bringing the world locally
About us
Subscription
Review Committee
Conferences
Publications
FAQ
Contact
 
Members Login
    You are not logged in.
Username


Password



CiiT International Journal of Biometrics and Bioinformatics
Print: ISSN 0974 – 9675 & Online: ISSN 0974 – 956X

20082009 20102011 2012 2013
 April June November

Issue : April 2009
DOI: BB042009001
Title: An Approach to Biometric Authentication Using Hidden Markov Model
Authors: Malaya Dutta Borah, Ganesh Chandra Deka
Keywords: Hidden Markov Model (HMM), Fingerprints Matching, Biometric Authentication, Parametric Random Process, Texture Pattern, Welch Re-Estimation
Abstract:
         One of the most challenging Biometric Authentication is fingerprint identification. In 1893, the Home Ministry office, UK accepted that no two individuals have the same fingerprints, i.e never identical in every detail. Due to this property fingerprints are widely used by law enforcement applications. Fingerprint identification system mostly consists of extraction, classification and matching. In this paper we are going to propose a theoretical model for fingerprint matching using Hidden Markov Model (HMM). Our main focus is on extracting reference information; detect sample vectors, pretreatment including noise illumination and training process of HMM engine. The underlying assumption of proposed HMM is that the fingerprint texture pattern and orientation can be well characterized as a parametric random process and hence reduce the size of the search space of a fingerprint database and accordingly increase the speed of fingerprint matching

Full PDF


Issue : April 2009
DOI: BB042009002
Title: Face Recognition Using Parallel Algorithm

Authors: N. Verma, S. C. Panigrahi and A. Mustafi
Keywords: Dilation, Face Recognition, Histogram, Local Binary Patterns, Occurrence Map
Abstract:
         In this paper we present a novel parallel implementation of Local Binary Pattern based face recognition algorithm, improving the recognition accuracy. An adaptive block matching method is introduced in the context of the proposed algorithm for parallel image processing. The local binary pattern approach has evolved to represent significant breakthrough in texture analysis, outperforming earlier methods in many applications. Perhaps the most important property of the LBP operator in real-world applications is its tolerance against illumination changes. Another equally important is its computational simplicity, which makes it possible to analyze images in challenging real-time settings. Our excellent results suggest that that texture and the ideas behind the LBP methodology could have a much wider role in image analysis and computer vision than was thought before. Extensive experiments clearly show the superiority of the proposed scheme over all considered methods (PCA, Bayesian Intra/extrapersonal Classifier and Elastic Bunch Graph Matching) on FERET tests which include testing the robustness of the method against different facial expressions, lighting and aging of the subjects. In addition to its efficiency, the simplicity of the proposed method allows for very fast feature extraction.

Full PDF


Issue : April 2009
DOI: BB042009003
Title: Fingerprint Enhancement Based on Ridge Orientation and Ridge Frequency
Authors: Mrs.S. Malathi, Mrs.S. Umamaheswari, Dr.C. Meena
Keywords: Fingerprint Enhancement, Minutiae Extraction, Ridge, Valley, Ridge Orientation, Ridge Frequency, AFIS
Abstract:
         The performance of any fingerprint recognizer highly depends on the fingerprint image quality. Different types of noises in the fingerprint images pose greater difficulty for recognizers. Most Automatic Fingerprint Identification Systems (AFIS) use some form of image enhancement. Although several methods have been described in the literature, there is still scope for improvement. In order to ensure that the performance of an automatic fingerprint identification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. This paper presents a fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.

Full PDF


Issue : April 2009
DOI: BB042009004
Title: Security Analysis of Multimodal Biometric Fuzzy Vault
Authors: V.S. Meenakshi, Dr. G. Padmavathi
Keywords: Biometrics, Multi Biometrics, Fuzzy Vault, Multi Biometric Fuzzy Vault, Biometric Template Security, Min-Entropy, Crypto Biometric Systems
Abstract:
         Crypto biometric systems are authentication systems where the concept of biometric authentication is blended with cryptography. Crypto-biometric systems utilize the advantages of biometrics over traditional password based authentication. This paper uses the idea of fuzzy vault cryptographic constructs to protect crucial data like secret encryption key. Fuzzy vault is a proven emerging technology for providing biometric template security. This work constructs two independent fingerprint and iris vaults and a combined multimodal biometric vault. The proposed multimodal biometric fuzzy vault uses the features extracted from both finger print and iris for ensuring high security of the critical data and the biometric template. It is comparatively difficult for an attacker to compromise multi modal biometric fuzzy vault system than single biometric fuzzy vault systems. This work measures the security of the constructed fuzzy vault by means of min-entropy.

Full PDF


Issue : April 2009
DOI: BB042009005
Title: User Identification Using Keystroke Dynamics
Authors: Mrs. D. Shanmugapriya, Dr. G. Padmavathi
Keywords: Biometric, Entropy, False Acceptance Rate, False Rejection Rate
Abstract:
         Keyboard Entropy is a feature, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the entropy of the user. The objective of the paper is to design and implement a biometric authentication scheme by means of keyboard entropy to secure all applications, which require password authentication. Username and password pairs as authentication factors are as weak as they are ubiquitous. Use of a single factor of authentication is so weak that multi factor authentication methods are required. The tolerance factor provides a bit of leniency to check the authenticity of user. It is introduced in the master data depending upon how much deviation is caused by the user at different times. This paper proposes two formulae for calculating tolerance value which generates False Acceptance rate (FAR) and False Rejection Rate (FRR).

Full PDF


Issue : April 2009
DOI: BB042009006
Title: Gene Data Classification Using Hybrid Hierarchical Multi-label Classifier
Authors: Santhi Thilagam and Rama Sri Sindhura
Keywords: Hierarchical Multi-Label Classification, Gene Prediction, Predictive Clustering Trees
Abstract:
         Gene function prediction is a multi-class classification problem since genes typically play multiple roles biologically. The predictions can then be given to biologists for experimental validation. As such, we face a more challenging classification problem than typical binary classification that only needs to determine whether a gene belongs to a particular functional class or not. The solution to this problem has been formulated using Predictive Clustering Trees and its implementation exists. We attempt to improve the accuracy of prediction of the results of the above implementation using additional single classifiers. We define an appropriate distance metric for hierarchical multi-classification and present experiments evaluating this approach on a number of data sets that are available for yeast.

Full PDF