An Innovation in Multi-model Biometric Techniques
Abstract
In this paper gives an overview of working, challenges of face recognition and fingerprint recognition system. Multi-model recognition system is better as compare to single model because if one model is intruded another template is used. The paper presents the details of 3D face model acquisition and its recognition techniques. Challenges faced in face recognition system leads to 3D face recognition system. Different level of threats to the biometric system is discussed. Spoofing techniques are discussed on the basis of cooperative and non-cooperative methods so that the anti-spoofing techniques can be developed on the basis of hardware and software.
Full Text:
PDFReferences
Wood, H.M. "The use of passwords for controlled access to computer resources" National Bureau of Standards Special Publication 500-9, US Dept. of Commerce/NBS.
Anil K. Jain,Arun Ross, and SalilPrabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004.
SalilPrabhakar, SharathPankanti and Anil K. Jain,” Biometric Recognition: Security and Privacy Concerns”, IEEE Security & Privacy, March/April 2003.
SalilPrabhakar, Josef Kittler, DavideMaltoni, Lawrence O’Gorman, and Tieniu Tan, “Introduction to the Special Issue on Biometrics: Progress and Directions”, IEEE Transactions on Pattern Analysis and Machine Intelligence, VOL. 29, NO. 4, APRIL 2007.
SinjiniMitra, MariosSavvides, Anthony Brockwell, “Statistical Performance Evaluation of Biometric Authentication Systems using Random Effects Models”,
Patrick Grother and ElhamTabassi,”Performance of Biometric Quality Measures”, Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:29 , Issue: 4 )
M.-H. Yang, D. Kriegman, and N. Ahuja. Detecting faces in images: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(1):34–58, January 2002.
M. Golfarelli, D. Maio, and D. Maltoni, “On the error-reject tradeoff in biometric verification systems,” IEEE Trans. Pattern Anal. Machine Intell. , vol. 19, pp. 786 –796, July 1997.
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial gummy fingers on fingerprint systems,” Proc. SPIE, vol. 4677, pp. 275–289, Feb. 2002.
Y. Moses, Y. Adini, and S. Ullman. Face recognition: The problem of compensating for changes in illumination direction. In European Conf. on Computer Vision, pages 286–296, 1994.
P. J. Phillips, H. Moon, P. Rauss, and S. A. Rizvi. The feret evaluation methodology for face-recognition algorithms. InComputer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on, pages 137–143, 1997.
S. A. Rizvi, H. Moon, and P. J. Phillips. The feret verification testing protocol for face recognition algorithms. InAutomatic Face and Gesture Recognition, 1998. Pro-ceedings. Third IEEE International Conference on, pages 48–53, 1998.
P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss. The feret evaluation methodology for face-recognition algorithms. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 22(10):1090–1104, 2000.
K. I. Chang, K. W. Bowyer, and P. J. Flynn. An evaluation of multimodal 2d+3d face biometrics. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 27(4):619–624, 2005.
X. Lu, A. K. Jain, and D. Colbry. Matching 2.5d face scans to 3d models. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 28(1):31–43, 2006.
S. Lao, Y. Sumi, M. Kawade, and F. Tomita. 3d template matching for pose invariant face recognition using 3d facial model built with isoluminance line based stereo vi-sion. InPattern Recognition, 2000. Proceedings. 15th International Conference on, volume 2, pages 911–916 vol.2, 2000.
C. BenAbdelkader and P. A. Griffin. Comparing and combining depth and texture cues for face recognition.Image and Vision Computing, 23(3):339–352, 2005.
V. Blanz and T. Vetter. Face recognition based on fitting a 3d morphable model. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 25(9):1063–1074, 2003.
D. Nandy and J. Ben-Arie. Shape from recognition: a novel approach for 3-d face shape recovery. Image Processing, IEEE Transactions on, 10(2):206–217, 2001.
C. Zhang and F. S. Cohen. 3-d face structure extraction and recognition from images using 3-d morphing and distance mapping. Image Processing, IEEE Transactions on, 11(11):1249–1259, 2002.
M. W. Lee and S. Ranganath. Pose-invariant face recognition using a 3d deformable model.Pattern Recognition, 36(8):1835–1846, 2003.
N. K. Ratha, A. Senior, R. M. Boile, S. Singh, N. Murshed, and W. Kropatsch. Automated biometrics. In S. Singh, N. Murshed, and W. Kropatsch, editors, Advances in Pattern Recognition - ICAPR 2001. Second International Conference. Proceedings (Lecture Notes in Computer Science Vol.2013), pages 445–453. Springer-Verlag, IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA, 2001.
N.K. Ratha, J.H. Connell, and R.M. Bolle, “An analysis of minutiae matching strength”, Proc.AVBPA 2001, Third International Conference on Audio and Video Based Biometric Person Authentication, pp. 223-228, 2001.
UmutUludag, Anil K. Jain, “Attacks on Biometric Systems: A Case Study in Fingerprints”,
B.Schneier, “The uses and abuses of biometrics”, Communications of the ACM, August 1999, Vol 42, No.8, pp. 136.
P.J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. Frvt 2002: Overview and summary. available at www.frvt.org, March 2003.
V. Blanz and T. Vetter. Face recognition based on fitting a 3d morphable model. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 25(9):1063–1074, 2003.
Shalini Gupta, Mia. K. Markey, Alan C. Bovik, “Advances and Challenges in 3D and 2D+3D Human Face Recognition”
L. Akarun, B. Gokberk, and A. A. Salah. 3d face recognition for biometric applications. In 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey, September 2005.
Soweon Yoon, Jianjiang Feng, Anil K. Jain, “Altered Fingerprints: Analysis and Detection”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 34, 2012.
J. Feng, A. K. Jain, A. Ross, "Fingerprint Alteration", MSU Technical Report, MSU-CSE-09-30, Dec. 2009.
A. Abhyankar and S. Schuckers. 2009. Integrating a Wavelet based Perspiration Liveness Check with Fingerprint Recognition. Pattern Recognition 42 (2009), 452–464.
M. Sepasian, C. Mares, and W. Balachandran. 2010. Vitality Detection in Fingerprint Identification.Information Science and Applications4 (2010).
D. Maltoni, D. Maio, A. Jain, and S. Prabhakar. 2003.Handbook of Fingerprint Recognition. Springer.
A. Jain, Y. Chen, and M. Demirkus. 2007. Pores and Ridges: Fingerprint Matching Using Level 3 Features. IEEE Transactions on Pattern Analysis and Machine Intelligence29, 1 (2007), 15–27.
T. Fladsrud and R. Sollie. 2004. Circumvention of Fingerprint Scanners. (December 2004).
A. Wiehe, T. Søndrol, O. Olsen, and F. Skarderud. 2004. Attacking Fingerprint sensors.Gjøvik University College 200 (2004).
http://www.journalofaestheticsandprotest.org/4/fingerprint/fingerprint.pdf
S. Yang, C. Wang, and S. Chen. 2011. A Release-Induced Response for the Rapid Recognition of Latent Fingerprints and Formation of Inkjet-Printed Patterns. AngewandteChemie 123, 16 (2011), 3790–3793.
A. Franco and D. Maltoni. 2008. Fingerprint Synthesis and Spoof Detection.Advances in Biometrics(2008), 385–406.
A. Ross, J. Shah, and A. Jain. 2007. From Template to Image: Reconstructing Fingerprints From Minutiae Points. IEEE Transactions on Pattern Analysis and Machine Intelligence29, 4 (2007), 544–560.
J. Galbally, R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez. 2008. Fake fingertip generation from a minutiae template.19th International Conference on Pattern Recognition (ICPR)(Dec. 2008), 1 –4.
Refbacks
- There are currently no refbacks.