排序方式: 共有15条查询结果,搜索用时 15 毫秒
1.
目前的虹膜识别都是采用在图像上提取特征点,并将特征点编码为固定长度的特征数据用于匹配的方式。这种方式使虹膜识别系统易受攻击。为了进一步提高虹膜识别系统的安全性和识别速度,提出了一种基于灰度曲面匹配的虹膜识别方法。该方法抛弃了特征提取和编码等传统操作,在特征分析的基础上直接利用了灰度曲面匹配的思想,首先对两幅图像中的像素灰度做差,得到灰度差曲面,然后求出该灰度差曲面的方差。将此方差作为衡量两个虹膜特征曲面之间距离的依据,并据此判定两个虹膜是否来自同一只眼睛。在给定阈值为40的前提下,正确识别率为96.89%,识别时间为53.2 ms。实验结果证明,该方法识别准确率高,识别速度快。 相似文献
2.
M. Araceli Snchez-Snchez Cristina Conde Beatriz Gmez-Aylln David Ortega-DelCampo Aristeidis Tsitiridis Daniel Palacios-Alonso Enrique Cabello 《Entropy (Basel, Switzerland)》2020,22(11)
Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics using the learned features from a convolutional neural network. Three sensors are considered to design and develop a new database that is composed of visible (VIS), near-infrared (NIR), and thermal images. Most studies are based on laboratory or ideal conditions-controlled environments. However, in a real scenario, a subject’s situation is completely modified due to diverse physiological conditions, such as stress, temperature changes, sweating, and increased blood pressure. For this reason, the added value of this study is that this database was acquired in situ. The attacks considered were printed, masked, and displayed images. In addition, five classifiers were used to detect the presentation attack. Note that thermal sensors provide better performance than other solutions. The results present better outputs when all sensors are used together, regardless of whether classifier or feature-level fusion is considered. Finally, classifiers such as KNN or SVM show high performance and low computational level. 相似文献
3.
M. Choraś 《Opto-Electronics Review》2008,16(1):85-96
Geometrical methods of feature extraction from ear images in order to perform human identification are presented. Geometrical
approach is motivated by the actual procedures used by police and forensic experts (so-called ear otoscopy). In their work,
geometrical features of ears such as size, height, width, and shapes of earlobe are useful and valid proofs of identity. The
contribution of the article is development of the new and original methods of geometrical feature extraction from 2D ear images.
Four novel algorithms of ear feature extraction from contour images are described in detail. Moreover, identification results
obtained for each of the methods, based on the distance of feature vectors in the feature space, are presented. 相似文献
4.
Hyeong In Choi Sungjin Lee Hwan Pyo Moon Nam-Sook Wee Daehoon Kim Song-Hwa Kwon 《Entropy (Basel, Switzerland)》2021,23(7)
It is known that a variant of Ising model, called Seeded Ising Model, can be used to recover the information content of a biometric template from a fraction of information therein. The method consists in reconstructing the whole template, which is called the intruder template in this paper, using only a small portion of the given template, a partial template. This reconstruction method may pose a security threat to the integrity of a biometric identity management system. In this paper, based on the Seeded Ising Model, we present a systematic analysis of the possible security breach and its probability of accepting the intruder templates as genuine. Detailed statistical experiments on the intruder match rate are also conducted under various scenarios. In particular, we study (1) how best a template is divided into several small pieces called partial templates, each of which is to be stored in a separate silo; (2) how to do the matching by comparing partial templates in the locked-up silos, and letting only the results of these intra-silo comparisons be sent to the central tallying server for final scoring without requiring the whole templates in one location at any time. 相似文献
5.
Musumarra G Condorelli DF Costa AS Fichera M 《Journal of computer-aided molecular design》2001,15(3):219-234
A multivariate insight into the in vitro antitumour screen database of the NCI by means of the SIMCA package allows to propose hypotheses on the mechanism of action of novel anticancer compounds. As an example, the application of multivariate analysis to the NCI standard database provided clues to the classification of drugs whose mechanism is either unknown or controversial. Moreover, the influence of intrinsic biochemical cell line properties (molecular targets) on the sensitivity to drug treatment could be evaluated simultaneously for classes of compounds which act by the same mechanism. Interestingly, the present approach can also provide a correlation between the molecular targets and the therapeutical fingerprint of novel active compounds thus suggesting specific biochemical studies for the investigation of new mechanisms of drug action and resistance. The statistical approach reported here represents a valuable tool for handling theenormous data sets deriving from recent genome-wide investigations of gene expression in the NCI cell lines. 相似文献
6.
Abeer D. Algarni Ghada El Banby Sahar Ismail Walid El-Shafai Fathi E. Abd El-Samie Naglaa F. Soliman 《Entropy (Basel, Switzerland)》2020,22(12)
The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the security level and privacy of users against attacks, cancelable biometrics can be utilized. The principal objective of cancelable biometrics is to generate new distorted biometric templates to be stored in biometric databases instead of the original ones. This paper presents effective methods based on different discrete transforms, such as Discrete Fourier Transform (DFT), Fractional Fourier Transform (FrFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), in addition to matrix rotation to generate cancelable biometric templates, in order to meet revocability and prevent the restoration of the original templates from the generated cancelable ones. Rotated versions of the images are generated in either spatial or transform domains and added together to eliminate the ability to recover the original biometric templates. The cancelability performance is evaluated and tested through extensive simulation results for all proposed methods on a different face and fingerprint datasets. Low Equal Error Rate (EER) values with high AROC values reflect the efficiency of the proposed methods, especially those dependent on DCT and DFrFT. Moreover, a comparative study is performed to evaluate the proposed method with all transformations to select the best one from the security perspective. Furthermore, a comparative analysis is carried out to test the performance of the proposed schemes with the existing schemes. The obtained outcomes reveal the efficiency of the proposed cancelable biometric schemes by introducing an average AROC of 0.998, EER of 0.0023, FAR of 0.008, and FRR of 0.003. 相似文献
7.
8.
Robert N. Grass Reinhard Heckel Christophe Dessimoz Wendelin J. Stark 《Angewandte Chemie (International ed. in English)》2020,59(22):8476-8480
Today, we can read human genomes and store digital data robustly in synthetic DNA. Herein, we report a strategy to intertwine these two technologies to enable the secure storage of valuable information in synthetic DNA, protected with personalized keys. We show that genetic short tandem repeats (STRs) contain sufficient entropy to generate strong encryption keys, and that only one technology, DNA sequencing, is required to simultaneously read the key and the data. Using this approach, we experimentally generated 80 bit strong keys from human DNA, and used such a key to encrypt 17 kB of digital information stored in synthetic DNA. Finally, the decrypted information was recovered perfectly from a single massively parallel sequencing run. 相似文献
9.
10.
由于虹膜自身的稳定性、非侵犯性、不可更改性等优点,虹膜识别已经成为生物特征身份鉴别领域中的研究热点。但虹膜丰富的纹理和复杂的结构给特征提取和编码带来了很大困难。为尽可能地简化特征提取和编码方法,提高虹膜识别效率,提出了一种基于局部信息统计的虹膜分块编码方法。对原始人眼图像进行虹膜定位等预处理操作,得到归一化的虹膜纹理图像;分别根据虹膜局部信息与全局信息、局部信息与局部信息之间的比较关系进行分块编码;计算了不同虹膜代码之间的汉明(Hamming)距离。根据汉明距离给出识别结果。实验证明该方法有效、可行,具有较高的识别率和识别速度。 相似文献