized by large U.S. employers. As mobile health applications and wearable tracking devices increase in prevalence, many employers now offer physical activity tracking applications. This longitudinal study evaluates the impact of engagement with a web-based, physical activity tracking program on changes in individuals' biometric outcomes in an employer population. The study population includes active employees and adult dependents continuously enrolled in an eligible health plan and who have completed at least two biometric screenings (n=36,882 person-years with 11,436 unique persons) between 2011 and 2014. Using difference-in-differences (DID) regression, we estimate the effect of participation in the physical activity tracking application on BMI, total cholesterol, and blood pressure. Participation was significantly associated with a reduction of 0.275 in BMI in the post-period, relative to the comparison group, representing a 1% change from baseline BMI. The program did not have a statistically significant impact on cholesterol or blood pressure. Sensitivity checks revealed slightly larger BMI reductions among participants with higher intensity of tracking activity and in the period following the employer's shift to an outcomes-based incentive design. Results are broadly consistent with the existing literature on changes in biometric outcomes from workplace initiatives promoting increased physical activity. Employers should have modest expectations about the potential health benefits of such programs, given current designs and implementation in real-world settings. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Yield performance and stability of CMS-based triticale hybrids.

    PubMed

    Mühleisen, Jonathan; Piepho, Hans-Peter; Maurer, Hans Peter; Reif, Jochen Christoph

    2015-02-01

    CMS-based triticale hybrids showed only marginal midparent heterosis for grain yield and lower dynamic yield stability compared to inbred lines. Hybrids of triticale (×Triticosecale Wittmack) are expected to possess outstanding yield performance and increased dynamic yield stability. The objectives of the present study were to (1) examine the optimum choice of the biometrical model to compare yield stability of hybrids versus lines, (2) investigate whether hybrids exhibit a more pronounced grain yield performance and yield stability, and (3) study optimal strategies to predict yield stability of hybrids. Thirteen female and seven male parental lines and their 91 factorial hybrids as well as 30 commercial lines were evaluated for grain yield in up to 20 environments. Hybrids were produced using a cytoplasmic male sterility (CMS)-inducing cytoplasm that originated from Triticumtimopheevii Zhuk. We found that the choice of the biometrical model can cause contrasting results and concluded that a group-by-environment interaction term should be added to the model when estimating stability variance of hybrids and lines. midparent heterosis for grain yield was on average 3 % with a range from -15.0 to 11.5 %. No hybrid outperformed the best inbred line. Hybrids had, on average, lower dynamic yield stability compared to the inbred lines. Grain yield performance of hybrids could be predicted based on midparent values and general combining ability (GCA)-predicted values. In contrast, stability variance of hybrids could be predicted only based on GCA-predicted values. We speculated that negative effects of the used CMS cytoplasm might be the reason for the low performance and yield stability of the hybrids. For this purpose a detailed study on the reasons for the drawback of the currently existing CMS system in triticale is urgently required comprising also the search of potentially alternative hybridization systems.

  14. Privacy Enhancements for Inexact Biometric Templates

    NASA Astrophysics Data System (ADS)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  15. Despite Improvements in MoI’s Personnel Systems, Additional Actions Are Needed to Completely Verify ANP Payroll Costs and Workforce Strength

    DTIC Science & Technology

    2011-04-25

    contract to assist the Afghan government in collecting and managing the biometric data for all of the ANSF. 5. The Electronic Payroll System (EPS...Identification cards numbers will be utilized as the common data fields for the various payroll , biometric , and personnel databases and systems. In addition to...data in MoI’s payroll , personnel, identification card/registration, and biometric databases and systems. 3. Take the following steps as part of all

  16. Extreme value analysis in biometrics.

    PubMed

    Hüsler, Jürg

    2009-04-01

    We review some approaches of extreme value analysis in the context of biometrical applications. The classical extreme value analysis is based on iid random variables. Two different general methods are applied, which will be discussed together with biometrical examples. Different estimation, testing, goodness-of-fit procedures for applications are discussed. Furthermore, some non-classical situations are considered where the data are possibly dependent, where a non-stationary behavior is observed in the data or where the observations are not univariate. A few open problems are also stated.

  17. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    DTIC Science & Technology

    2015-03-01

    information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance . Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with

  18. Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design

    DTIC Science & Technology

    2003-06-01

    Security Magazine , “Biometrics Technology: Making Moves in the Security Game", pp. 28-34 Volume 12 #3 March 2002. [17] International Biometrics... in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a...words) Today, there is no way to ensure that the personnel working within the cockpit of an aircraft in flight are authorized to be there. The

  19. Personal identification by eyes.

    PubMed

    Marinović, Dunja; Njirić, Sanja; Coklo, Miran; Muzić, Vedrana

    2011-09-01

    Identification of persons through the eyes is in the field of biometrical science. Many security systems are based on biometric methods of personal identification, to determine whether a person is presenting itself truly. The human eye contains an extremely large number of individual characteristics that make it particularly suitable for the process of identifying a person. Today, the eye is considered to be one of the most reliable body parts for human identification. Systems using iris recognition are among the most secure biometric systems.

  20. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    NASA Astrophysics Data System (ADS)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  1. Ocular biometric measurements in cataract surgery candidates in Portugal

    PubMed Central

    Hoffer, Kenneth J.; Ribeiro, Filomena; Ribeiro, Paulo; O’Neill, João G.

    2017-01-01

    Objective Describe the ocular biometric parameters and their associations in a population of cataract surgery candidates. Methods A cross-sectional study of 13,012 eyes of 6,506 patients was performed. Biometric parameters of the eyes were measured by optical low-coherence reflectometry. The axial length (AL), mean keratometry (K) and astigmatism, anterior chamber depth (ACD) (epithelium to lens), lens thickness (LT), and Corneal Diameter (CD) were evaluated. Results The mean age was 69 ± 10 years (44–99 years). Mean AL, Km, and ACD were 23.87 ± 1.55 mm (19.8–31.92 mm), 43.91 ± 1.71 D (40.61–51.14 D), and 3.25 ± 0.44 mm (2.04–5.28 mm), respectively. The mean LT was 4.32 ± 0.49 mm (2.73–5.77 mm) and the mean CD was 12.02 ± 0.46 mm (10.50–14.15 mm). The mean corneal astigmatism was 1.08 ± 0.84 D (0.00–7.58 D) and 43.5% of eyes had astigmatism ≥ 1.00 D. Male patients had longer AL and ACDs (p < .001) and flatter corneas (p < .001). In regression models considering age, gender, Km, ACD, LT, and CD, a longer AL was associated with being male and having higher ACD, LT and CD. Conclusions These data represent normative biometric values for the Portuguese population. The greatest predictor of ocular biometrics was gender. There was no significant correlation between age and AL, ACD, or Km. These results may be relevant in the evaluation of refractive error and in the calculation of intraocular lens power. PMID:28982150

  2. Biometric feature embedding using robust steganography technique

    NASA Astrophysics Data System (ADS)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  3. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  4. Biometric Factors Associated With Acute Primary Angle Closure: Comparison of the Affected and Fellow Eye.

    PubMed

    Atalay, Eray; Nongpiur, Monisha E; Baskaran, Mani; Sharma, Sourabh; Perera, Shamira A; Aung, Tin

    2016-10-01

    To compare ocular biometric and anterior segment parameters between the affected and fellow eye in subjects with acute primary angle closure (APAC). We evaluated 76 subjects with unilateral APAC who had undergone bilateral laser peripheral iridotomy before enrollment. Imaging was done using anterior segment optical coherence tomography and a customized software was used to measure the following: angle opening distance (AOD750); trabecular-iris space area (TISA750); iris thickness (IT750); iris curvature (ICURV); iris area (IAREA); anterior chamber depth; area and volume (ACD; ACA and ACV); anterior chamber width (ACW); anterior vault (ACD+LV); lens vault (LV); and pupil diameter (PD). We used A-scan ultrasonography to measure axial length (AL) and lens thickness (LT). Mean differences in ocular biometric and anterior segment parameters were assessed using linear mixed model adjusting for PD. A total of 53 subjects (36 females, 67.9%) with a mean age of 62.7 ± 8.1 years were analyzed after excluding 17 unanalyzable images in at least one eye. Affected eyes had shallower ACD, smaller ACA, ACV, anterior vault, TISA750, AOD750, and ICURV (all P < 0.05). Axial length, ACW, LV, LT, IAREA, and IT750 did not differ between the eyes. In the affected eyes, IT750 was significantly associated AOD750 (P < 0.05); whereas in the fellow eyes, IT750 and AL was predictive of AOD750 (all P < 0.05). Eyes with previous APAC had smaller anterior segment dimensions when compared with their fellow eyes. Iris thickness was the strongest predictor of angle width in both affected and fellow eyes.

  5. François Pourfour du Petit (1664-1741): pioneer in ocular biometry.

    PubMed

    Charman, W Neil

    2016-07-01

    To outline the important contributions of the French physician Petit to the development of ocular biometry. After a brief review of Petit's life and his studies in neurology, anatomy, and cataract surgery, the methodology and results of his work in measuring many of the biometric parameters of the human eye are discussed. Among other techniques, he made use of frozen sections of eyes to explore their dimensions and employed an immersion technique to avoid the effect of corneal refraction on the appearance of the iris. His pioneering biometric results have been largely confirmed by modern studies. Those on the changes in the crystalline lens with age are particularly striking and suggest that these ocular aging effects have changed little over the last 300 years. Although largely forgotten today, his biometric work exercised a considerable influence on his more immediate successors, including Porterfield and Thomas Young. François Pourfour du Petit deserves to be remembered as an important contributor to our understanding of the structure and dimensions of the human eye. © 2016 The Authors Ophthalmic & Physiological Optics © 2016 The College of Optometrists.

  6. Development and validation of an algorithm for the study of sleep using a biometric shirt in young healthy adults.

    PubMed

    Pion-Massicotte, Joëlle; Godbout, Roger; Savard, Pierre; Roy, Jean-François

    2018-02-23

    Portable polysomnography is often too complex and encumbering for recording sleep at home. We recorded sleep using a biometric shirt (electrocardiogram sensors, respiratory inductance plethysmography bands and an accelerometer) in 21 healthy young adults recorded in a sleep laboratory for two consecutive nights, together with standard polysomnography. Polysomnographic recordings were scored using standard methods. An algorithm was developed to classify the biometric shirt recordings into rapid eye movement sleep, non-rapid eye movement sleep and wake. The algorithm was based on breathing rate and heart rate variability, body movement, and included a correction for sleep onset and offset. The overall mean percentage of agreement between the two sets of recordings was 77.4%; when non-rapid eye movement and rapid eye movement sleep epochs were grouped together, it increased to 90.8%. The overall kappa coefficient was 0.53. Five of the seven sleep variables were significantly correlated. The findings of this pilot study indicate that this simple portable system could be used to estimate the general sleep pattern of young healthy adults. © 2018 European Sleep Research Society.

  7. Method of preliminary localization of the iris in biometric access control systems

    NASA Astrophysics Data System (ADS)

    Minacova, N.; Petrov, I.

    2015-10-01

    This paper presents a method of preliminary localization of the iris, based on the stable brightness features of the iris in images of the eye. In tests on images of eyes from publicly available databases method showed good accuracy and speed compared to existing methods preliminary localization.

  8. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way

    PubMed Central

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; Guilera, Teresa; Batalla, Iolanda; Soler-González, Jorge; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does not allow properly determining whether a person in self-regulation its emotions while watching affective stimuli. However, adequately combining different data sources in a synchronous way to detect emotions makes it possible to overcome the limitations of single detection methods. PMID:27594831

  9. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way.

    PubMed

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does not allow properly determining whether a person in self-regulation its emotions while watching affective stimuli. However, adequately combining different data sources in a synchronous way to detect emotions makes it possible to overcome the limitations of single detection methods.

  10. Biometric Challenges for Future Deployments: A Study of the Impact of Geography, Climate, Culture, and Social Conditions on the Effective Collection of Biometrics

    DTIC Science & Technology

    2011-04-01

    to iris or face recognition. In addition, breathing the dust is prevented with something covering the mouth , which will cause problems with face...headgear that “obscures the hair or hairline”. [58] One database of face images has images of people with and without scarves over their mouth . [59... Electronic Systems Magazine. Vol 19, Number 9, September 2004. [58] U.S. Department of State. How to Apply [for a Passport] in Person. [On-line

  11. Estimating the size of an open population using sparse capture-recapture data.

    PubMed

    Huggins, Richard; Stoklosa, Jakub; Roach, Cameron; Yip, Paul

    2018-03-01

    Sparse capture-recapture data from open populations are difficult to analyze using currently available frequentist statistical methods. However, in closed capture-recapture experiments, the Chao sparse estimator (Chao, 1989, Biometrics 45, 427-438) may be used to estimate population sizes when there are few recaptures. Here, we extend the Chao (1989) closed population size estimator to the open population setting by using linear regression and extrapolation techniques. We conduct a small simulation study and apply the models to several sparse capture-recapture data sets. © 2017, The International Biometric Society.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.

    Biometric identity research and development activities are being conducted in universities, government, and private industry. This paper discusses some of the factors that limit the performance of biometric identity devices, looks at some new developments, and speculates on future developments.

  13. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  14. [The Biometric Cabinet of the Escola de Educação Física do Exército: measuring and classifying to produce ideal bodies, 1930-1940].

    PubMed

    Gomes, Ana Carolina Vimieiro; Silva, André Luiz Dos Santos; Vaz, Alexandre Fernandez

    2013-10-01

    This paper analyzes biometrical and biotypological practices of the Biometric Cabinet of the Escola de Educação Física do Exército (Physical Education School of the Army) in Rio de Janeiro in the 1930s and 1940s, published in Revista de Educação Física do Exército. It was necessary to classify, monitor the results of the exercises periodically and measure morphological aspects of the bodies. The classifications were made in accordance with foreign parameters and an attempt was made to classify by type, quality and defects. The analysis of the practices of the Cabinet shows that biometrics and biotypology were complementary aspects of physical education, aiming at the standardization of bodies.

  15. Accurate, fast, and secure biometric fingerprint recognition system utilizing sensor fusion of fingerprint patterns

    NASA Astrophysics Data System (ADS)

    El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy

    2011-04-01

    Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.

  16. European securitization and biometric identification: the uses of genetic profiling.

    PubMed

    Johnson, Paul; Williams, Robin

    2007-01-01

    The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. One significant source for this growth has been the "securitization" agendas of nation states that attempt the greater control and monitoring of population movement across geographical borders. Among the wide variety of available biometric schemes, DNA profiling is regarded as a key method for discerning and recording embodied individuality. This paper discusses the current limitations on the use of DNA profiling in civil identification practices and speculates on future uses of the technology with regard to its interoperability with other biometric databasing systems.

  17. Analyzing handwriting biometrics in metadata context

    NASA Astrophysics Data System (ADS)

    Scheidat, Tobias; Wolf, Franziska; Vielhauer, Claus

    2006-02-01

    In this article, methods for user recognition by online handwriting are experimentally analyzed using a combination of demographic data of users in relation to their handwriting habits. Online handwriting as a biometric method is characterized by having high variations of characteristics that influences the reliance and security of this method. These variations have not been researched in detail so far. Especially in cross-cultural application it is urgent to reveal the impact of personal background to security aspects in biometrics. Metadata represent the background of writers, by introducing cultural, biological and conditional (changing) aspects like fist language, country of origin, gender, handedness, experiences the influence handwriting and language skills. The goal is the revelation of intercultural impacts on handwriting in order to achieve higher security in biometrical systems. In our experiments, in order to achieve a relatively high coverage, 48 different handwriting tasks have been accomplished by 47 users from three countries (Germany, India and Italy) have been investigated with respect to the relations of metadata and biometric recognition performance. For this purpose, hypotheses have been formulated and have been evaluated using the measurement of well-known recognition error rates from biometrics. The evaluation addressed both: system reliance and security threads by skilled forgeries. For the later purpose, a novel forgery type is introduced, which applies the personal metadata to security aspects and includes new methods of security tests. Finally in our paper, we formulate recommendations for specific user groups and handwriting samples.

  18. Generating One Biometric Feature from Another: Faces from Fingerprints

    PubMed Central

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  19. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  20. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  1. A field study of the accuracy and reliability of a biometric iris recognition system.

    PubMed

    Latman, Neal S; Herb, Emily

    2013-06-01

    The iris of the eye appears to satisfy the criteria for a good anatomical characteristic for use in a biometric system. The purpose of this study was to evaluate a biometric iris recognition system: Mobile-Eyes™. The enrollment, verification, and identification applications were evaluated in a field study for accuracy and reliability using both irises of 277 subjects. Independent variables included a wide range of subject demographics, ambient light, and ambient temperature. A sub-set of 35 subjects had alcohol-induced nystagmus. There were 2710 identification and verification attempts, which resulted in 1,501,340 and 5540 iris comparisons respectively. In this study, the system successfully enrolled all subjects on the first attempt. All 277 subjects were successfully verified and identified on the first day of enrollment. None of the current or prior eye conditions prevented enrollment, verification, or identification. All 35 subjects with alcohol-induced nystagmus were successfully verified and identified. There were no false verifications or false identifications. Two conditions were identified that potentially could circumvent the use of iris recognitions systems in general. The Mobile-Eyes™ iris recognition system exhibited accurate and reliable enrollment, verification, and identification applications in this study. It may have special applications in subjects with nystagmus. Copyright © 2012 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  2. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.

    PubMed

    Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  3. Hand Grasping Synergies As Biometrics

    PubMed Central

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K.; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security. PMID:28512630

  4. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric

    NASA Astrophysics Data System (ADS)

    He, Fei; Liu, Yuanning; Zhu, Xiaodong; Huang, Chun; Han, Ye; Chen, Ying

    2014-05-01

    A multimodal biometric system has been considered a promising technique to overcome the defects of unimodal biometric systems. We have introduced a fusion scheme to gain a better understanding and fusion method for a face-iris-fingerprint multimodal biometric system. In our case, we use particle swarm optimization to train a set of adaptive Gabor filters in order to achieve the proper Gabor basic functions for each modality. For a closer analysis of texture information, two different local Gabor features for each modality are produced by the corresponding Gabor coefficients. Next, all matching scores of the two Gabor features for each modality are projected to a single-scalar score via a trained, supported, vector regression model for a final decision. A large-scale dataset is formed to validate the proposed scheme using the Facial Recognition Technology database-fafb and CASIA-V3-Interval together with FVC2004-DB2a datasets. The experimental results demonstrate that as well as achieving further powerful local Gabor features of multimodalities and obtaining better recognition performance by their fusion strategy, our architecture also outperforms some state-of-the-art individual methods and other fusion approaches for face-iris-fingerprint multimodal biometric systems.

  5. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    PubMed Central

    Koong, Chorng-Shiuh; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864

  6. Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks.

    PubMed

    Zhang, Guang-He; Poon, Carmen C Y; Zhang, Yuan-Ting

    2012-01-01

    Wireless body sensor network (WBSN), a key building block for m-Health, demands extremely stringent resource constraints and thus lightweight security methods are preferred. To minimize resource consumption, utilizing information already available to a WBSN, particularly common to different sensor nodes of a WBSN, for security purposes becomes an attractive solution. In this paper, we tested the randomness and distinctiveness of the 128-bit biometric binary sequences (BSs) generated from interpulse intervals (IPIs) of 20 healthy subjects as well as 30 patients suffered from myocardial infarction and 34 subjects with other cardiovascular diseases. The encoding time of a biometric BS on a WBSN node is on average 23 ms and memory occupation is 204 bytes for any given IPI sequence. The results from five U.S. National Institute of Standards and Technology statistical tests suggest that random biometric BSs can be generated from both healthy subjects and cardiovascular patients and can potentially be used as authentication identifiers for securing WBSNs. Ultimately, it is preferred that these biometric BSs can be used as encryption keys such that key distribution over the WBSN can be avoided.

  7. An efficient visualization method for analyzing biometric data

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; McGonagle, Mike; Yates, J. Harlan; Henning, Ronda; Hackett, Jay

    2013-05-01

    We introduce a novel application for biometric data analysis. This technology can be used as part of a unique and systematic approach designed to augment existing processing chains. Our system provides image quality control and analysis capabilities. We show how analysis and efficient visualization are used as part of an automated process. The goal of this system is to provide a unified platform for the analysis of biometric images that reduce manual effort and increase the likelihood of a match being brought to an examiner's attention from either a manual or lights-out application. We discuss the functionality of FeatureSCOPE™ which provides an efficient tool for feature analysis and quality control of biometric extracted features. Biometric databases must be checked for accuracy for a large volume of data attributes. Our solution accelerates review of features by a factor of up to 100 times. Review of qualitative results and cost reduction is shown by using efficient parallel visual review for quality control. Our process automatically sorts and filters features for examination, and packs these into a condensed view. An analyst can then rapidly page through screens of features and flag and annotate outliers as necessary.

  8. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  9. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  10. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  11. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  12. An Exercise in Biometrical Genetics Based on a Computer Simulation.

    ERIC Educational Resources Information Center

    Murphy, P. J.

    1983-01-01

    Describes an exercise in biometrical genetics based on the noninteractive use of a computer simulation of a wheat hydridization program. Advantages of using the material in this way are also discussed. (Author/JN)

  13. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...

  14. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...

  15. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...

  16. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...

  17. 7 CFR 319.56-56 - Fresh pomegranates from Chile.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Chile following any post-harvest processing. A biometric sample must be drawn and examined from each... States. (2) A biometric sample of the boxes, crates, or other APHIS-approved packing containers from each...

  18. 7 CFR 319.56-38 - Citrus from Chile.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NPPO of Chile after the post-harvest processing. A biometric sample will be drawn and examined from... fruit is released for entry into the United States. (ii) A biometric sample of boxes from each...

  19. 7 CFR 319.56-56 - Fresh pomegranates from Chile.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Chile following any post-harvest processing. A biometric sample must be drawn and examined from each... States. (2) A biometric sample of the boxes, crates, or other APHIS-approved packing containers from each...

  20. 7 CFR 319.56-38 - Citrus from Chile.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NPPO of Chile after the post-harvest processing. A biometric sample will be drawn and examined from... fruit is released for entry into the United States. (ii) A biometric sample of boxes from each...

Top