• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 14
  • 4
  • 1
  • 1
  • Tagged with
  • 43
  • 43
  • 17
  • 14
  • 14
  • 14
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Uma nova abordagem para reconhecimento biométrico baseado em características dinâmicas da íris humana / A new approach for biometric recognition based on dynamic characteristics of the human iris

Ronaldo Martins da Costa 19 February 2010 (has links)
A identificação pessoal através da análise da textura da íris é um método de identificação biométrico de grande eficiência. Algoritmos e técnicas foram desenvolvidos levando-se em consideração as características de textura da imagem da íris do olho humano. No entanto, essas características por serem estáticas são também susceptíveis a fraudes, ou seja, uma foto pode substituir a íris em análise. Por isso, este trabalho propõe um método para extrair as características de textura da íris durante a contração e dilatação da pupila, além das próprias características dinâmicas de contração e dilatação. Para isso foi desenvolvido um novo sistema de aquisição da imagem utilizando iluminação NIR (Near Infra-Red) e levando-se em conta o reflexo consensual dos olhos. As características são medidas de acordo com um padrão dinâmico de iluminação controlado pelo programa. Com isso, é possível aumentar a segurança de dispositivos de reconhecimento biométrico de pessoas através da íris, pois, somente íris vivas podem ser utilizadas. Os resultados mostram um índice de precisão significativo na capacidade de discriminação destas características. / The personal identification by iris texture analysis is a highly effective biometric identification method. Some algorithms and techniques were developed, taking into consideration the texture features of the iris image in the human eye. Nonetheless, such features, due to the fact that they are static, are also susceptible to fraud. That is, a picture can replace the iris in an analysis. For that reason, this work proposes a method for extracting texture features of the iris during the pupil contraction and dilation, in addition to the dynamic contraction and dilation features themselves. Therefore, it was developed a new image acquisition system through NIR (Near Infra-Red) illumination, considering the consensual reflex of the eyes. Features are measured according to a dynamic illumination standard controlled by the software and are afterwards selected by means of data mining. Then it is possible to increase the safety in the biometric recognition devices of people through their iris, since only living irises can be utilized. Results show a significant precision index in determining such features.
12

Towards Template Security for Iris-based Biometric Systems

Fouad, Marwa 18 April 2012 (has links)
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
13

Person Identification by Face and Iris / Asmens identifikavimas pagal veidą ir akies rainelę

Kranauskas, Justas 13 February 2010 (has links)
In this thesis, person identification by combining automatic face and iris recognition is analyzed. Person identification by his face is one of the most intuitive from all biometric measures. We are used to recognizing familiar faces and confirming identity by a short glance at one's id card which contains image of the face. We are also used to being observed by surveillance cameras, which can perform biometric authentication without even being noticed. However, facial biometrics is one of most unstable metrics because the face gets noticeably older in several years and can frequently change depending on the mood of its owner. The core algorithm for facial recognition presented in this work is based on Gabor features. Deep analysis of each step helped to develop the method with better or similar accuracy to the best published results received on the same datasets, while being simple and fast. On the other hand, person identification by his iris is one of the most sophisticated, stable and accurate biometrics. The core algorithm for iris recognition presented in this work is based on a novel iris texture representation by local extremum points of multiscale Taylor expansion. The proposed irises comparison method is very different from the classic phase-based methods, but is also fast and accurate. Combining it with our implementation of phase-based method results in superior recognition accuracy which is comparable or better than any published results received on the same... [to full text] / Darbe tyrinėjama asmens identifikacija, kombinuojant automatinį veido ir akies rainelės atpažinimą. Automatinė identifikacija pagal veidą yra intuityviausia iš biometrijos metrikų, kadangi būtent pagal veidą mes geriausiai sugebame atpažinti pažįstamus asmenis. Tai yra ir viena labiausiai priimtinų, kadangi visi esame įprate, kad mus filmuoja apsaugos kameros, lengviausiai išmatuojama - nes nereikalauja jokių įmantrių skanerių, tačiau kartu - tai yra ir viena iš nestabiliausių metrikų, kadangi veidas sensta ir šiaip kinta priklausomai nuo savininko nuotaikos. Darbe pristatomas veidų atpažinimo algoritmas paremtas Gaboro požymiais. Nuodugni analizė padėjo sukurti algoritmą, kurio tikslumą vertinant standartiniais testais jis lenkia arba yra lygus su geriausiais publikuotais metodais, tačiau pasižymi paprastumu ir dideliu greičiu. Tuo tarpu automatinė identifikacija pagal rainelę yra laikoma viena stabiliausių ir tiksliausių. Darbe pristatomas rainelių atpažinimo algoritmas naudoja naujovišką rainelių tekstūros vaizdavimo būdą, paremtą lokaliais dvimačiais funkcijų aproksimacijos Teiloro eilutėmis ekstremumais. Kartu pristatomas naudojamų požymių palyginimo metodas, kuris yra labai nutolęs nuo bet kokių iki šiol rainelių tekstūrų palyginimui naudojamų metodų. Pasiūlytas rainelių atpažinimo metodas vėlgi yra spartus ir itin tikslus, o sujungus su klasikinio stiliaus rainelių tekstūrų palyginimu tikslumu nenusileidžia geriausiems publikuotiems metodams. Darbas užbaigiamas veidų... [toliau žr. visą tekstą]
14

Asmens identifikavimas pagal veidą ir akies rainelę / Person Identification by Face and Iris

Kranauskas, Justas 13 February 2010 (has links)
Darbe tyrinėjama asmens identifikacija, kombinuojant automatinį veido ir akies rainelės atpažinimą. Automatinė identifikacija pagal veidą yra intuityviausia iš biometrijos metrikų, kadangi būtent pagal veidą mes geriausiai sugebame atpažinti pažįstamus asmenis. Tai yra ir viena labiausiai priimtinų, kadangi visi esame įprate, kad mus filmuoja apsaugos kameros, lengviausiai išmatuojama - nes nereikalauja jokių įmantrių skanerių, tačiau kartu - tai yra ir viena iš nestabiliausių metrikų, kadangi veidas sensta ir šiaip kinta priklausomai nuo savininko nuotaikos. Darbe pristatomas veidų atpažinimo algoritmas paremtas Gaboro požymiais. Nuodugni analizė padėjo sukurti algoritmą, kurio tikslumą vertinant standartiniais testais jis lenkia arba yra lygus su geriausiais publikuotais metodais, tačiau pasižymi paprastumu ir dideliu greičiu. Tuo tarpu automatinė identifikacija pagal rainelę yra laikoma viena stabiliausių ir tiksliausių. Darbe pristatomas rainelių atpažinimo algoritmas naudoja naujovišką rainelių tekstūros vaizdavimo būdą, paremtą lokaliais dvimačiais funkcijų aproksimacijos Teiloro eilutėmis ekstremumais. Kartu pristatomas naudojamų požymių palyginimo metodas, kuris yra labai nutolęs nuo bet kokių iki šiol rainelių tekstūrų palyginimui naudojamų metodų. Pasiūlytas rainelių atpažinimo metodas vėlgi yra spartus ir itin tikslus, o sujungus su klasikinio stiliaus rainelių tekstūrų palyginimu tikslumu nenusileidžia geriausiems publikuotiems metodams. Darbas užbaigiamas veidų... [toliau žr. visą tekstą] / In this thesis, person identification by combining automatic face and iris recognition is analyzed. Person identification by his face is one of the most intuitive from all biometric measures. We are used to recognizing familiar faces and confirming identity by a short glance at one's id card which contains image of the face. We are also used to being observed by surveillance cameras, which can perform biometric authentication without even being noticed. However, facial biometrics is one of most unstable metrics because the face gets noticeably older in several years and can frequently change depending on the mood of its owner. The core algorithm for facial recognition presented in this work is based on Gabor features. Deep analysis of each step helped to develop the method with better or similar accuracy to the best published results received on the same datasets, while being simple and fast. On the other hand, person identification by his iris is one of the most sophisticated, stable and accurate biometrics. The core algorithm for iris recognition presented in this work is based on a novel iris texture representation by local extremum points of multiscale Taylor expansion. The proposed irises comparison method is very different from the classic phase-based methods, but is also fast and accurate. Combining it with our implementation of phase-based method results in superior recognition accuracy which is comparable or better than any published results received on the same... [to full text]
15

Towards Template Security for Iris-based Biometric Systems

Fouad, Marwa 18 April 2012 (has links)
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
16

Paralelização em CUDA/GLSL do algoritmo SIFT para reconhecimento de íris / A CUDA/GLSL parallelization of SIFT algorithm for iris recognition

Luiz Fernando Rosalba Telles de Sousa 28 February 2012 (has links)
Conselho Nacional de Desenvolvimento Científico e Tecnológico / Neste trabalho é estudada a viabilidade de uma implementação em paralelo do algoritmo scale invariant feature transform (SIFT) para identificação de íris. Para a implementação do código foi utilizada a arquitetura para computação paralela compute unified device architecture (CUDA) e a linguagem OpenGL shading language (GLSL). O algoritmo foi testado utilizando três bases de dados de olhos e íris, o noisy visible wavelength iris image Database (UBIRIS), Michal-Libor e CASIA. Testes foram feitos para determinar o tempo de processamento para verificação da presença ou não de um indivíduo em um banco de dados, determinar a eficiência dos algoritmos de busca implementados em GLSL e CUDA e buscar valores de calibração que melhoram o posicionamento e a distribuição dos pontos-chave na região de interesse (íris) e a robustez do programa final. / Present work studies the feasibility of a parallel implementation of the scene recognition algorithm SIFT for iris recognition. The code was built using the Compute Unified Device Architecture (CUDA) and the shading language GLSL. The algorithm was tested using three databases containing eyes and iris, the UBIRIS, Michal- Libor and CASIA. Tests were made for: analyzing the requested time for checking if an subject is or is not present on current database, the efficiency of the search algorithms written in CUDA and GLSL, the search for calibration values that improve keypoints position and distribution through the region of interest (iris), analyzing the reliability of the final code.
17

Paralelização em CUDA/GLSL do algoritmo SIFT para reconhecimento de íris / A CUDA/GLSL parallelization of SIFT algorithm for iris recognition

Luiz Fernando Rosalba Telles de Sousa 28 February 2012 (has links)
Conselho Nacional de Desenvolvimento Científico e Tecnológico / Neste trabalho é estudada a viabilidade de uma implementação em paralelo do algoritmo scale invariant feature transform (SIFT) para identificação de íris. Para a implementação do código foi utilizada a arquitetura para computação paralela compute unified device architecture (CUDA) e a linguagem OpenGL shading language (GLSL). O algoritmo foi testado utilizando três bases de dados de olhos e íris, o noisy visible wavelength iris image Database (UBIRIS), Michal-Libor e CASIA. Testes foram feitos para determinar o tempo de processamento para verificação da presença ou não de um indivíduo em um banco de dados, determinar a eficiência dos algoritmos de busca implementados em GLSL e CUDA e buscar valores de calibração que melhoram o posicionamento e a distribuição dos pontos-chave na região de interesse (íris) e a robustez do programa final. / Present work studies the feasibility of a parallel implementation of the scene recognition algorithm SIFT for iris recognition. The code was built using the Compute Unified Device Architecture (CUDA) and the shading language GLSL. The algorithm was tested using three databases containing eyes and iris, the UBIRIS, Michal- Libor and CASIA. Tests were made for: analyzing the requested time for checking if an subject is or is not present on current database, the efficiency of the search algorithms written in CUDA and GLSL, the search for calibration values that improve keypoints position and distribution through the region of interest (iris), analyzing the reliability of the final code.
18

Towards Template Security for Iris-based Biometric Systems

Fouad, Marwa January 2012 (has links)
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
19

Integrating biometric authentication into multiple applications

Breedt, Morne 28 August 2007 (has links)
The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial transaction and distribution channel, security has become a big concern. Fortunately, the field of information security has started to evolve in response and is fast becoming an important discipline with a sound theoretical basis. The discipline views the twin processes of identification and authentication as crucial aspects of information security. An individual access attempt must be identifiable prior to access being authorised otherwise system confidentiality cannot be enforced nor integrity safeguarded. Similarly, non-denial becomes impossible to instigate since the system is unable to log an identity against specific transactions. Consequently, identification and authentication should always be viewed as the first step to successfully enforcing information security. The process of identification and authorisation is, in essence, the ability to prove or verify an identity. This is usually accomplished using either one or a combination of the following three traditional identification techniques: something you possess; something you know; or something you are. A critical consideration when designing an application is which identification method, or combination of methods, from the three described above to use. Each method offers its own pros and cons and there are many ways to compare and contrast them. The comparison made in this study identifies biometrics as the best solution in a distributed application environment. There are, however, two over-arching hindrances to its widespread adoption. The first is the environment’s complexity - with multiple applications being accessed by both the public and the private sectors - and the second is that not all biometrics are popular and no single method has universe appeal. The more significant hindrance of the two is the latter, that of acceptance and trust, because it matters little how good or efficient a system is if nobody is willing to use it. This observation suggests that the identification system needs to be made as flexible as possible. In a democratic society, it could be argued that the best way of ensuring the successful adoption of a biometric system would be to allow maximum freedom of choice and let users decide which biometric method they would like to use. Although this approach is likely to go a long way towards solving the acceptance issue, it increases the complexity of the environment significantly. This study attempts to solve this problem by reducing the environment’s complexity while simultaneously ensuring the user retains maximum biometric freedom of choice. This can be achieved by creating a number of central biometric repositories. Each repository would be responsible for maintaining a biometric template data store for a type of biometric. These repositories or “Biometric Authorities” would act as authentication facilitators for a wide variety of applications and free them from that responsibility. / Dissertation (MSc (Computer Engineering))--University of Pretoria, 2005. / Electrical, Electronic and Computer Engineering / MSc / unrestricted
20

Iris categorization using texton representation and symbolic features

Meyer, Rachel E. 01 January 2014 (has links)
Biometric identification uses individuals' characteristics to attempt to match a sample to a database of existing samples. An increasingly commonly used characteristic is the iris section of the eye, which is valued for its uniqueness among individuals and stability over time. One key concern with iris recognition systems is the time required to find a test sample's match in a database of subjects. This work considers methods for categorizing irises within a database, so that a search for a match to a test sample can be focused on the test sample's category. The main method for categorization used in this work is texton learning. Texton learning involves creating a vocabulary of features and determining how much of each feature a given sample has. Once images are represented by textons, they are clustered in an unsupervised process. Success of the system is assessed as its ability to take a previously unseen image from a subject and classify it the same as the database reference for the subject. This work improves upon the past applications of texton learning with more thorough experiments to determine the optimal number of textons and image clusters. This system also investigates different accuracy metrics, with this work detailing two key methods and their relative benefits. Additionally, more in depth analysis is given for potential time saving impacts for finding a database match. Beyond the improvements to texton learning, symbolic features (ethnicity and gender) have been incorporated into the categorization process using a probabilistic metric. This is an innovative combination of using the numerical representation of the iris along with demographic information.

Page generated in 0.0682 seconds