This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction to BiometricsOutlineSlide 3Some Topics in BiometricsOverviewFingerprint IdentificationFingerprint Identification (Concluded))Hand GeometryFace Location and RetrievalMulti-BiometricsIntroduction to BiometricsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #6Guest Lecture + Some Topics in BiometricsSeptember 12, 2005OutlineGuest LectureSome Topics in BiometricsIntroduction to BiometricsGuest LectureImage Feature Extraction and Annotation September 12, 2005Some Topics in BiometricsReference-http://biometrics.cse.msu.edu/info.html-Papers published on the web by researchers at Michigan State UniversityOverviewFingerprint IdentificationHand GeometryFace LocationMulti-BiometricsOverviewBiometrics is the automatic identification of a person based on his/her physiological and behavioral characteristicsVerification vs. Identification-Am I whom I claim I am?-Who am I?Applications-Criminal identification, ATMs, Cellular Phones, Smart cards, PCs, E-Commerce, Automobiles (biometrics replacing car keys)Fingerprint IdentificationFinger-print matching-Two categories: Minutiae based, Correlation basedMinutiae-based techniques-First find the minutiae points and then map their relative placement on the finger-Issues: difficult to extract minutiae points if fingerprinting is of low qualityCorrelation-based techniques-Spatial correlation of regions-Issues: Affected by Image translationFingerprint Identification (Concluded))Finger-print classification-Classify the fingerprints so that search time is reduced-Form groups of fingerprints; Classification is obtained by matching with pre-specified types of finger-prints-When a new finger-print arrives try and place it into a group-Classification based data mining/machine learning algorithms such as K-Nearest NeighborFingerprint Image Enhancement-Algorithms to enhance the finger-print-This is expected to facilitate finger-print matching-Makes it less difficult to extract minutiae from fingerprintsHand GeometryUses geometric shape of hand for authenticating user’s identity-Combine various individual features of hand for effective verificationHuman hand is not in general unique (not the case with fingerprints)Reason one may want to use hands instead of finger-prints is to ensure privacySome pros and cons-Hand geometry gives better privacy-But hand geometry is not unique; therefore may be used for verification-Not suitable for identificationFace Location and RetrievalProblem-Given an arbitrary black and white still image, find the location and size of every human face it containsApplications-First step in automatic face recognition-Image database indexing-Search by content for surveillance systemsMulti-BiometricsIntegrating Faces and Fingerprints for Identification-Single biometric may not be effective-Integrate multiple biometrics such as fingerprints and facesFingerprint, Face and Speech-Better to use a third biometric and that is speechChallenge-What is an effective combination of


View Full Document

UTD CS 6V81 - LECTURE NOTES

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?