Defence Science Journal: Citation and Metadata
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary concern in today's digital age?

  • Decrease in internet usage
  • Lack of security regulations
  • Assurance of security in online services (correct)
  • Rapid growth of computer usage
  • What role do computers play in our daily lives?

  • They are not used at all
  • They play a minor role
  • They play an important role (correct)
  • They are rarely used
  • What is the key to the future of data/cyber security?

  • Encryption
  • Biometrics (correct)
  • Firewalls
  • Antivirus software
  • Where is the Galgotias College of Engineering and Technology located?

    <p>Greater Noida</p> Signup and view all the answers

    Who is the corresponding author of the paper?

    <p>A. Q. Ansari</p> Signup and view all the answers

    What is the volume number of the Defence Science Journal?

    <p>66</p> Signup and view all the answers

    What is the DOI of the paper?

    <p>10.14429/dsj.66.10800</p> Signup and view all the answers

    In what year was the paper published?

    <p>2016</p> Signup and view all the answers

    What is a major concern in today's digital world?

    <p>Cyber security</p> Signup and view all the answers

    What is a key application of biometric technology?

    <p>Online banking</p> Signup and view all the answers

    What are the endpoints and crossing points of ridges in a fingerprint called?

    <p>Minutiae</p> Signup and view all the answers

    What is a characteristic of fingerprint recognition?

    <p>Universality</p> Signup and view all the answers

    What is the pattern formed by ridges and valleys on a fingertip?

    <p>Parallel</p> Signup and view all the answers

    What is the primary purpose of using biometric technology in banking?

    <p>To authenticate transactions</p> Signup and view all the answers

    What is a type of biometric technology that is used to unlock computers or phones?

    <p>All of the above</p> Signup and view all the answers

    What is the term used to describe the desirable properties of a biometric modality?

    <p>All of the above</p> Signup and view all the answers

    What is the primary function of a biometric system?

    <p>To recognise a person using a specific physiological characteristic</p> Signup and view all the answers

    What is the term used to describe the point where three ridges meet in a fingerprint?

    <p>Delta</p> Signup and view all the answers

    What is the main purpose of a verification system in biometrics?

    <p>To compare a test biometric characteristic with a stored one</p> Signup and view all the answers

    What is the name of the approach that combines minutiae and non-minutiae based methods?

    <p>Hybrid system</p> Signup and view all the answers

    What is the term used to describe a set of extracted features from a fingerprint?

    <p>Feature vector</p> Signup and view all the answers

    What is the purpose of singular points in fingerprint recognition?

    <p>To align fingerprints</p> Signup and view all the answers

    Who developed the approach using Integrated Wavelet and Fourier Mellin Transform (WFMT) for feature extraction?

    <p>Jin, et al.</p> Signup and view all the answers

    What is the result of using Multiple WFMT features?

    <p>A set of reference invariant features</p> Signup and view all the answers

    What are the two feature extraction methods presented in the text?

    <p>Fuzzy features and invariant moment features</p> Signup and view all the answers

    What is the primary purpose of the logarithmic function in the fuzzy features extraction process?

    <p>To reduce the dynamic range of the moments</p> Signup and view all the answers

    What is the size of the non-overlapping square blocks in the fuzzy features extraction process?

    <p>W x W</p> Signup and view all the answers

    What is the equation for φ6 in the text?

    <p>(η20 − η02 )(η30 + η12 )</p> Signup and view all the answers

    What is the purpose of dividing the image into non-overlapping blocks in the fuzzy features extraction process?

    <p>To divide the image into smaller regions for feature extraction</p> Signup and view all the answers

    What is the equation for φ7 in the text?

    <p>(3η21 − η03 )(η30 + η12 )</p> Signup and view all the answers

    What is the main advantage of using fuzzy features and invariant moment features over minutiae-based approaches?

    <p>They are more robust to noise and variation</p> Signup and view all the answers

    What is the purpose of the logarithmic function in the fingerprint recognition process?

    <p>To reduce the dynamic range of the moments</p> Signup and view all the answers

    What is the average accuracy of the proposed system using linear, RBF, and polynomial features?

    <p>91.25%</p> Signup and view all the answers

    Which feature extraction method is used in the fingerprint verification system proposed by Helfroush and Mohammadpour?

    <p>Non-minutiae based approach</p> Signup and view all the answers

    What is the accuracy of the proposed system using invariant moment features with RBF kernel?

    <p>95%</p> Signup and view all the answers

    In which conference was the paper by Helfroush and Mohammadpour presented?

    <p>International Conference on Computer, Control and Communication</p> Signup and view all the answers

    What is the DOI of the paper by Khalil et al.?

    <p>10.1016/j.dsp.2009.12.002</p> Signup and view all the answers

    What is the title of the paper by Bharkad and Kokare?

    <p>Hartley Transform Based Fingerprint Matching</p> Signup and view all the answers

    What is the degree received by Dr. Jaspreet Kour from REC (NIT) Bhopal?

    <p>B.Tech</p> Signup and view all the answers

    How many authors are there in the paper by Kumar et al.?

    <p>4</p> Signup and view all the answers

    Study Notes

    Biometrics in Cyber Security

    • Biometrics is a key to the future of data/cyber security, satisfying properties such as universality, distinctiveness, permeance, and collectability.
    • Fingerprint recognition is one of the oldest and mature biometric technologies, with applications in many areas.

    Fingerprint Recognition

    • Ridge patterns on a fingerprint surface are formed by ridges and valleys, with ridges being dark and valleys being bright.
    • Ridges and valleys generally run in parallel, bifurcating, and terminating at various points.
    • Minutiae are the endpoints and crossing points of ridges, and singularities are regions where ridge lines assume distinctive shapes, classified as loop, delta, and whorl.

    Biometric System

    • A biometric system recognizes a person using a specific physiological and/or behavioral characteristic possessed by a person.
    • Biometric systems can be classified as either verification or identification systems, depending on the application.

    Fingerprint Recognition Approaches

    • Approaches for fingerprint recognition are divided into three categories: minutiae-based, non-minutiae-based (image-based), and hybrid systems.
    • Minutiae-based approaches involve extracting a set of minutiae from fingerprints.
    • Integrated wavelet and Fourier Mellin transform (WFMT) is used for feature extraction in minutiae-based approaches.

    Feature Extraction

    • Two set of features, namely fuzzy features and invariant moment features, are obtained from the region of interest (ROI) of the fingerprint image.
    • Fuzzy features are obtained by dividing the cropped image into non-overlapping square blocks, and reducing the dynamic range of moments using a logarithmic function.
    • Invariant moment features are obtained using equations (10) and (11).

    Accuracy of Proposed System

    • The proposed system achieved an accuracy of 75% with linear kernel, 87.5% with RBF kernel, and 77.5% with polynomial kernel using fuzzy features.
    • The proposed system achieved an accuracy of 92.5% with linear kernel, 95% with RBF kernel, and 90% with polynomial kernel using invariant moment features.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This journal article from Defence Science Journal Vol. 66, No. 6, November 2016, contains metadata and citation information. Discover the details of this research paper.

    More Like This

    Chemical Science Journal Scope Quiz
    10 questions
    Exploring Diverse Biology Topics Quiz
    12 questions
    Scientific Research Articles Quiz
    5 questions
    Writing for Scientific Journals
    10 questions
    Use Quizgecko on...
    Browser
    Browser