This document proposes a novel multi-biometric fake detection system using image quality assessment-based liveness detection. The system uses 25 image quality measures calculated from test images of face and fingerprint modalities to classify samples as real or fake using a Linear Discriminant Analysis classifier. The experimental results on a database of real and fake 2D face and fingerprint images show that the proposed system can accurately classify samples with low complexity and without complex preprocessing steps. It is a fast, non-intrusive, and user-friendly approach that is more effective than other state-of-the-art fake detection methods.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
To ensure that the object presented in front of biometric device is real or reconstructed sample is a significant
problem in biometric authentication, which requires the development of new and efficient protection measures. This
paper, presents a software-based fake biometric detection method that can be used in multiple biometric systems to
detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of
biometric recognition devices through the use of image quality assessment in a fast and user friendly manner. The
proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using
25 general image quality features extracted from one image to distinguish between real and imposed samples. The
proposed method is highly competitive compared with other as the analysis of the general image quality of real
biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake
traits.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
The increasing use of distributed authentication architecture
has made interoperability of systems an important issue. Interoperabil ity of systems affects the maturity of the technology and also improves confidence of users in the technology. Biometric systems are not immune to the concerns of interoperability. Interoperability of fingerprint sensors and its effect on the overall performance of the recognition system is an area of interest with a considerable amount of work directed
towards it. This research analyzed effects of interoperability on error rates for fingerprint datasets captured from two optical sensors and a capacitive sensor when using a single commercially available fingerprint
matching algorithm. The main aim of this research was to emulate a
centralized storage and matching architecture with multiple acquisition
stations. Fingerprints were collected from 44 individuals on all three sensors and interoperable False Reject Rates of less than .31% were achieved using two different enrolment strategies.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
To ensure that the object presented in front of biometric device is real or reconstructed sample is a significant
problem in biometric authentication, which requires the development of new and efficient protection measures. This
paper, presents a software-based fake biometric detection method that can be used in multiple biometric systems to
detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of
biometric recognition devices through the use of image quality assessment in a fast and user friendly manner. The
proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using
25 general image quality features extracted from one image to distinguish between real and imposed samples. The
proposed method is highly competitive compared with other as the analysis of the general image quality of real
biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake
traits.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
The increasing use of distributed authentication architecture
has made interoperability of systems an important issue. Interoperabil ity of systems affects the maturity of the technology and also improves confidence of users in the technology. Biometric systems are not immune to the concerns of interoperability. Interoperability of fingerprint sensors and its effect on the overall performance of the recognition system is an area of interest with a considerable amount of work directed
towards it. This research analyzed effects of interoperability on error rates for fingerprint datasets captured from two optical sensors and a capacitive sensor when using a single commercially available fingerprint
matching algorithm. The main aim of this research was to emulate a
centralized storage and matching architecture with multiple acquisition
stations. Fingerprints were collected from 44 individuals on all three sensors and interoperable False Reject Rates of less than .31% were achieved using two different enrolment strategies.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Abstract—Biometric systems are increasingly deployed in networked environment, and issues related to interoperability are bound to arise as single vendor, monolithic architectures become less desirable. Interoperability issues affect every subsystem of the biometric system, and a statistical framework to evaluate interoperability is proposed. The framework was applied to the acquisition subsystem for a fingerprint recognition system and the results were evaluated using the framework. Fingerprints were collected from 100 subjects on 6 fingerprint sensors. The results show that performance of interoperable fingerprint datasets is not easily predictable and the proposed framework can aid in removing unpredictability to some degree.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
Biometric technology is a science that used to verify or identify the individual based on physical and/or
behavioral traits. Although biometric systems are considered more secure than other traditional methods such as
password, or key, they also have many limitations such as noisy image, or spoof attack. One of the solutions to
overcome these limitations, is by applying a multibiometric system. Multibiometric system has a significant
effect in improving the performance of both security and accuracy of the system. It also can alleviate the spoof
attacks and reduce the fail to enroll error. A multi-sample is one implementations of the multibiometric systems.
In this study, a new algorithm is suggested to provide a second chance for the genuine user who is rejected, to
compare his/her provided finger with the other samples of the same finger. Multisampling fingerprint is used to
implement this new algorithm. The algorithm is activated when the match score of the user is not equal to a
threshold but close to it, then the system provides another chance to compare the finger with another sample of
the same trait. Using multi-sample biometric system improved the performance of the system by reducing the
False Reject Rate (FRR). Applying the original matching algorithm on the presented database produced 3
genuine users, and 5 imposters for the same fingerprint. While after implementing the suggested condition, the
system performance is enhanced by producing 6 genuine users, and 2 imposters for the same fingerprint. This
work was built and executed depending on a previous Matlab code presented by Zhi Li Wu. Thresholds and
Receiver Operating Characteristic (ROC) curves computed before and after implementing the suggested
multibiometric algorithm. Both ROC curves compared. A final decision and recommendations are provided
depending on the results obtained from this project
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
The emergence of mobile platforms with increased storage and computing capabilities and the pervasive
use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-based detection techniques available today are becoming inefficient in detecting new and unknown malware. In
this research, a machine learning approach for the detection of malware on Android platforms is presented. The detection system monitors and extracts features from the applications while in execution and uses them to perform in-device detection using a trained K-Nearest Neighbour classifier. Results shows high performance in the detection rate of the classifier with accuracy of 93.75%, low error rate of
6.25% and low false positive rate with ability of detecting real Android malware.
The vulnerabilities of biometric sensors have been
discussed extensively in the literature and popularized in films and
television shows. This research examines the image quality of an
artificial print as compared to a genuine finger, and examines the
characteristics of the two, including minutiae counts and image
quality, as repeated samples are taken.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
6 women and land rights legal barriers impede women’s access to resourcesINFOGAIN PUBLICATION
A woman’s ability to own, inherit and control land and property is absolutely vital to her ability to access resources and participate in the economy. Yet many women do not have legal ownership rights to the land on which they live and work. This can increase women’s dependence on husbands and male, land-owning relatives and limit their access to credit and productive inputs. The Thomson Reuters Foundation and the World Bank partnered to better understand legal frameworks that affect women’s ability to access resources, with a particular focus on the legal and cultural barriers to women’s secure land rights. It covered both statutory and customary law, with a particular focus on how laws work in practice. This work should be seen as complementing other gender and law resources such as the World Bank’s Women, Business and the Law. In practice, women are disadvantaged in many countries where customary or religious law prevails with regards property laws, marital property regimes and inheritance. This Paper highlights Women and Land Rights, Legal Barriers impede women’s to access the resources.
This paper introduces air bearings. High-speed air bearings offer very specific advantages over other, more conventional bearing technologies. The reason use of air bearing air bearings as it avoid the traditional bearing-related problems of friction, wear, and lubricant handling, and offer distinct advantages in precision positioning and high speed applications. The use of air bearings means tool life can be greatly extended. Air bearings provide extreme radial and axial rotational precision. The factors affecting the performance of the air bearing like friction, wear, stiffness, load capacity. This paper also introduces with the types of air bearing. New air bearing products like flat bearing, air bushing, vacuum preloaded bearings, air bearing slides, radial bearing and its applications in various fields. It also discuss about the advantages and disadvantages of air bearings.
8 leaching of trace elements in enugu coal effect of acid concentrationINFOGAIN PUBLICATION
The effect of acid concentration on the trace elements composition of Enugu sub-bituminous coal from Onyeama Mine was investigated by leaching the coal using nitric acid (HNO3) of 0.5M, 1.0M, 1.5M and 2.0M concentrations. The amount of trace elements (in ppm) present in the filtrate from the leaching process were determined using Varian AA240 Atomic Absorption Spectrophotometer with cathode lamps of arsenic (As), cadmium (Cd), chromium (Cr), copper (Cu), and lead (Pb). Optimum leaching condition of the trace metals were obtained using 2.0M HNO3 solution for 1 hour and 75µm particle size which resulted in the detection of As(1.363ppm), Cu (1.413ppm), Cr (0.764ppm), Cd (0.146), and Pb (1.942ppm). 2.0M concentration of nitric acid has proven to be very effective in the leaching of trace metals in Enugu coal. Result of the SEM analysis shows that the porosity of the coal residue was increased and this provides strong evidence that significant amounts of inorganic elements were removed. Onyeama coal, therefore, contains large proportions of silica, calcium carbonate, and dolomite, as well as some elements such as aluminum, iron, and potassium, and other trace metals such as lead, chromium, cadmium, arsenic, mercury, copper.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Abstract—Biometric systems are increasingly deployed in networked environment, and issues related to interoperability are bound to arise as single vendor, monolithic architectures become less desirable. Interoperability issues affect every subsystem of the biometric system, and a statistical framework to evaluate interoperability is proposed. The framework was applied to the acquisition subsystem for a fingerprint recognition system and the results were evaluated using the framework. Fingerprints were collected from 100 subjects on 6 fingerprint sensors. The results show that performance of interoperable fingerprint datasets is not easily predictable and the proposed framework can aid in removing unpredictability to some degree.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
Biometric technology is a science that used to verify or identify the individual based on physical and/or
behavioral traits. Although biometric systems are considered more secure than other traditional methods such as
password, or key, they also have many limitations such as noisy image, or spoof attack. One of the solutions to
overcome these limitations, is by applying a multibiometric system. Multibiometric system has a significant
effect in improving the performance of both security and accuracy of the system. It also can alleviate the spoof
attacks and reduce the fail to enroll error. A multi-sample is one implementations of the multibiometric systems.
In this study, a new algorithm is suggested to provide a second chance for the genuine user who is rejected, to
compare his/her provided finger with the other samples of the same finger. Multisampling fingerprint is used to
implement this new algorithm. The algorithm is activated when the match score of the user is not equal to a
threshold but close to it, then the system provides another chance to compare the finger with another sample of
the same trait. Using multi-sample biometric system improved the performance of the system by reducing the
False Reject Rate (FRR). Applying the original matching algorithm on the presented database produced 3
genuine users, and 5 imposters for the same fingerprint. While after implementing the suggested condition, the
system performance is enhanced by producing 6 genuine users, and 2 imposters for the same fingerprint. This
work was built and executed depending on a previous Matlab code presented by Zhi Li Wu. Thresholds and
Receiver Operating Characteristic (ROC) curves computed before and after implementing the suggested
multibiometric algorithm. Both ROC curves compared. A final decision and recommendations are provided
depending on the results obtained from this project
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
The emergence of mobile platforms with increased storage and computing capabilities and the pervasive
use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-based detection techniques available today are becoming inefficient in detecting new and unknown malware. In
this research, a machine learning approach for the detection of malware on Android platforms is presented. The detection system monitors and extracts features from the applications while in execution and uses them to perform in-device detection using a trained K-Nearest Neighbour classifier. Results shows high performance in the detection rate of the classifier with accuracy of 93.75%, low error rate of
6.25% and low false positive rate with ability of detecting real Android malware.
The vulnerabilities of biometric sensors have been
discussed extensively in the literature and popularized in films and
television shows. This research examines the image quality of an
artificial print as compared to a genuine finger, and examines the
characteristics of the two, including minutiae counts and image
quality, as repeated samples are taken.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
6 women and land rights legal barriers impede women’s access to resourcesINFOGAIN PUBLICATION
A woman’s ability to own, inherit and control land and property is absolutely vital to her ability to access resources and participate in the economy. Yet many women do not have legal ownership rights to the land on which they live and work. This can increase women’s dependence on husbands and male, land-owning relatives and limit their access to credit and productive inputs. The Thomson Reuters Foundation and the World Bank partnered to better understand legal frameworks that affect women’s ability to access resources, with a particular focus on the legal and cultural barriers to women’s secure land rights. It covered both statutory and customary law, with a particular focus on how laws work in practice. This work should be seen as complementing other gender and law resources such as the World Bank’s Women, Business and the Law. In practice, women are disadvantaged in many countries where customary or religious law prevails with regards property laws, marital property regimes and inheritance. This Paper highlights Women and Land Rights, Legal Barriers impede women’s to access the resources.
This paper introduces air bearings. High-speed air bearings offer very specific advantages over other, more conventional bearing technologies. The reason use of air bearing air bearings as it avoid the traditional bearing-related problems of friction, wear, and lubricant handling, and offer distinct advantages in precision positioning and high speed applications. The use of air bearings means tool life can be greatly extended. Air bearings provide extreme radial and axial rotational precision. The factors affecting the performance of the air bearing like friction, wear, stiffness, load capacity. This paper also introduces with the types of air bearing. New air bearing products like flat bearing, air bushing, vacuum preloaded bearings, air bearing slides, radial bearing and its applications in various fields. It also discuss about the advantages and disadvantages of air bearings.
8 leaching of trace elements in enugu coal effect of acid concentrationINFOGAIN PUBLICATION
The effect of acid concentration on the trace elements composition of Enugu sub-bituminous coal from Onyeama Mine was investigated by leaching the coal using nitric acid (HNO3) of 0.5M, 1.0M, 1.5M and 2.0M concentrations. The amount of trace elements (in ppm) present in the filtrate from the leaching process were determined using Varian AA240 Atomic Absorption Spectrophotometer with cathode lamps of arsenic (As), cadmium (Cd), chromium (Cr), copper (Cu), and lead (Pb). Optimum leaching condition of the trace metals were obtained using 2.0M HNO3 solution for 1 hour and 75µm particle size which resulted in the detection of As(1.363ppm), Cu (1.413ppm), Cr (0.764ppm), Cd (0.146), and Pb (1.942ppm). 2.0M concentration of nitric acid has proven to be very effective in the leaching of trace metals in Enugu coal. Result of the SEM analysis shows that the porosity of the coal residue was increased and this provides strong evidence that significant amounts of inorganic elements were removed. Onyeama coal, therefore, contains large proportions of silica, calcium carbonate, and dolomite, as well as some elements such as aluminum, iron, and potassium, and other trace metals such as lead, chromium, cadmium, arsenic, mercury, copper.
5 marketing strategy and marketing performance does strategy affect performa...INFOGAIN PUBLICATION
This article surveys marketing management literature to find out the positive impact that a good market and marketing can have on marketing performance at the marketplace. The marketplace in this contest can be either a country or even a continent since the companies are multinational and also have diversified holdings which help them to spread their tentacles to every nook and cranny of the globe. Locally based companies are not left out since they all use marketing strategies to do their marketing. Companies or multinationals of U.S. and U.K. parentage will be used a lot. Does the literature attest to the positive impact of very good marketing strategies on a company’s marketing performance? This is going to be investigated to come out with the justify opinion. Coming out with a very good marketing strategy to pilot or direct a company’s marketing assault is not very easy. It is plainly herculean. Implementation, monitoring, controlling and evaluating marketing strategies are equally herculean. Top marketing management do not have it easy with formulating, managing, and evaluating marketing strategies. Marketing performance measurement is tackled in this piece. It is essential to point out that marketing is not the pressure of only those in marketing (pan–marketing). It is very general managerial with all corporate functional players all actively involved.
10 the need to move from reactive to proactive perspective in health careINFOGAIN PUBLICATION
Purpose – The purpose of this article is to explore the importance of moving from reactive to proactive perspective in health care. Methodology - The research design, guided by a Qualitative philosophy, was inductive in nature. The researcher conducted an extensive literature review to gain an understanding and explore the importance of moving from reactive to proactive strategies to manage health organizations. Findings –Today, in the changing market environment, Health organizations must adopt proactive perspective as a strategic tool to attain business excellence and achieve goals. Practical Implications – This new perspective will make health organization stronger, and obtain sustainable competitive advantages. Originality/Value – The literature reviewed on Health Management reveals several models and frameworks to improve healthcare, however no article advocated the move to the proactive perspective and explain its importance.
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
Ad-hoc network is a collection of wireless mobile nodes which dynamically form a temporary network without the use of any existing network infrastructure. It may connect hundreds to thousands of mobile nodes. The primary goal of such an ad-hoc network is correct and efficient route establishment between a pair of nodes so that message can be delivered easily and in a timely manner. The main objective of this paper is to address different MANET routing protocols and different types of mobility models used in MANETs. This paper also put emphasis on the work done by various researches using routing protocols and mobility models. This paper would be great help for the people who are conducting research for the problems in MANETs.
Aluminium hydroxide, Aluminium phosphate and calcium phosphate are used as adjuvant in (TT) vaccine. In this review mechanism, potency, benefits and limitations of alum adjuvant have been discussed.
Grant Thornton – jedna z wiodących organizacji audytorsko-doradczych oraz Euler Hermes – światowy lider w ubezpieczeniu należności, przygotowały raport prezentujący ocenę perspektyw polskiej gospodarki przez dyrektorów finansowych. Z raportu wynika, że większość osób zarządzających finansami przedsiębiorstw, optymistycznie ocenia perspektywy rozwoju biznesu w najbliższym czasie. Dyrektorzy finansowi chcą nie tylko chronić, ale też rozwijać nadzorowane biznesy – skupiać się na finansowaniu rozwoju produktów oraz usług i wchodzeniu na nowe rynki zbytu.
Maurizio Galluzzo parla di Smart Data per i Beni Culturali all'evento Big Data per la Social & Business Innovation organizzato da Startup Saturday Europe il 13 Dicembre 2014 a Firenze.
We have done presentation on the topic "Why students bunk lectures in college" and gave the analysis of data using pareto diagram. The team members are sandesh chindarkar, vishal wareshi and sanket chitnis
Fake Multi Biometric Detection using Image Quality Assessmentijsrd.com
In the recent era where technology plays a prominent role, persons can be identified (for security reasons) based on their behavioral and physiological characteristics (for example fingerprint, face, iris, key-stroke, signature, voice, etc.) through a computer system called the biometric system. In these kinds of systems the security is still a question mark because of various intruders and attacks. This problem can be solved by improving the security using some efficient algorithms available. Hence the fake person can be identified if he/she uses any synthetic sample of an authenticated person and a fake person who is trying to forge can be identified and authenticated.
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
The present day authentication system is mostly uni-model i.e having only single authentication method which can be either finger print, iris , palm veins ,etc. Thus these models have to contend with a variety of problems such as absurd or unusual data, non-versatility; un authorized attempts, and huge amount of error rates. Some of these limitations can be reduced or stopped by the use of multimodal biometric systems that integrate the evidence presented by several sources of information. This paper converses a multi biometric based authentication system based on Fusion algorithm using a key. Our work mainly focuses on the fusion algorithm, i.e fusion of finger and palm print out of which the greatest features from the above two traits are taken into account. With minimum possible features the fusion of the both the traits is carried out. Then some key is generated for multi biometric authentication. By processing the test image of a person, the identity of the person is displayed with his/her own image. By the fusion algorithm, it is found that it has less computation time compared to the existing algorithms. By matching results, we validate and authenticate the particular individual.
The security of biometric fingerprint is a big
challenge now-a-days, as it has world-wide acceptance.
Compromised fingerprint templates may raise terrible threats
to its owner. Because of the vulnerabilities of fingerprint
authentication system, security issues about fingerprint have
been a matter of great concern. This study summarizes the
vulnerabilities of fingerprint authentication system and
highlights the type of securities available against those
challenges. It includes much classified knowledge about
security of fingerprint template. This work is an endeavor to
provide a compact knowledge to the research community
about the security issues regarding fingerprint authentication
system.
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesTanjarul Islam Mishu
The security of biometric fingerprint is a big
challenge now-a-days, as it has world-wide acceptance.
Compromised fingerprint templates may raise terrible threats
to its owner. Because of the vulnerabilities of fingerprint
authentication system, security issues about fingerprint have
been a matter of great concern. This study summarizes the
vulnerabilities of fingerprint authentication system and
highlights the type of securities available against those
challenges. It includes much classified knowledge about
security of fingerprint template. This work is an endeavor to
provide a compact knowledge to the research community
about the security issues regarding fingerprint authentication
system.
A Survey of Security of Multimodal Biometric SystemsIJERA Editor
A biometric system is essentially a pattern recognition system being used in adversarial environment. Since,
biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate
data to make the system ineffective by compromising its integrity. Current theory and design methods of
biometric systems do not take into account the vulnerability to such adversary attacks. Therefore, evaluation of
classical design methods is an open problem to investigate whether they lead to design secure systems. In order
to make biometric systems secure it is necessary to understand and evaluate the threats and to thus develop
effective countermeasures and robust system designs, both technical and procedural, if necessary. Accordingly,
the extension of theory and design methods of biometric systems is mandatory to safeguard the security and
reliability of biometric systems in adversarial environments.
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
IT assets connected on internetwill encounter alien protocols and few parameters of protocol process are exposed as vulnerabilities. Intrusion Detection Systems (IDS) are installed to alerton suspicious traffic or activity. IDS issuesfalse positives alerts, if any behavior construe for partial attack pattern or the IDS lacks environment knowledge. Continuous monitoring of alerts to evolve whether, an alert is false positive or not is a major concern. In this paper we present design of an external module to IDS,to identify false positive alertsbased on anomaly based adaptive learning model. The novel feature of this design is that the system updates behavior profile of assets and environment with adaptive learning process.A mixture model is used for behavior modeling from reference data. The design of the detection and learning process are based on normal behavior and of environment. The anomaly alert identification algorithm isbuiltonSparse Markov Transducers (SMT) based probability.The total process is presented using real-time data. The Experimental results are validated and presentedwith reference to lab environment.
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
Biometric identification systems, which use physical features to check a person's identity, ensure much higher security than password and number systems. Biometric features such as the face or a fingerprint can be stored on a microchip in a credit card, for example. A single modal biometric identification system fails to extract enough features for identification. Another disadvantage of using only one feature is not always readable. In this article, a smart multimodal biometric verification model for identifying and verifying a person's identity is recommended based on artificial intelligence methods. The proposed model is identified the iris and finger vein unique patterns each individual to overcome many challenges such as identity fraud, poor image quality, noise, and instability of the surrounding environment. Several experiments were performed on a dataset containing 50 people by using many matching methods. The results of the proposed model were provided a higher accuracy of 98%, with FAR and FRR of 0.0015% and 0.025%, respectively.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
Managing Intrusion Detection Alerts Using Support Vector MachinesCSCJournals
In the computer network world Intrusion detection systems (IDS) are used to identify attacks
against computer systems. They produce security alerts when an attack is done by an intruder.
Since IDSs generate high amount of security alerts, analyzing them are time consuming and error
prone. To solve this problem IDS alert management techniques are introduced. They manage
generated alerts and handle true positive and false positive alerts. In this paper a new alert
management system is presented. It uses support vector machine (SVM) as a core component of
the system that classify generated alerts. The proposed algorithm achieves high accurate result
in false positives reduction and identifying type of true positives. Because of low classification
time per each alert, the system also could be used in active alert management systems.
Similar to 7 multi biometric fake detection system using image quality based liveness detection (20)
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
7 multi biometric fake detection system using image quality based liveness detection
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1686
Multi-biometric Fake Detection System using
Image Quality based Liveness Detection
Asmita A. Patil, Prof. S.A.Dhole
Department of ECE, BV’s College of Engineering for Women, Pune , Savitribai Phule Pune University, Pune, India
Abstract— Biometric systems mostly popular in all over
the world because of its user friendly and credible nature
in security. In spite of this advantages, many attacks that
done through synthetic , self manufactured, fake,
reconstructed samples affected on the performance and
accuracy of biometric system which becomes major
problem in biometrics. Hence, new effective measures
have to be taken to protect the biometric systems. In this
paper, we propose novel software based multi-biometric
fake detection system to detect various types of attacks.
The main moto of this system is to enhance security level
of biometric recognition systems through Image Quality
Assessment (IQA) which is one of the liveness detection
method.25 image quality measures calculated from test
image which used to classify between real and fake trait
using Linear Discriminative Analysis(LDA) classifier.
The experimental results is done on the database of 2D
face and fingerprint modalities, shows the proposed
system is ease in implementation in real time application
as complexities is very less because of one input image.
Also this system is fast, user-friendly, non-intrusive which
is more competitive with any other state of the art
approaches, classifies between real and fake traits.
Keyword—Biometrics, Image quality Assessment (IQA),
liveness detection method, linear discriminative
analysis(LDA) classifier.
I. INTRODUCTION
Security became basic need of human kind to distinguish
between known and unknown persons as population
increases day by day which makes difficult to recognize
authorized person. As we talk about security, first name
comes in mind is “Biometrics” as biometrics plays very
vital role in last few decades in the field of security and
many creations has been developed to enhance the
performance and security of biometric systems[1][2].
Inspite of these popularity of biometric systems, main
problem facing by these systems is spoofing attacks.
These attacks make biometric systems more vulnerable
and the performance of systems decreases automatically.
These attacks are in the form of synthetic , self
manufactured , reconstructed biometric samples(e.g.face,
fingerprint, iris, vein, hand geometry) while other attacks
are in the form of mimicry of behavior of genuine
user(e.g. signature, gait) whose main aim to fraudulently
access the biometric system.
Hence, there are many researches have been taking place
in various organization of this specific area which focus
on this problem. All these spoofing attacks are performed
in analog domain so any digital protection techniques
such as encryption, watermarking, digital signature show
less effectiveness on it.
After previous works and other analogue studies, it is
cleared that there is need to propose and develop a
specific method which can protect biometric systems
against these attacks [3][4].A main aim of researchers are
to design a proper method that make biometric system to
distinguish between real and fake samples which enhance
the security levels of the systems.
There are various anti-spoofing techniques (hardware
or software) available but researchers are more interested
in liveness detection, has ability to discriminate the
different physiological features which use to distinguish
between real and fake traits. This liveness assessment
techniques satisfy certain demanding requirements which
represents challenging engineering problems: 1) user-
friendly; 2)non-invasive, means techniques should not
provide harm to users or not comes contact with
use;.3)fast, results have to produce with very reduced
interval;4)low cost, overall cost should be affordable to
user so that the system can publically used;
5)performance, along all these requirement, performance
should check so that false rejection should not degrade[5]
Mostly, these liveness detection methods have divided
into two groups:1) hardware based techniques, where
some specific devices detect fake samples by using the
particular properties of living traits and 2) software based
techniques, where, classification between real and fake
traits is done by using features extracted from the samples
which acquired with standard sensors[5]. Individually,
these two techniques have some drawbacks. If we
combine them together, then security level of biometric
systems get increases. But, software based technique is
more reliable as it is less expensive, less intrusive, easily
embedded in feature extractor module so that it
potentially capable to detect illegal attempt which don’t
come under in spoofing attacks. Also, software based
technique can resist the fake, self manufactured, synthetic
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1687
sample to enter into communication channel between the
feature extractor and the sensors [5].
In software based liveness detection method, many work
has been done in the field of spoof detection and they are
succeed to reduce spoofing attacks, But one challengeable
work has to be done i.e. removal of direct attacks in this
field. Most presented anti-spoofing techniques suffered
with lack of generality [5] ,also their performance is good
while detecting particular spoofs, but efficiency drops
drastically when it comes in contact with synthetic
generated traits. Error rates goes vary continuously when
other database introduced. To remove all these
drawbacks, new software based technique proposed in
liveness detection method is Image Quality
Assessment(IQA).IQA works on the principle that fake
image acquired in the spoofing attacks will have different
quality than the real image taken from sensors[5]. The
proposed system is described in fallowing section:
Previous work had to be done given in section II.
Proposed working mechanism is given in section III.
Experimental results discussed in section IV and
conclusion and future scope given in section V.
II. RELATED WORK
Liveness detection method in biometric systems become
most popular because of its solutions provided in
engineering problems as mentioned above. In this
technique, many work has been done in particular
forensic area for image manipulation system and
steganalysis [7]. As software based liveness detection
system is more generous than hardware based liveness
detection system, many liveness detection method have
been proposed which based on software. One of these
methods for fingerprint is skin perspiration pattern where
periodicity of sweat and sweat diffusion pattern is
considered to detect fake fingerprints by using ridge
signal algorithm. To improve the performance of this
system ,wavelet transform is introduced which gave
detection rate up to 90% .In this work ,many new
techniques have been added to remove the noises in
samples[10].
Work proposed by A. Antonelli et.al[11] is mostly depend
on the three fingerprint regions: 1) inner region where
pressure of finger has not allow any elastic deformation,2)
external region where the skin follows finger’s movement
as pressure is light, 3) intermediate region which used for
combine inner and external region smoothly using skin
stretching and compression. Same detection system has
proposed on corporal odour [15].
In 2D face based liveness detection system, different
techniques have been used. Liveness detection system
based on frequency and texture analysis is presented by
Kim.et.al.[12] to distinguish between real and synthetic
face samples. Another system is developed by
J.Maatta.et.al [8]. which based on Local Binary
Pattern(LBP) to analyze the textures of given face
samples. Another face based liveness detection system is
proposed by Lin Sun et.al.[13] based on blinking eyes
mechanism.
These all works have some disadvantages like
complexities and lack of generality which is removed in
Image Quality Assessment based liveness detection
system whose main aim is to classify real and fake
samples using LDA classifier with the help of image
quality measures calculated on the basis of image quality
of an images.
III. PROPOSED SECURITY PRORECTION
METHOD
The proposed IQA based liveness detection system is
based on the “quality-difference” hypothesis where Image
Quality(IQ) measures are extracted doing comparison of
distorted image with reference images. Fig 1 is the block
diagram of proposed detection system where input image
(Face or fingerprint) is filtered to remove noises using
Low pass Gaussian filter (having sigma σ = 0.5 and
Gaussian kernel size 3×3) by adding blur effect. Filtered
image is compared with reference image to calculate Full
Reference (FR) IQA and No Reference (NR) IQA is
determined predicting the information about reference
image. This IQ measures is extracted using simple
classifier i.e. Linear Discriminant Analysis (LDA)
classifier.
Fig.1: General Block Diagram of Proposed Security
Protection Method based on Image Quality Assessment
(IQA).
The classification of tested image is done based on this
classifier comparing it with training database. Final result
is shown on GUI is whether the sample image real or
fake.
Here, 25 FR IQ measures and 4 NR IQ measures are
determined. Full reference Image quality measures are
determined based on the pixel difference, correlation,
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1688
edge based information, gradient based information and
spectral magnitude and phase of image and so on. While
No Reference (NR) IQ measures are determined on the
basis of knowledge of reference image. The list of all
these 21 IQ measures is given in table 1 with all
descriptions whereas NR IQ measures’ information are
provided in references which given in table.. I is the
reference image and I is filtered image by Gaussion filter
[5].
This system keeps simplicity and generality by using only
single input image (face or fingerprint image). As this
system does feature extraction based on quality of image,
it removes the preprocessing steps i.e. fingerprint
segmentation in the case of fingerprint and face extraction
in the case of 2D face. Because of all these properties of
this system, the computation load gets reduced.
Classification of image i.e. real or fake is easily done as
feature vector of test image is compared with training
feature vectors, using simple classifier i.e. LDA classifier.
This implementation of our experiment is done on matlab
version R2014a with the help of LDA classifier.
Table 1: Table shows the list of all Full Reference IQ measures with their formulas and descriptions where I denote for
original image which take as reference and is filtered image via Gaussian filter.
Sr.
No.
Name of IQ measures
(Acronym)
Type Descriptions
1 Mean Square Error(MSE) FR
MSE(I, I) =
1
NM
I , − I ,
2 Peak Signal to Noise Ratio(PSNR) FR
PSNR I, I = 10 log
max(I )
MSE(I, I)
#
3. Signal to Noise Ratio(SNR) FR
SNR I, I = 10 log $
∑ ∑ I .
N ∗ M ∗ MSE(I, I)
(
4. Structural Content(SC) FR
SC(I, I) =
∑ ∑ *+,,
-.
,/0
1
+/0
∑ ∑ *+,,
-.
,/0
1
+/0
5. Maximum Difference(MD) FR MD I, I = max3I , − I , 3
6. Average Difference(AD) FR AD I, I =
1
NM
I , − I ,
7. Normalized Absolute Error(NAE) FR
NAE(I, I) =
∑ ∑ 3*+,,5*+,,3.
,/0
1
+/0
∑ ∑ 3*+,,3.
,/0
1
+/0
8. R-average MD (RAMD) FR
RAMD I, I, R6 =
1
R
max7
8
7
3I , − I , 3
9. Laplacian MSE(LMSE) FR LMSE I, I =
∑ ∑ :h I , − h I , <55
∑ ∑ h I ,
55
10. Normalised Cross-Correlation(NXC) FR
NXC I, I =
∑ ∑ I , ∗ I ,
∑ ∑ I ,
11. Mean Angle Similarity(MAS) FR
MAS I, I = 1 −
1
NM
α ,
12.
Mean Angle Magnitude Similarity
(MAMS)
FR
MAMS I, I =
1
NM
1
− >1 − α . ? @1 −
AI , − I , A
255
D#
13. Total Edge Difference(TED) FR
TED I, I =
1
NM
FIG+,,
− IG+,,
F
14. Total Corner Difference(TCD) FR
TCD I, I =
3NH7 − NIH73
max (NH7, NIH7)
4. International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com
www.ijaems.com
15. Spectral Magnitude Error(SME)
16. Spectral Phase Error(SPE)
17. Gradient Magnitude Error (GME)
18. Gradient Phase Error (GPE)
19. Structural Similarity Index (SSIM)
20. Visual Information Fidelity (VIF)
21. Reduced Ref. Entropic Difference
(RRED)
22. JPEG Quality Index (JQI)
23. High-Low Frequency Index (HLF
24. Blind Image Quality Index (BIQI)
25. Naturalness Image quality Index (NIQE)
IV. RESULTS AND DISCUSSION
As name indicates, proposed system is liveness detection
system based on emerging new technique Image Quality
Assessment (IQA), all image quality measures determined
with the support of reference images provided in
database.As it is multi-biometric System, two modalities
i.e.1)Fingerprint and 2) face are taken which provides to
presented system which detects the spoofing attacks as
well as Fraudulent attacks on them. Evaluation is taken
place for each modality with specific manner.
A. FINGERPRINT
As mentioned, fingerprint is one of the modality used in
this proposed system, the database of real and fake
fingerprint is taken from 23 persons where fake
fingerprints is synthesized using material fevicol which is
scanned with fingerprint sensor r305.
All IQ measures are determined on the training database
whose training vector is created using matlab which
compared with feature vector of test samples and
depending upon it, the result shown in message box that
image is real or fake.
l Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogainpublication.com)
rror(SME) FR
SME I, I
1
NM
3F
Spectral Phase Error(SPE) FR
SPE I, I
1
NM
3arg
Gradient Magnitude Error (GME) FR
GME FM ,
1
NM
3G
Gradient Phase Error (GPE) FR
GPE I, I
1
NM
3arg
Structural Similarity Index (SSIM) FR Description is given in reference [21][22]
y (VIF) FR Description is given in reference[23][22]
Reduced Ref. Entropic Difference
FR Description is given in reference[24][22]
JPEG Quality Index (JQI) NR Description is given in reference[25][22]
Low Frequency Index (HLFI) NR Description is given in reference[26][22]
Blind Image Quality Index (BIQI) NR Description is given in reference[27][22]
Naturalness Image quality Index (NIQE) NR Description is given in reference[28][22]
RESULTS AND DISCUSSION
As name indicates, proposed system is liveness detection
system based on emerging new technique Image Quality
Assessment (IQA), all image quality measures determined
with the support of reference images provided in
stem, two modalities
i.e.1)Fingerprint and 2) face are taken which provides to
presented system which detects the spoofing attacks as
well as Fraudulent attacks on them. Evaluation is taken
place for each modality with specific manner.
As mentioned, fingerprint is one of the modality used in
this proposed system, the database of real and fake
fingerprint is taken from 23 persons where fake
fingerprints is synthesized using material fevicol which is
All IQ measures are determined on the training database
whose training vector is created using matlab which
compared with feature vector of test samples and
depending upon it, the result shown in message box that
(a)
Fig.2: (a) Fingerprint sensor r305 photo, (b) Synthetic
fingerprint is generated using material Fevicol.
(a)
Fig.3: (a)Oiriginal fingerprint image, (b)Fake
Fingerprint image of same person.
[Vol-2, Issue-10, Oct- 2016]
ISSN : 2454-1311
Page | 1689
3F . 3 3FM , 3
3arg F . arg FM , 3
3G . 3 3GI , 3
3arg G . arg GI , 3
Description is given in reference [21][22]
Description is given in reference[23][22]
Description is given in reference[24][22]
Description is given in reference[25][22]
Description is given in reference[26][22]
Description is given in reference[27][22]
Description is given in reference[28][22]
(b)
(a) Fingerprint sensor r305 photo, (b) Synthetic
fingerprint is generated using material Fevicol.
(b)
Oiriginal fingerprint image, (b)Fake
Fingerprint image of same person.
5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1690
A. FACE
Other than fingerprint, 2D face is taken as an input in this
system where reference image is captured using high
definition camera while fake image is captured via USB
camera module with the help of photo print of same
persons.
Some of IQ measures are listed in table 2 whose values
for real and fake images are given.
Ranges of values give the difference between real and
fake images which lies in same range , difficult to
separate out, hence LDA classifier is used to classify. All
IQ measures are plotted via graph where no. of real and
fake images is on X axis and ranges of feature values is
on plotted on Y axis. Fig 4 and 5 shows the graph of one
of IQ measures i.e. MSE for fingerprint and face.
The accuracy is calculated by computing FGR,FRR and
HTER where False Genuine rate(FGR) is no. of samples
which are fake but classified as real.
(a) (b) (c)
Fig.4: (a) real image taken as reference image,(b)
photoprint used in spoofing attacks, (c) intex camera
module used to capture photos.
Table 2: shows the some of IQ measures that values are
calculated for real and fake input samples from feature
vector
IQ
measures
Fingerprint 2D face
Real Fake Real Fake
MSE
32.72-
42.61
22.88-
43.83
1-10 1-3.5
PSNR
31.17-
34.25
31.74-
34.43
38-46 44-46
SC
1.0083-
1.0297
1.0090-
0.0177
1.0037-
1.0066
1.0048-
1.0066
AD
0.24-
0.3726
0.2436-
0.33
0.0982-
0.1691
0.082-
0.1199
MD 61-64 61-63 17-57 26-30
False Fake Rate (FRR) is a no. of real sample which give
result as a fake and HTER is Half Total Error Rate which
computed as HTER=(FGR+FFR)/2.In the case of
fingerprint modality, the FFR, FGR and HTER are shows
in table 3:
Where, the accuracy for the fingerprint database is:
Accuracy =
(74 + 66)
166
Accuracy = 84.33%
Fig.4: graph plot of MSE for 20 real and fake fingerprint
images
Table 3: Table shows the values of FGR, FFR and HTER
for fingerprint database.
No. of finger image (FGR) (FFR) (HTER)
166 17 9 13
Similarly, if we provide face image as an input to the
proposed method, FER is zero as no fake samples are
classified as real.FFR is 20 in this case. Hence, HTER is
given in table 4 below:
Table 4: Table shows the values of FGR,FFR and HTER
for face database.
Fig. 5: Graph plot of MSE for 20 real and fake face
images
The accuracy is calculated on testing database where both
real and fake database is kept. The classification is done
on the basis of testing vector of test image, training
features and training labels where 1 is denoted for real
and 2 for fake classification. The message box is
displayed on window to show the result is real or fake.
No of Face image FGR FFR HTER
140 0 20 10
6. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1691
The result of this proposed system is varies as the
modalities keep changing. The result of both modalities
are above 80%.If we compare both the results then
fingerprint based security system is more vulnerable to
different types of attacks as it is very difficult to find out
the real one and fake one. In case of face based security
method, it is not that tough to recognize real and fake
samples. The accuracy and performance of the proposed
method is varying by changing the types of input. This
system can be used for any type of biometric Modalities.
Hence this system is more advantageous than previous
work.
Table 5: Table shows the performance of the system after
executing the operation result on real and fake samples
and execution time is denoted.
IV. CONCLUSION
The main motivation given to propose this system is
vulnerability of available biometric systems to various
spoofing and direct attacks that driven by intruder to
access the system fraudulently. Here, the proposed
liveness detection system based on “image quality
hypothesis which works on the image quality of input
image and extracted the 25 IQ measures that helps to
classify between real and fake samples. From the results
obtained by proposed system, the system is very effective
in fallowing manner:1)the Accuracy is above 95% which
is most important achievement in this biometric system,
2) Error rate is very less so that the performance is
constant, 3)Different types of attacks can be stopped
using this system hence we can say that it fallows “multi-
attack” property 4)Various type of modalities can be
applied as an input i.e.it is “Multi-biometric” in nature .5)
cost is very less as it is software based method ,6) It is
user-friendly and main advantages are 7) It is more
generous to user and 8) very less complex in nature.
Also, after comparing the result based on the input
modalities to proposed system, conclusion derived is that
the face biometric modality has more accuracy and
performance than fingerprint modalities as more spoofing
can be done in the case of fingerprint and it is difficult to
classify.
Future scope of this system is that we can give video as
an input so that the any fraudulent activity happened can
be stopped. Also this work can be applied new type of
biometric modalities like finger vein, hand geometry and
many more.
REFERENCES
[1] S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric
recognition:Security and privacy concerns ,IEEE
Security Privacy, vol. 1, no. 2,pp. 3342, Mar./Apr.
2003.
[2] K. A. Nixon, V. Aimale, and R. K. Rowe, Spoof
detection schemes,Handbook of Biometrics. New
York, NY, USA: Springer-Verlag, 2008,pp. 403423.
[3] G. L. Marcialis, A. Lewicke, B. Tan, P. Coli, D.
Grimberg, A. Congiu,et al., First international
fingerprint liveness detection competition LivDet
2009, in Press. IAPR ICIAP, Springer LNCS-5716.
2009, pp. 1223.
[4] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B.
Muntoni, G. Fadda,et al., Competition on
countermeasures to 2D facial spoofing attacks, in
Press. IEEE IJCB, Oct. 2011, pp. 16.
[5] J. Galbally, S. Marcel, and J. Fierrez, Image Quality
Assessment for Fake Biometric Detection:
Application to Iris, Fingerprint, and Face
Recognition, IEEE Transactions on Image
Processing, VOL. 23, NO. 2, FEBRUARY 2014
[6] G. Pan, Z.Wu, and L. Sun. Liveness detection for
face recognition. In K. Delac, M. Grgic, and M. S.
Bartlett, editors, Recent Advances in Face
Recognition, page Chapter 9. INTECH,2008.
[7] R. Derakhshani, S. Schuckers, L. Hornak, L.
OGorman, ”Determination of vitality from non-
invasive biomedical measurement for use in
fingerprint scanners”, Pattern Recognition 36 (2003)
383396.
[8] J. Maatta, A. Hadid,and M. Pietikainen, ”Face
Spoofing Detection From Single Images Using
Micro-Texture Analysis”, IEEE Transaction of
Image processing, 2011
[9] Mrs. Dhole S.A. Dr. Prof. Patil V.H, Face
Recognition Using CurveletTransform, International
Journal of Applied Engineering Research, Volume
10, No. 14 (2015), pp.33949-33954, August
2015(Impact factor- 0.166),Scopus indexing
[10]B. DeCann, B. Tan, S. Schuckers, A novel region
based liveness detection approach for fingerprint
scanners, in press. IAPR/IEEE Int. Conf. on
Biometrics, in: LNCS, vol. 5558, Springer, 2009, pp.
627636.
[11]A. Antonelli, R. Capelli, D. Maio, D. Maltoni, ”Fake
finger detection by skin distortion analysis”, IEEE
Fac
e
Finge
rprint
Groun
d Truth
Out-
put
Accuracy
result
Exe-
cution
Time(s)
R1 R1 Real Real 1 8
R2 R2 Real Real 1 8.1
R3 R3 Real Real 1 8
F1 F1 Fake Fake 1 8.24
F2 F2 Fake Fake 1 8.29
F3 F3 Fake Fake 1 7.54
7. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-10, Oct- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1692
Transactions on Information Forensicsand Security
1 (2006) 360373.
[12]G. Kim, S.Eum, J. K. Suhr, D. I. Kim, K. R. Park,
and J, Kim, ”Face liveness detection based on
texture and frequency analyses ”, 5th IAPR
International Conference on Biometrics (ICB), New
Delhi, India. pp. 67- 72, March 2012
[13]H. K. Jee, S. U. Jung, and J. H. Yoo, ”Liveness
detection for embedded face recognition
system,International Journal of Biological and
Medical Sciences ”, vol. 1(4), pp. 235-238, 2006.
[14]Lin Sun, Gang Pan, Zhaohui Wu, Shihong Lao, “
Blinking-Based Live Face Detection Using
Conditional Random Fields ”, ICB 2007, Seoul,
Korea, International Conference, on pages 252-
260,August 27-29, 2007.
[15]D. Baldiserra, A. Franco, D. Maio, D. Maltoni,
”Fake fingerprint detection by odor analysis”, IAPR
Int. Conf. on Biometrics (ICB), in: LNCS, vol. 3832,
Springer, 2006, pp. 265272.
[16]16] Z. Wang, H. R. Sheikh, and A. C. Bovik, No-
reference perceptual quality assessment of JPEG
compressed images, IEEE ICIP, Sep. 2002, pp.
477480.
[17]A. K. Moorthy and A. C. Bovik, A two-step
framework for constructing blind image quality
indices, IEEE Signal Process. Lett., vol. 17, no. 5,
pp. 513516, May 2010.
[18]S.F.Bahgat, S.Ghoniemy, M. Alotaibi, ”Proposed
multi-modal palm veins-face biometric
Authentication” , International Journal of Advanced
Computer Science and application(IJACSA),Vol.4
,No. 6.,2013
[19]K. A. Nixon, V. Aimale, and R. K. Rowe, “Spoof
detection schemes,” of Biometrics. New York, NY,
USA: Springer-Verlag, 2008, pp. 403–423.
[20]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P.
Simoncelli, “Image quality assessment: From error
visibility to structural similarity,” IEEE Trans.
Image Process., vol. 13, no. 4, pp. 600–612, Apr.
2004.
[21](2012). LIVE [Online]. Available:
http://live.ece.utexas.edu/research/Quality/index.htm
[22]H. R. Sheikh and A. C. Bovik, “Image information
and visual quality,” IEEE Trans. Image Process.,
vol. 15, no. 2, pp. 430–444, Feb. 2006.
[23]R. Soundararajan and A. C. Bovik, “RRED indices:
Reduced reference entropic differencing for image
quality assessment,” IEEE Trans. Image Process.,
vol. 21, no. 2, pp. 517–526, Feb. 2012.
[24]Z. Wang, H. R. Sheikh, and A. C. Bovik, “No-
reference perceptual quality assessment of JPEG
compressed images,” in Proc. IEEE ICIP, Sep.
2002, pp. 477–480.
[25]X. Zhu, P. Milanfar, “A no-reference sharpness
metric sensitive to blur and noise,” in Proc. Int.
Workshop Qual. Multimedia Exper. , 2009, pp. 64–
69.
[26]A. K. Moorthy and A. C. Bovik, “A two-step
framework for constructing blind image quality
indices,” IEEE Signal Process. Lett., vol. 17, no. 5,
pp. 513–516, May 2010.
[27]A. Mittal, R. Soundararajan, and A. C. Bovik,
“Making a ‘completely blind’ image quality
analyzer,” IEEE Signal Process. Lett., vol. 20, no. 3,
pp. 209–212, Mar. 2013.