40 Questions
What is the primary concern in today's digital age?
Assurance of security in online services
What role do computers play in our daily lives?
They play an important role
What is the key to the future of data/cyber security?
Biometrics
Where is the Galgotias College of Engineering and Technology located?
Greater Noida
Who is the corresponding author of the paper?
A. Q. Ansari
What is the volume number of the Defence Science Journal?
66
What is the DOI of the paper?
10.14429/dsj.66.10800
In what year was the paper published?
2016
What is a major concern in today's digital world?
Cyber security
What is a key application of biometric technology?
Online banking
What are the endpoints and crossing points of ridges in a fingerprint called?
Minutiae
What is a characteristic of fingerprint recognition?
Universality
What is the pattern formed by ridges and valleys on a fingertip?
Parallel
What is the primary purpose of using biometric technology in banking?
To authenticate transactions
What is a type of biometric technology that is used to unlock computers or phones?
All of the above
What is the term used to describe the desirable properties of a biometric modality?
All of the above
What is the primary function of a biometric system?
To recognise a person using a specific physiological characteristic
What is the term used to describe the point where three ridges meet in a fingerprint?
Delta
What is the main purpose of a verification system in biometrics?
To compare a test biometric characteristic with a stored one
What is the name of the approach that combines minutiae and non-minutiae based methods?
Hybrid system
What is the term used to describe a set of extracted features from a fingerprint?
Feature vector
What is the purpose of singular points in fingerprint recognition?
To align fingerprints
Who developed the approach using Integrated Wavelet and Fourier Mellin Transform (WFMT) for feature extraction?
Jin, et al.
What is the result of using Multiple WFMT features?
A set of reference invariant features
What are the two feature extraction methods presented in the text?
Fuzzy features and invariant moment features
What is the primary purpose of the logarithmic function in the fuzzy features extraction process?
To reduce the dynamic range of the moments
What is the size of the non-overlapping square blocks in the fuzzy features extraction process?
W x W
What is the equation for φ6 in the text?
(η20 − η02 )(η30 + η12 )
What is the purpose of dividing the image into non-overlapping blocks in the fuzzy features extraction process?
To divide the image into smaller regions for feature extraction
What is the equation for φ7 in the text?
(3η21 − η03 )(η30 + η12 )
What is the main advantage of using fuzzy features and invariant moment features over minutiae-based approaches?
They are more robust to noise and variation
What is the purpose of the logarithmic function in the fingerprint recognition process?
To reduce the dynamic range of the moments
What is the average accuracy of the proposed system using linear, RBF, and polynomial features?
91.25%
Which feature extraction method is used in the fingerprint verification system proposed by Helfroush and Mohammadpour?
Non-minutiae based approach
What is the accuracy of the proposed system using invariant moment features with RBF kernel?
95%
In which conference was the paper by Helfroush and Mohammadpour presented?
International Conference on Computer, Control and Communication
What is the DOI of the paper by Khalil et al.?
10.1016/j.dsp.2009.12.002
What is the title of the paper by Bharkad and Kokare?
Hartley Transform Based Fingerprint Matching
What is the degree received by Dr. Jaspreet Kour from REC (NIT) Bhopal?
B.Tech
How many authors are there in the paper by Kumar et al.?
4
Study Notes
Biometrics in Cyber Security
- Biometrics is a key to the future of data/cyber security, satisfying properties such as universality, distinctiveness, permeance, and collectability.
- Fingerprint recognition is one of the oldest and mature biometric technologies, with applications in many areas.
Fingerprint Recognition
- Ridge patterns on a fingerprint surface are formed by ridges and valleys, with ridges being dark and valleys being bright.
- Ridges and valleys generally run in parallel, bifurcating, and terminating at various points.
- Minutiae are the endpoints and crossing points of ridges, and singularities are regions where ridge lines assume distinctive shapes, classified as loop, delta, and whorl.
Biometric System
- A biometric system recognizes a person using a specific physiological and/or behavioral characteristic possessed by a person.
- Biometric systems can be classified as either verification or identification systems, depending on the application.
Fingerprint Recognition Approaches
- Approaches for fingerprint recognition are divided into three categories: minutiae-based, non-minutiae-based (image-based), and hybrid systems.
- Minutiae-based approaches involve extracting a set of minutiae from fingerprints.
- Integrated wavelet and Fourier Mellin transform (WFMT) is used for feature extraction in minutiae-based approaches.
Feature Extraction
- Two set of features, namely fuzzy features and invariant moment features, are obtained from the region of interest (ROI) of the fingerprint image.
- Fuzzy features are obtained by dividing the cropped image into non-overlapping square blocks, and reducing the dynamic range of moments using a logarithmic function.
- Invariant moment features are obtained using equations (10) and (11).
Accuracy of Proposed System
- The proposed system achieved an accuracy of 75% with linear kernel, 87.5% with RBF kernel, and 77.5% with polynomial kernel using fuzzy features.
- The proposed system achieved an accuracy of 92.5% with linear kernel, 95% with RBF kernel, and 90% with polynomial kernel using invariant moment features.
This journal article from Defence Science Journal Vol. 66, No. 6, November 2016, contains metadata and citation information. Discover the details of this research paper.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free