In recent years,biometric technologies have been widely embedded in mobile devices;these technologies were originally employed to enhance the security of mobile devices.With the rise of financial technology(FinTech),w...In recent years,biometric technologies have been widely embedded in mobile devices;these technologies were originally employed to enhance the security of mobile devices.With the rise of financial technology(FinTech),which uses mobile devices and applications as promotional platforms,biometrics has the important role of strengthening the identification of such applications for security.However,users still have privacy and trust concerns about biometrics.Previous studies have demonstrated that the technology acceptance model(TAM)can rigorously explain and predict user acceptance of new technologies.This study therefore modifies the TAM as a basic research architecture.Based on a literature review,we add two new variables,namely,“perceived privacy”and“perceived trust,”to extend the traditional TAM to examine user acceptance of biometric identification in FinTech applications.First,we apply the analytic hierarchy process(AHP)to evaluate the defined objects and relevant criteria of the research framework.Second,we use the AHP results in the scenario analysis to explore biometric identification methods that correspond to objects and criteria.The results indicate that face and voice recognition are the two most preferred identification methods in FinTech applications.In addition,there are significant changes in the results of the perceived trust and perceived privacy dominant scenarios.展开更多
Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics....Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.Then biometrics will forever be lost if these databases are attacked.Protecting privacy is the most important goal of cancelable biometrics.In order to protect privacy,therefore,cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases.One methodology to achieve non-invertibility is the employment of non-invertible transforms.This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system.This system includes the 3D Jigsaw transforms and Fractional Fourier Transform(FrFT).The proposed scheme is compared with the optical Double Random Phase Encoding(DRPE)encryption process.The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure,authoritative,and feasible.The encryption and cancelability effects are good and reveal good performance.Also,it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems.展开更多
Mangshan pitviper, Protobothrops mangshanensis (formerly Zhaoermia mangshanensis) is endemic to China. Unfortunately, due to the decreasing size of its wild populations, this snake has been listed as critically enda...Mangshan pitviper, Protobothrops mangshanensis (formerly Zhaoermia mangshanensis) is endemic to China. Unfortunately, due to the decreasing size of its wild populations, this snake has been listed as critically endangered. Re- search carried out on the Mangshan pitviper's population ecology and captive reproduction has revealed that the unique head patch patterns of different individuals may potentially be used as a noninvasive recognition biometric character. We collected head patch pattern images of 40 individuals of P. mangshanensis between 1994 and 2011. By comparing each pitviper's head patch pattern, we found that the head patch pattern of individual snakes was different and unique. Additionally, we observed and recorded the head patch pattern characters of four adults and five juveniles before and af- ter ecdysis. Our findings confirmed that head patch patterns of Mangshan pitvipers are unique and stable, remaining un- changed after ecdysis. Thus, individuals can be quickly identified by examining the head patch pattern within a specific recognition area on the head. This method may be useful for noninvasive individual recognition in many other species that display color patch pattern variations, especially in studies of endangered species where the use of invasive marking techniques is undesirable.展开更多
Biometric recognition refers to the process of recognizing a person’s identity using physiological or behavioral modalities,such as face,voice,fingerprint,gait,etc.Such biometric modalities are mostly used in recogni...Biometric recognition refers to the process of recognizing a person’s identity using physiological or behavioral modalities,such as face,voice,fingerprint,gait,etc.Such biometric modalities are mostly used in recognition tasks separately as in unimodal systems,or jointly with two or more as in multimodal systems.However,multimodal systems can usually enhance the recognition performance over unimodal systems by integrating the biometric data of multiple modalities at different fusion levels.Despite this enhancement,in real-life applications some factors degrade multimodal systems’performance,such as occlusion,face poses,and noise in voice data.In this paper,we propose two algorithms that effectively apply dynamic fusion at feature level based on the data quality of multimodal biometrics.The proposed algorithms attempt to minimize the negative influence of confusing and low-quality features by either exclusion or weight reduction to achieve better recognition performance.The proposed dynamic fusion was achieved using face and voice biometrics,where face features were extracted using principal component analysis(PCA),and Gabor filters separately,whilst voice features were extracted using Mel-Frequency Cepstral Coefficients(MFCCs).Here,the facial data quality assessment of face images is mainly based on the existence of occlusion,whereas the assessment of voice data quality is substantially based on the calculation of signal to noise ratio(SNR)as per the existence of noise.To evaluate the performance of the proposed algorithms,several experiments were conducted using two combinations of three different databases,AR database,and the extended Yale Face Database B for face images,in addition to VOiCES database for voice data.The obtained results show that both proposed dynamic fusion algorithms attain improved performance and offer more advantages in identification and verification over not only the standard unimodal algorithms but also the multimodal algorithms using standard fusion methods.展开更多
Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control...Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on 'who an individual is', rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his/her anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his/her identity, these traits cannot be easily lost or forgotten or faked, since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet they are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. Presented is the available standing biometric systems showing their strengths and weaknesses and also emerging technologies which may have great benefits for security applications in the near future.展开更多
For a large-scale palmprint identification system,it is necessary to speed up the identification process to reduce the response time and also to have a high rate of identification accuracy.In this paper,we propose a n...For a large-scale palmprint identification system,it is necessary to speed up the identification process to reduce the response time and also to have a high rate of identification accuracy.In this paper,we propose a novel hashing-based technique called orientation field code hashing for fast palmprint identification.By investigating hashing-based algorithms,we first propose a double-orientation encoding method to eliminate the instability of orientation codes and make the orientation codes more reasonable.Secondly,we propose a window-based feature measurement for rapid searching of the target.We explore the influence of parameters related to hashing-based palmprint identification.We have carried out a number of experiments on the Hong Kong Poly U large-scale database and the CASIA palmprint database plus a synthetic database.The results show that on the Hong Kong Poly U large-scale database,the proposed method is about 1.5 times faster than the state-of-the-art ones,while achieves the comparable identification accuracy.On the CASIA database plus the synthetic database,the proposed method also achieves a better performance on identification speed.展开更多
Many fungi limit onion production in Burkina Faso. This study aims to identify the main Fusarium species associated with onion plant in field in order to determine those involved in seedling damping-off and bulb rot, ...Many fungi limit onion production in Burkina Faso. This study aims to identify the main Fusarium species associated with onion plant in field in order to determine those involved in seedling damping-off and bulb rot, and develop adequate management strategies of these diseases. For this purpose, 36 isolates of Fusarium were isolated from onion plants in 17 sites and subjected to molecular analysis and biometric characterization. The results revealed that the isolates belong to five Fusarium species: Fusarium oxysporum (44.44% of the isolates), Fusarium proliferatum (41.66%), Fusarium solani (5.55%), Fusarium fujikuroi (5.55%) and Fusarium thapsinum (2.77%). Fusarium oxysporum, F. proliferatum, F. solani and F. fujikuroi had faster mycelial development, with a growth rate of 7.72 - 8.27 mm/d, than F. thapsinum (6.52 mm/d). Conidia of F. oxysporum, F. proliferatum and F. solani were longer (4.74 - 5.96 μm) than those of F. fujikuroi and F. thapsinum (3.20 - 4.04 μm). Fusarium solani and F. oxysporum, respectively, had the largest and most partitioned conidia.展开更多
Hand-biometric-based personal identification is considered to be an effective method for automatic recognition. However, existing systems require strict constraints during data acquisition, such as costly devices,spec...Hand-biometric-based personal identification is considered to be an effective method for automatic recognition. However, existing systems require strict constraints during data acquisition, such as costly devices,specified postures, simple background, and stable illumination. In this paper, a contactless personal identification system is proposed based on matching hand geometry features and color features. An inexpensive Kinect sensor is used to acquire depth and color images of the hand. During image acquisition, no pegs or surfaces are used to constrain hand position or posture. We segment the hand from the background through depth images through a process which is insensitive to illumination and background. Then finger orientations and landmark points, like finger tips or finger valleys, are obtained by geodesic hand contour analysis. Geometric features are extracted from depth images and palmprint features from intensity images. In previous systems, hand features like finger length and width are normalized, which results in the loss of the original geometric features. In our system, we transform 2D image points into real world coordinates, so that the geometric features remain invariant to distance and perspective effects. Extensive experiments demonstrate that the proposed hand-biometric-based personal identification system is effective and robust in various practical situations.展开更多
As a kind of physical signals that could be easily acquired in daily life,photoplethysmography(PPG)signal becomes a promising solution to biometric identification for daily access management system(AMS).State-of-the-a...As a kind of physical signals that could be easily acquired in daily life,photoplethysmography(PPG)signal becomes a promising solution to biometric identification for daily access management system(AMS).State-of-the-art PPG-based identification systems are susceptible to the form of motions and physical conditions of the subjects.In this work,to exploit the advantage of deep learning,we developed an improved deep convolutional neural network(CNN)architecture by using the Gram matrix(GM)technique to convert time-serial PPG signals to two-dimensional images with a temporal dependency to improve accuracy under different forms of motions.To ensure a fair evaluation,we have adopted cross-validation method and“training and testing”dataset splitting method on the TROIKA dataset collected in ambulatory conditions.As a result,the proposed GM-CNN method achieved accuracy improvement from 69.5%to 92.4%,which is the best result in terms of multi-class classification compared with state-of-the-art models.Based on average five-fold cross-validation,we achieved an accuracy of 99.2%,improved the accuracy by 3.3%compared with the best existing method for the binary-class.展开更多
文摘In recent years,biometric technologies have been widely embedded in mobile devices;these technologies were originally employed to enhance the security of mobile devices.With the rise of financial technology(FinTech),which uses mobile devices and applications as promotional platforms,biometrics has the important role of strengthening the identification of such applications for security.However,users still have privacy and trust concerns about biometrics.Previous studies have demonstrated that the technology acceptance model(TAM)can rigorously explain and predict user acceptance of new technologies.This study therefore modifies the TAM as a basic research architecture.Based on a literature review,we add two new variables,namely,“perceived privacy”and“perceived trust,”to extend the traditional TAM to examine user acceptance of biometric identification in FinTech applications.First,we apply the analytic hierarchy process(AHP)to evaluate the defined objects and relevant criteria of the research framework.Second,we use the AHP results in the scenario analysis to explore biometric identification methods that correspond to objects and criteria.The results indicate that face and voice recognition are the two most preferred identification methods in FinTech applications.In addition,there are significant changes in the results of the perceived trust and perceived privacy dominant scenarios.
文摘Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.Then biometrics will forever be lost if these databases are attacked.Protecting privacy is the most important goal of cancelable biometrics.In order to protect privacy,therefore,cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases.One methodology to achieve non-invertibility is the employment of non-invertible transforms.This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system.This system includes the 3D Jigsaw transforms and Fractional Fourier Transform(FrFT).The proposed scheme is compared with the optical Double Random Phase Encoding(DRPE)encryption process.The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure,authoritative,and feasible.The encryption and cancelability effects are good and reveal good performance.Also,it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems.
基金funded by the National Natural Science Foundation of China (No. 31071946)the Wild Animal Conservation Fund of the State Forestry Administration of China (2011)the Provincial Natural Science Foundation of Hunan, China (No. 09JJ3030)
文摘Mangshan pitviper, Protobothrops mangshanensis (formerly Zhaoermia mangshanensis) is endemic to China. Unfortunately, due to the decreasing size of its wild populations, this snake has been listed as critically endangered. Re- search carried out on the Mangshan pitviper's population ecology and captive reproduction has revealed that the unique head patch patterns of different individuals may potentially be used as a noninvasive recognition biometric character. We collected head patch pattern images of 40 individuals of P. mangshanensis between 1994 and 2011. By comparing each pitviper's head patch pattern, we found that the head patch pattern of individual snakes was different and unique. Additionally, we observed and recorded the head patch pattern characters of four adults and five juveniles before and af- ter ecdysis. Our findings confirmed that head patch patterns of Mangshan pitvipers are unique and stable, remaining un- changed after ecdysis. Thus, individuals can be quickly identified by examining the head patch pattern within a specific recognition area on the head. This method may be useful for noninvasive individual recognition in many other species that display color patch pattern variations, especially in studies of endangered species where the use of invasive marking techniques is undesirable.
文摘Biometric recognition refers to the process of recognizing a person’s identity using physiological or behavioral modalities,such as face,voice,fingerprint,gait,etc.Such biometric modalities are mostly used in recognition tasks separately as in unimodal systems,or jointly with two or more as in multimodal systems.However,multimodal systems can usually enhance the recognition performance over unimodal systems by integrating the biometric data of multiple modalities at different fusion levels.Despite this enhancement,in real-life applications some factors degrade multimodal systems’performance,such as occlusion,face poses,and noise in voice data.In this paper,we propose two algorithms that effectively apply dynamic fusion at feature level based on the data quality of multimodal biometrics.The proposed algorithms attempt to minimize the negative influence of confusing and low-quality features by either exclusion or weight reduction to achieve better recognition performance.The proposed dynamic fusion was achieved using face and voice biometrics,where face features were extracted using principal component analysis(PCA),and Gabor filters separately,whilst voice features were extracted using Mel-Frequency Cepstral Coefficients(MFCCs).Here,the facial data quality assessment of face images is mainly based on the existence of occlusion,whereas the assessment of voice data quality is substantially based on the calculation of signal to noise ratio(SNR)as per the existence of noise.To evaluate the performance of the proposed algorithms,several experiments were conducted using two combinations of three different databases,AR database,and the extended Yale Face Database B for face images,in addition to VOiCES database for voice data.The obtained results show that both proposed dynamic fusion algorithms attain improved performance and offer more advantages in identification and verification over not only the standard unimodal algorithms but also the multimodal algorithms using standard fusion methods.
文摘Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on 'who an individual is', rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his/her anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his/her identity, these traits cannot be easily lost or forgotten or faked, since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet they are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. Presented is the available standing biometric systems showing their strengths and weaknesses and also emerging technologies which may have great benefits for security applications in the near future.
基金supported in part by the National Natural Science Foundation of China(61806071)the Natural Science Foundation of Hebei Province(F2019202464,F2019202381)+2 种基金the Open Project Program of the National Laboratory of Pattern Recognition(NLPR)of China(201900043)Hebei Provincial Education Department Youth Foundation(QN2019207)the Technical Expert Project of Tianjin(19JCTPJC55800,19JCTPJC57000)。
文摘For a large-scale palmprint identification system,it is necessary to speed up the identification process to reduce the response time and also to have a high rate of identification accuracy.In this paper,we propose a novel hashing-based technique called orientation field code hashing for fast palmprint identification.By investigating hashing-based algorithms,we first propose a double-orientation encoding method to eliminate the instability of orientation codes and make the orientation codes more reasonable.Secondly,we propose a window-based feature measurement for rapid searching of the target.We explore the influence of parameters related to hashing-based palmprint identification.We have carried out a number of experiments on the Hong Kong Poly U large-scale database and the CASIA palmprint database plus a synthetic database.The results show that on the Hong Kong Poly U large-scale database,the proposed method is about 1.5 times faster than the state-of-the-art ones,while achieves the comparable identification accuracy.On the CASIA database plus the synthetic database,the proposed method also achieves a better performance on identification speed.
基金the Congregation of the Sisters of the Immaculate Conception of Ouagadougou(S.I.C.O.)and the Institute of Environment and Agricultural Research(INERA)for their financial support for this work
文摘Many fungi limit onion production in Burkina Faso. This study aims to identify the main Fusarium species associated with onion plant in field in order to determine those involved in seedling damping-off and bulb rot, and develop adequate management strategies of these diseases. For this purpose, 36 isolates of Fusarium were isolated from onion plants in 17 sites and subjected to molecular analysis and biometric characterization. The results revealed that the isolates belong to five Fusarium species: Fusarium oxysporum (44.44% of the isolates), Fusarium proliferatum (41.66%), Fusarium solani (5.55%), Fusarium fujikuroi (5.55%) and Fusarium thapsinum (2.77%). Fusarium oxysporum, F. proliferatum, F. solani and F. fujikuroi had faster mycelial development, with a growth rate of 7.72 - 8.27 mm/d, than F. thapsinum (6.52 mm/d). Conidia of F. oxysporum, F. proliferatum and F. solani were longer (4.74 - 5.96 μm) than those of F. fujikuroi and F. thapsinum (3.20 - 4.04 μm). Fusarium solani and F. oxysporum, respectively, had the largest and most partitioned conidia.
基金Project supported by the National Natural Science Foundation of China(Nos.61340046,60875050,and 60675025)the National High-Tech R&D Program(863)of China(No.2006AA04Z247)+1 种基金the Scientific and Technical Innovation Commission of Shenzhen Municipality(Nos.JCYJ20120614152234873,CXC201104210010A,JCYJ20130331144631730,and JCYJ20130331144716089)the Specialized Research Fund for the Doctoral Program of Higher Education,China(No.20130001110011)
文摘Hand-biometric-based personal identification is considered to be an effective method for automatic recognition. However, existing systems require strict constraints during data acquisition, such as costly devices,specified postures, simple background, and stable illumination. In this paper, a contactless personal identification system is proposed based on matching hand geometry features and color features. An inexpensive Kinect sensor is used to acquire depth and color images of the hand. During image acquisition, no pegs or surfaces are used to constrain hand position or posture. We segment the hand from the background through depth images through a process which is insensitive to illumination and background. Then finger orientations and landmark points, like finger tips or finger valleys, are obtained by geodesic hand contour analysis. Geometric features are extracted from depth images and palmprint features from intensity images. In previous systems, hand features like finger length and width are normalized, which results in the loss of the original geometric features. In our system, we transform 2D image points into real world coordinates, so that the geometric features remain invariant to distance and perspective effects. Extensive experiments demonstrate that the proposed hand-biometric-based personal identification system is effective and robust in various practical situations.
基金the National Key R&D Program of China(No.2019YFB2204500)the Translational Medicine Cross Research Fund of Shanghai Jiao Tong University(No.ZH2018QNB22)。
文摘As a kind of physical signals that could be easily acquired in daily life,photoplethysmography(PPG)signal becomes a promising solution to biometric identification for daily access management system(AMS).State-of-the-art PPG-based identification systems are susceptible to the form of motions and physical conditions of the subjects.In this work,to exploit the advantage of deep learning,we developed an improved deep convolutional neural network(CNN)architecture by using the Gram matrix(GM)technique to convert time-serial PPG signals to two-dimensional images with a temporal dependency to improve accuracy under different forms of motions.To ensure a fair evaluation,we have adopted cross-validation method and“training and testing”dataset splitting method on the TROIKA dataset collected in ambulatory conditions.As a result,the proposed GM-CNN method achieved accuracy improvement from 69.5%to 92.4%,which is the best result in terms of multi-class classification compared with state-of-the-art models.Based on average five-fold cross-validation,we achieved an accuracy of 99.2%,improved the accuracy by 3.3%compared with the best existing method for the binary-class.