Vous êtes sur la page 1sur 20

Contents

Contents................................................................................................................ 1 Chapter 1 Introduction: ......................................................................................... 3 1.1Aim: .............................................................................................................. 4 1.2 Objectives .................................................................................................... 4 1.3 Project Background: ..................................................................................... 4 Chapter 2 Literature Review .................................................................................5 2.1 What is Biometrics? ..................................................................................... 5 2.1.1 Face: ..................................................................................................... 7 2.1.2 Fingerprint: ............................................................................................ 8 2.1.3 Hand Geometry: .................................................................................... 8 2.1.4 Iris: ........................................................................................................ 9 Chapter 3 Investigation ..................................................................................... 10 3.1 Biometric Recognition ................................................................................10 3.2 Importance of AV Biometrics ....................................................................11 3.2.1 Audio-Visual Biometrics........................................................................12 3.2.2 Building Blocks of Acoustic and Visual Speech.....................................13 Chapter 4............................................................................................................. 15 Solutions.............................................................................................................. 15 4.1 Biometric Hash Generation.......................................................................15 4.1.1 DB-Indexing and Registration............................................................16

4.1.2 DB-Search and Identification................................................................17 Chapter 5 Conclusions ........................................................................................ 19

List of Figures:

Figure 1: Examples of biometric characteristics: (a) face, (b) fingerprint, (c) hand geometry, (d) iris, (e) keystroke, (f) signature, and (g) voice Figure 2: Block diagram of AV biometrics system Figure 3: 32-bit HG (168 pixel blocks,k=128): (a) preproc. iris texture (b) mean values for pixel blocks (c) binary hash. Figure 4: 4-bit KM: each node is linked with each other node which has a Hamming distance of 1 to this node

Abstract: This paper explained about the critical analysis of audio visual in biometrics. Initially stated this paper with the explanation of what is biometrics and the background of biometrics. Explained the challenges in the paper. So based on the challenges studied in detail about the types of securities what biometric provides, it will use the different factors such as face, hand and eyes to arrange the security for the applications. Discussed about the kinds of security it will provide for the databases. Explained about the importance of the biometric recognition. In detail explained about the audio visual biometrics in the research section which describes about the building blocks of audio visual biometric system description.

Chapter 1 Introduction: Biometric technologies are becoming the important solutions of highly secure identification and personal verification. After the tragic events of September 11, 2001, prominent among the various measures being considered is the use of devices that check a persons identity using biometric identifiers such as fingerprints, iris, or facial patterns. There have been recent discussions concerning the creation of biometric passports in many countries. However, biometric technologies have some problems as conventional password when the biometric information is revealed to illegal users. Privacy protection problem should be deal with in biometrics research area for biometrics security. Digital watermarking is regarded as a possible solution to this problem because it can embed ID information into biometric images to backtracking when revealed. And it also protect private information like fingerprint feature from illegal users. Watermarking technique should satisfy several requirements such as security, robustness, and imperceptibility. Generally, the watermarking technique can be classified into two parts: spatial domain based method and transform domain technique. As special domain method embed the watermark data into the least significant bits. In transform domain, discrete cosine transform (DCT), discrete wavelet transform (DWT) methods are important and useful techniques. Usually transform domain method is more robust to resist image attacks than spatial domain methods. In this paper we propose a wavelet based watermarking approach for biometrics security. First method is to embed ID mark to biometric image for backtracking when image missing. Second method is to embed fingerprint features into face image for hiding private biometric information. The proposed method minimizes the loss of image quality in spite of embedding watermark ( Jong and Ki, 2008).

1.1Aim: Aim of this paper is to do a research on the critically analysis and representation of the audio visual in the biometrics. 1.2 Objectives Discussing about the use of biometric recognition in the real world. Discussing about the Biometric databases in the real world. Discussing about the various kinds of securities in the biometrics. 1.3 Project Background: Biometrics can be utilized in the context of a DRM system. 1) 2) For facilitating a complete authentication mechanism, or For securing the cryptographic keys with which particular multimedia file can be

protected. Many features of biometrics are used for several applications. There are some strengths and weaknesses associated with every biometric trait. All the requirements like practicality, cost and accuracy of all the application like welfare distribution, DRM and access control are not met effectively by any of the biometric. This means, a number of biometrics are admissible but none of them are optimal. Based on the properties of the biometric characteristics and the requirements of the application, determination of suitable biometric for a specific application can be done. A challenge-response mechanism which is required in few applications like tele-banking is lent by the traits like keystroke and voice by themselves. The biometrics which are utilized in common are described briefly in the following sections (Jain et.al, 2006).

Chapter 2 Literature Review 2.1 What is Biometrics? The protection of the elements of information such as multimedia data is entailed with the problem of information security and also the access of the available contents in digital data is also ensured to only the authorized users. Because of sharing and copying the digital data illegally, billions of dollars are lost in revenue annually by the content owners like authorized distributors and authors. Deployment of Digital Rights Management (DRM) systems is done for regulating the dissemination and duplication of digital content for addressing this growing problem. User authentication, with which whether the available content can be accessed by a particular individual in a digital medium can be determined, is the critical component of a Digital Rights Management system. The method of user authentication is possession based in any generic cryptographic system. This means, for establishing the authenticity of the user, possession of the decrypting key is enough (Jain et.al, 2006).Memorizing the cryptographic keys is difficult as they are random and long, for instance, 128 bits for the advanced encryption standard (AES). Thus, the storage of these keys will be somewhere, for instance, on a smart card or on a computer and depending on an alternative authentication mechanism, the keys will be released, and for instance, password and this will be the result. Simple will be many passwords which can be broken by simple dictionary attacks or can just be guessed particularly depending on the social engineering techniques. The word password is the most commonly utilized password. Therefore, multimedia data protected by a cryptographic algorithm are only as secure as the password (weakest link) used to release the correct decrypting key(s) that can be used for establishing user authenticity. Guessing the simple passwords is easier and hence the security will be compromised whereas remembering the complex passwords will be difficult and hence its maintenance will be expensive. Few complex passwords are tried to be stored at the locations which are easily accessible by some users. In addition, the same password may be used by many people across many applications. Multiple applications can now be accessed by an impostor after a single password is determined. Lastly, non-repudiation cannot be provided by the passwords in a multiuser account scenario, for example, the actual user cannot be determined when a password is divulged to a friend. With this, the feasibility of counter-measures like holding conniving legitimate users accountable in a law court may be eliminated. Better methods for user
5

authentication must be incorporated to overcome the drawbacks of the usage of passwords. Simply biometrics or biometric authentication refers to the establishment of identity depending on an individuals behavioral and physical characteristics (also called as identifiers or traits) like signature, iris, voice, face, hand geometry and finger print. Many uses over the traditional authentication schemes are offered by the biometric systems. Sharing, distributing, and copying the biometric traits will be difficult as they cannot be forgotten or lost and the reliability of these biometric systems is more compared to that of the password-based authentication. But the presence of the person being authenticated is needed at the authentication point and time. Forging of the biometrics requires much experience, time, access privileges and money hence making it difficult. If the digital content is accessed by the user using the biometrics, then repudiation of that content will become impossible. Therefore, a powerful scheme alternative to the traditional authentication schemes is the biometricsbased authentication scheme. Utilization of biometrics can be done in conjunction with tokens or passwords for enhancing the security provided by the authentication system, in some examples. For instance, passwords resets can be related with the helpdesk calls anywhere between 25% and 50% and the cost of these calls will be nearly $30 per end user with the helpdesk that receive minimum five calls per end user every year (Jain et.al, 2006).

Figure 1: Examples of biometric characteristics: (a) face, (b) fingerprint, (c) hand geometry, (d) iris, (e) keystroke, (f) signature, and (g) voice (Jain et.al, 2006).

2.1.1 Face: The commonly used characteristic of biometric utilized by humans for making personal recognition is the Face recognition which is a nonintrusive method. From a static, controlled mug shot authentication to a dynamic, uncontrolled face identification in a cluttered background is the range of the facial recognition applications. Many face recognition methods which are much popularly used depend on either 1) the global (overall) analysis of the face image representing a face as a weighted combination of a number of canonical faces or 2) the shape and location of the attributes of the face like lips, nose, chin, eyebrows and
7

eyes. Whereas reasonable will be the authentication performance of the commercially available face recognition systems. Many restrictions are imposed on the way the facial images should be obtained which requires a special illumination and simple and fixed background. The facial images taken under different conditions of illumination like varying temporal contexts and two drastically different views cannot be matched by these systems. Considering only the face without any contextual information to recognize a person with extremely high confidence level from a large number of identities is questionable. For working of a facial recognition system practically, in a well manner must: 1) recognize the face from a general point of view; 2) locate the face if there is one and 3) detect the presence of the face in an acquired image (Jain et.al, 2006). 2.1.2 Fingerprint: Fingerprints are used much by the persons to match their identity accurately and it is been in usage since many decades. A pattern of valleys and ridges on the fingertips surface is known as a fingerprint. At the time of fetal development during the first seven months, the formation of fingerprint can be determined. Even the identical twins will have different fingerprints and the fingerprints on each finger of the same person are also different. The cost of the fingerprint scanner in nowadays is U.S. 20$ if order is in bulk. And the cost associated with embedding a biometric that is based on fingerprints is affordable in many applications in a laptop computer. For the authentication systems in which a few hundred users are involved, the accuracy of the fingerprint recognition systems which are available currently is adequate. Additional information will be provided by taking multiple fingerprints of the same person for allowing a large-scale identification in which millions of identities are involved. A large amount of computational resources is the only problem associated with the present fingerprint recognition systems, especially when the identification mode is its mode of operating. Lastly, due to the aging, occupational reasons or environmental reasons (many bruises and cuts may be present on the fingerprints of manual workers) and genetic factors, automatic identification of fingerprints may not be possible if small fraction of population is considered (Jain et.al, 2006). 2.1.3 Hand Geometry: number of measurements that are taken from the hand of a human like palm size, widths and lengths of the fingers and shape of the hand and fingers are considered in the hand geometry recognition systems. Installation of commercial hand geometry-based authentication systems
8

is done in hundreds of location worldwide. This method is easy to use, inexpensive and very simple. Any negative effects will not be there on the accuracy of the authentication of hand geometry based systems because of the individual anomalies like dry skin or environmental factors like dry weather. Scaling the hand geometry based recognition systems for the systems where the individual identification from a large population is not possible and the hand geometry cannot be distinctive. Furthermore, at the time of childrens growing period, the information of hand geometry may not be invariant. Additionally, challenges may be posed to extract the correct information of the hand geometry by the drawbacks in the dexterity (from arthritis) or the jewelry of an individual (like rings). Embedding the hand geometry based system in the devices like laptops is not possible and its size is very large. The authentication systems which depend only on measuring only few fingers like middle and the index fingers rather than the entire hand are available. The size of these devices compared to the devices of hand geometry is small but its size when compared with that of other biometrics like voice, fingerprint and face is large (Jain et.al, 2006).

2.1.4 Iris: sclera (white of the eye) on one side and pupil on other side bounds an annular region of eye known as iris. At the time of fetal development, formation of visual texture of iris happens and in a time period of first two years of life, the visual texture will be stabilized. Very distinctive information which can be used for personal recognition can be carried by the complex iris texture. The iris-based recognition systems which is used currently is speed and accurate. The large-scale identification systems feasibility depending on the iris information is pointed out by it. No two iris can be same, they are distinct and the irises of the identical twins also cannot be similar same like that of the fingerprints. Tampering the iris texture surgically is extremely difficult. Furthermore, in the literature, demonstration of the ability of detecting the artificial irises is also given. The new iris-based recognition systems are cost effective and user-friendly even though the earlier systems were expensive and also needed considerable participation of the user. Whereas, compared to the other biometric traits, the FRR (False Reject Rate) of these iris-based recognition systems will be high and the FAR (False Accept Rate) will be very low (Jain et.al, 2006).

Chapter 3 Investigation 3.1 Biometric Recognition The identity of a person can be recognized with a higher reliability automatically by a powerful means of recognition known as Biometric recognition. The recognition using the biometrics depends on anatomical features like face, iris and palm prints or behavioral traits like signature and fait. Guessing, misplacing, sharing or forging the identifiers of biometric would be difficult extremely, unlike the passwords or ID cards. Several approaches of biometric recognition are proposed in this paper. These approaches depend on the Independent Component Analysis (ICA), Wavelet Transform (DWT) and Kernel Principal Component Analysis (KPCA) methods. Anyways, the difficulty in the research in real-world applications is the problem associated with the small sample biometric recognition. Getting a satisfactory recognition performance with the given approaches in which only the small samples and single modal biometric are used is often difficult in the real-world applications(Xu et.al, 2009). A novel solution for solving the problem is the multimodal biometric fusion method. In recent years, interest and attention among the researcher were attracted by the multimodal biometric fusion techniques thinking that the recognition performance may be improved with the use of small samples by the supplementary information between various biometrics. The intruder will be made difficult to spoof the multiple biometric traits simultaneously by the multimodal systems hence providing the antispoofing measures. The number of fusion levels is three. They are: feature level, pixel level and decision level. Many researchers researched the fusion at the feature level and the
10

decision level. At the pixel fusion level, the biometric fusion methods will operate (Xu et.al, 2009). A Multi scale Geometric Analysis (MGA) is the theory for the high dimensional signals which is developed recently. Bandelet contourlet and curve let are different tools proposed in this paper. Do and Zhou pioneered the non-sub-sampled contourlet as the latest MGA tool [II-14] in 2005. The capabilities of directional decomposition of these tools are better compared to that of the wavelet. A true 2-D sparse representation for 2-D signals like images is the non-sub-sampled contourlet transform especially (Xu et.al, 2009). Therefore, a better solution for extracting biometric features and for approaching curve features are provided by the non-sub-sampled contourlet transform (Xu et.al, 2009). Thus, the MGAbased multimodal biometric fusion technique is focused. In this paper, the MGA-based multimodal biometric fusion method is operated at the pixel fusion level. A multimodal biometric recognition method that depends on the combination of wavelet transform (NSCT Wavelet) and non-sub-sampled contour net is considered. The features can be extracted using the transforms. The formal biometric classification can be determined using the Nearest Neighbor (NN) classifier. Two types of biometrics are used in this paper. They are: a face feature which represents contactless biometrics like gait, voice, ear and face and the second on is the palm print feature which is a typical contact biometrics like fingerprint, palm print and iris (Xu et.al, 2009).

3.2 Importance of AV Biometrics Even though, computer processing of speech has achieved a great progress, compared to human performance levels especially in noisy environments it still lags. Complex communication tasks can be easily accomplished by humans by using extra information sources when needed especially visual information, on the other side. Complimentary information is included in the face visibility and the speech perception is benefitted by the face visibility because the visual signal correlates to the produced audio signal. The relationship between the speech acoustics, articulatory movements and the vocal tract shape is investigated by working significantly. Correlation between the vocal tract shape, speech acoustics and the face motion was strong which was also shown For instance, the degrees of this correlation were investigated. The motion of markers that were located in the vocal tract and on the face were measured by them. It was from the results that the simple linear estimators are used by the vocal tract motion for determining the total variance in the facial
11

motion which was observed to be 91 %. Additionally, it was known that 80 % of the total variance seen in the vocal tract can be estimated from face motion by looking at the reverse problem. Linear estimators were enough for determining between 72 % and 85 % of the variance based on the utterance and subject observed in the line spectrum pair parametric representation and root mean squared amplitude of the spectral envelop from face motion regarding the speech acoustics (Aleksic and Katsaggelos, 2006). It was also shown by them that, because the jaw motion is displayed similarly by the tongue during the speech articulation, the tongue motion can be reasonably well recovered from the face motion. The correlation among the tongue movements, speech acoustics and external face movements for consonant-vowel (CV) syllables and sentences was investigated .It was shown by them that the face movements from the speech acoustics can be predicted by successfully using the multi-linear regression for short speech segments like consonant-vowel syllable. The prediction was good for cheek movements, chin movements and lip movements. The correlation between the face movements and the tongue movements was shown high by them like the authors of . Speech reading and lip reading are used by the hearing impaired individuals for improving the perception of their speech. Additionally, speech reading and lip reading are used also used by normal hearing persons to some extent. These are used in acoustically noisy environments especially. The perception of speech depending on the articulatory gestures of only the talkers is represented by the lip reading whereas understanding the speech by observing the manual and facial gestures, audition and the articulation of the talker is represented by the speech reading (Aleksic and Katsaggelos, 2006).

3.2.1 Audio-Visual Biometrics

Compared to an audio-only scenario, it was shown from the experiments of Summerfield that the sentence recognition accuracy in noisy conditions can improve by 31 % by AV speech perception and 43 % by speech reading. Whenever the visual information like mouth shapes augments the acoustic information, a higher level of speech recognition achieves the most hearing impaired listeners and this is shown in . McGurk effect demonstrated the bimodal integration of video and audion information to perceive the speech. Information about identity, emotion and location are included in speech in addition to the user linguistic
12

information. A main role in developing the HCI (Human Computer Interaction) systems is played by this speech(Aleksic and Katsaggelos, 2006).

3.2.2 Building Blocks of Acoustic and Visual Speech

The general unit that illustrates how the information was conveys the linguistic information is the phoneme. There present the approximately 42 phonemes produces by the particular movements or positions of the articulators of vocal tract. Similarly the generally visual discernible unit, used in the human perception literature and AV speech processing is the viseme. The Visemes is very smaller when compared to the phonemes. While visemes capture the articulation place, the phonemes capture the manner of articulation, i.e they illustrate where the constraint present in the mouth and how the parts of mouth like tongue, teeth, lips and palate move at the time of speech articulation. Hence many of the consonant phonemes with the similar articulation manner, which are critical to vary depend on the acoustic data alone, may vary in the articulation place, and thus identifiable visually as is for instance the case with 2 nasals m and n. In contrast the particular phonemes are easy to recognize acoustically than visually, since they similar articulation place but vary in the articulation manner as is for instance the case the bilabials m and p .Many mapping s among the visemes and phonemes have been in the literature, basically they are obtained by the studies of the human speech, but they can be produced by using the techniques of statistical clustering. There is no global agreement regarding the correct grouping of phonemes into visemes, even some of the clusters are well. For instance the phonemes p,b and m are articulated at the similar place thus being visually the same (Aleksic and Katsaggelos, 2006). 3.3 AV Biometrics System Description : In the figure below the block diagram of an AV person system of recognition. It includes the 3 major blocks that of the AV fusion, feature extraction, pre-processing. For the two modalities the pre-processing and feature extraction are done in parallel. The audio signal pre-processing under noisy situations comprise the enhancement of signal, tracking noise of environmental and channel, the smoothing and feature estimation. The video signal preprocessing generally includes of the competing problems of identifying and tracking of the face and the significant facial features (Aleksic and Katsaggelos, 2006).
13

Figure 2 : Block diagram of AV biometrics system (Aleksic and Katsaggelos, 2006). The preprocessing should be integrated with the extraction and choice of visual and acoustic features as shown by the dash lines in fig 3. The features of sound are selected depending on their robustness to background noise and channel. The output have been reported in the literature in obtaining the respective audio features for the both the noisy and clean conditions of speech. The most generally used audio feature are melfrequency cepstral coefficients (MFCCs) and LPCs (Linear prediction coefficients). The features that are dynamic to noise extracted with the usage of the spectral sub band centroids or the zero crossing with the model of peak amplitudes as an audio front end have also been planned. The audio features are generally augment by their first and second order outputs. The respective selection and extraction of a audio features is not give in this paper (Aleksic and Katsaggelos, 2006). At the same time the launch of visual features for speaker identification is newer study topic. The different plans have been applied to the face identification and tracking and extraction of facial feature and will be conferred in more detail in next part. The visual speech dynamics were captured, same ot the audio features expanding the Bstatic, vector of visual feature by its first and second order time output, which are calculated in the window of short temporal. The total normalization of the vectors of visual feature can be used to decrease the variability because of the illumination (Aleksic and Katsaggelos, 2006). The AV fusion includes the visual and audio information in order to attain the higher person performance of recognition than both visual only and audio only person recognition systems. If no fusion of the sound and visual data occurs, then visual only and audio only person results of recognitions system. The main benefit of the systems of AV biometrics presents in their robustness, since every
14

modality can give complementary and independent information and therefore avoid degradation of performance due to the sound occur in the one or multiple modalities. There present different approaches of adaptive fusion, which weigh the spread of different modalities depending on their ability reliability and discrimination as conferred in the section VI. The rates of audio and video features are generally varied. Ultimately, the persons models adaptation is significant part of the system of AV in the above figure Block diagram of AV biometrics system. It is generally applied, when the environment or the voice speakers characteristics alter or when the appearance of persons alterations due for example to style or illumination alteration, aging, glasses, hair and facial (Aleksic and Katsaggelos, 2006).

Chapter 4 Solutions 4.1 Biometric Hash Generation As the eyelashes or the eyelids affects the parts of iris ring like top and the bottom quarter. A hash which suits for indexing the database can be extracted employing the remaining parts of the pre processed texture. Various needs like efficient computation and collision freeness must be fulfilled by the calculated hashes. Processing of the most reliable parts of an iris texture is desirable because the stable HG is required for overcoming the biometric variance. As it was found that the inner bands of the iris are more consistent than the outer bands, x y pixel blocks located in the upper half of the iris texture are analyzed. Mean grayscale values are calculated for each processed x y pixel block for introducing uantization so that the variance can be overcome. A set of M of mean values, for a number of n pixel blocks is extracted in which M is defined by M= {m1, m2,, mn}. Subsequently, each mean value mi is compared against a predefined threshold k for generating a binary hash B = {b1, b2, ..., bn} such that, bi = (1, if mi _ k, 0, if mi < k.8i = 1...n (1) (Rathgeb and Uhl, 2010).

15

Figure 3 : 32-bit HG (168 pixel blocks,k=128): (a) preproc. iris texture (b) mean values for pixel blocks (c) binary hash. The HG process which is computational efficient is shown in the above figure . Various advantages are offered by these HG. The advantages are: similar hashes for similar biometric data is extracted by the HG proposed, the need of a hash utilized for coarse level database indexing is also fulfilled. Number of applied blocks and the block dimensions should be verified for making the hashes scalable with respect to length. Scalability will be considered important as the hash values are utilized as the database indices (Rathgeb and Uhl, 2010).

4.1.1

DB-Indexing and Registration

At the time of generating a template that represents a single-sensor scenario, HG will be applied. A hash and also a biometric template will be generated for every user. Arrangements
16

of hashes will be in such a way that the according template can be found quickly if a similar hash is generated from another image. A Karnaugh map (KM) is constructed for n-bit hashes apriori, for this purpose. As the identification setup is calculated at the system set up, it will not be affected by the time needed for constructing the map. According node of KM will be the storage point of the pointer to the generated biometric template, at registration. The extracted hash node equals with the according node. A linked list of pointers will be stored at the according node if equal hashes are calculated for different users (Rathgeb and Uhl, 2010). Gray code will be the result of any path through adjacent nodes which is one of the property of KM. Therefore, a high similarity applying the Hamming distance is exposed by the nodes that are reached by shorter paths. In the logarithmic time, according node of the KM that corresponds to the extracted hash can be found. Logarithmic effort with respect to the KM dimension is required in the user registration when applying a binary search (Rathgeb and Uhl, 2010).

4.1.2 DB-Search and Identification Has and features are extracted, preprocessing is applied and biometric data is acquired at the identification. As there is no availability of additional user-specific helper data, the form of operating the HG should be as a pure key generation scheme which is its important restriction. Then the extracted hash is mapped onto the stored KM. The iris code extracted will be matched against the biometric templates as one or more biometric templates are pointed by the according node (Rathgeb and Uhl, 2010).

17

Figure 4: 4-bit KM: each node is linked with each other node which has a Hamming distance of 1 to this node (Rathgeb and Uhl, 2010).

Until a certain search depth is reached or identification is yielded, this procedure is recursively repeated for neighboring nodes. All the adjacent nodes will be considered if a failure occurs in identification or no pointer is present (Rathgeb and Uhl, 2010).

18

Chapter 5 Conclusions
Since the internet technology is increasing rapidly. People started using the internet in all aspects of their lives. Such as in the banking, shopping, education. So security concept enters into the market. As the technology is increasing there will be different kinds of attacks. In this paper discussed about the security technique biometrics. In the present world biometrics plays the major role in various aspects in the organizations and in the real time applications. In this paper mainly concentrated on the audio visual biometrics. Discussed how these both factors help in providing the security for banking and shopping applications. So for understanding how useful is the biometric discussed the various section such as what is the biometric recognition how they are useful in providing the security. Discussed about the biometric databases, this concept explains the users how to provide the security for the databases. Biometric security concept is used in all factors. Biometric security mainly uses the face, eyes, thumb in providing the security for the applications.

References:
19

Aleksic P S, Katsaggelos A K 2006, Audio-Visual Biometrics, Proceedings of the IEEE, IEEEXplore, pp.2025-2044. Jain A K, Ross A, Pankanti S 2006, Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on , volume 1, issue 2, pp.125-143.

Jong G K, Ki Y M 2008, Biometrics Security Scheme for Privacy Protection, Advanced Software Engineering and Its Applications, 2008. ASEA 2008, IEEEXplore, pp.230-232.

Rathgeb C, Uhl A 2010, Iris-Biometric Hash Generation for Biometric Database Indexing, Pattern Recognition (ICPR), 2010 20th International Conference on, IEEEXplore, pp. 28482851.

Xu X, Zhang D, Zhang X, Long H, Chen X, Wu C 2009, NSCTWavelet: An efficient method for multimodal biometric recognition based on pixel level fusion, Industrial Electronics, 2009. ISIE 2009. IEEE International Symposium on, IEEEXplore, pp.1893-1898.

20

Vous aimerez peut-être aussi