Podcast
Questions and Answers
What is the primary concern in today's digital age?
What is the primary concern in today's digital age?
What role do computers play in our daily lives?
What role do computers play in our daily lives?
What is the key to the future of data/cyber security?
What is the key to the future of data/cyber security?
Where is the Galgotias College of Engineering and Technology located?
Where is the Galgotias College of Engineering and Technology located?
Signup and view all the answers
Who is the corresponding author of the paper?
Who is the corresponding author of the paper?
Signup and view all the answers
What is the volume number of the Defence Science Journal?
What is the volume number of the Defence Science Journal?
Signup and view all the answers
What is the DOI of the paper?
What is the DOI of the paper?
Signup and view all the answers
In what year was the paper published?
In what year was the paper published?
Signup and view all the answers
What is a major concern in today's digital world?
What is a major concern in today's digital world?
Signup and view all the answers
What is a key application of biometric technology?
What is a key application of biometric technology?
Signup and view all the answers
What are the endpoints and crossing points of ridges in a fingerprint called?
What are the endpoints and crossing points of ridges in a fingerprint called?
Signup and view all the answers
What is a characteristic of fingerprint recognition?
What is a characteristic of fingerprint recognition?
Signup and view all the answers
What is the pattern formed by ridges and valleys on a fingertip?
What is the pattern formed by ridges and valleys on a fingertip?
Signup and view all the answers
What is the primary purpose of using biometric technology in banking?
What is the primary purpose of using biometric technology in banking?
Signup and view all the answers
What is a type of biometric technology that is used to unlock computers or phones?
What is a type of biometric technology that is used to unlock computers or phones?
Signup and view all the answers
What is the term used to describe the desirable properties of a biometric modality?
What is the term used to describe the desirable properties of a biometric modality?
Signup and view all the answers
What is the primary function of a biometric system?
What is the primary function of a biometric system?
Signup and view all the answers
What is the term used to describe the point where three ridges meet in a fingerprint?
What is the term used to describe the point where three ridges meet in a fingerprint?
Signup and view all the answers
What is the main purpose of a verification system in biometrics?
What is the main purpose of a verification system in biometrics?
Signup and view all the answers
What is the name of the approach that combines minutiae and non-minutiae based methods?
What is the name of the approach that combines minutiae and non-minutiae based methods?
Signup and view all the answers
What is the term used to describe a set of extracted features from a fingerprint?
What is the term used to describe a set of extracted features from a fingerprint?
Signup and view all the answers
What is the purpose of singular points in fingerprint recognition?
What is the purpose of singular points in fingerprint recognition?
Signup and view all the answers
Who developed the approach using Integrated Wavelet and Fourier Mellin Transform (WFMT) for feature extraction?
Who developed the approach using Integrated Wavelet and Fourier Mellin Transform (WFMT) for feature extraction?
Signup and view all the answers
What is the result of using Multiple WFMT features?
What is the result of using Multiple WFMT features?
Signup and view all the answers
What are the two feature extraction methods presented in the text?
What are the two feature extraction methods presented in the text?
Signup and view all the answers
What is the primary purpose of the logarithmic function in the fuzzy features extraction process?
What is the primary purpose of the logarithmic function in the fuzzy features extraction process?
Signup and view all the answers
What is the size of the non-overlapping square blocks in the fuzzy features extraction process?
What is the size of the non-overlapping square blocks in the fuzzy features extraction process?
Signup and view all the answers
What is the equation for φ6 in the text?
What is the equation for φ6 in the text?
Signup and view all the answers
What is the purpose of dividing the image into non-overlapping blocks in the fuzzy features extraction process?
What is the purpose of dividing the image into non-overlapping blocks in the fuzzy features extraction process?
Signup and view all the answers
What is the equation for φ7 in the text?
What is the equation for φ7 in the text?
Signup and view all the answers
What is the main advantage of using fuzzy features and invariant moment features over minutiae-based approaches?
What is the main advantage of using fuzzy features and invariant moment features over minutiae-based approaches?
Signup and view all the answers
What is the purpose of the logarithmic function in the fingerprint recognition process?
What is the purpose of the logarithmic function in the fingerprint recognition process?
Signup and view all the answers
What is the average accuracy of the proposed system using linear, RBF, and polynomial features?
What is the average accuracy of the proposed system using linear, RBF, and polynomial features?
Signup and view all the answers
Which feature extraction method is used in the fingerprint verification system proposed by Helfroush and Mohammadpour?
Which feature extraction method is used in the fingerprint verification system proposed by Helfroush and Mohammadpour?
Signup and view all the answers
What is the accuracy of the proposed system using invariant moment features with RBF kernel?
What is the accuracy of the proposed system using invariant moment features with RBF kernel?
Signup and view all the answers
In which conference was the paper by Helfroush and Mohammadpour presented?
In which conference was the paper by Helfroush and Mohammadpour presented?
Signup and view all the answers
What is the DOI of the paper by Khalil et al.?
What is the DOI of the paper by Khalil et al.?
Signup and view all the answers
What is the title of the paper by Bharkad and Kokare?
What is the title of the paper by Bharkad and Kokare?
Signup and view all the answers
What is the degree received by Dr. Jaspreet Kour from REC (NIT) Bhopal?
What is the degree received by Dr. Jaspreet Kour from REC (NIT) Bhopal?
Signup and view all the answers
How many authors are there in the paper by Kumar et al.?
How many authors are there in the paper by Kumar et al.?
Signup and view all the answers
Study Notes
Biometrics in Cyber Security
- Biometrics is a key to the future of data/cyber security, satisfying properties such as universality, distinctiveness, permeance, and collectability.
- Fingerprint recognition is one of the oldest and mature biometric technologies, with applications in many areas.
Fingerprint Recognition
- Ridge patterns on a fingerprint surface are formed by ridges and valleys, with ridges being dark and valleys being bright.
- Ridges and valleys generally run in parallel, bifurcating, and terminating at various points.
- Minutiae are the endpoints and crossing points of ridges, and singularities are regions where ridge lines assume distinctive shapes, classified as loop, delta, and whorl.
Biometric System
- A biometric system recognizes a person using a specific physiological and/or behavioral characteristic possessed by a person.
- Biometric systems can be classified as either verification or identification systems, depending on the application.
Fingerprint Recognition Approaches
- Approaches for fingerprint recognition are divided into three categories: minutiae-based, non-minutiae-based (image-based), and hybrid systems.
- Minutiae-based approaches involve extracting a set of minutiae from fingerprints.
- Integrated wavelet and Fourier Mellin transform (WFMT) is used for feature extraction in minutiae-based approaches.
Feature Extraction
- Two set of features, namely fuzzy features and invariant moment features, are obtained from the region of interest (ROI) of the fingerprint image.
- Fuzzy features are obtained by dividing the cropped image into non-overlapping square blocks, and reducing the dynamic range of moments using a logarithmic function.
- Invariant moment features are obtained using equations (10) and (11).
Accuracy of Proposed System
- The proposed system achieved an accuracy of 75% with linear kernel, 87.5% with RBF kernel, and 77.5% with polynomial kernel using fuzzy features.
- The proposed system achieved an accuracy of 92.5% with linear kernel, 95% with RBF kernel, and 90% with polynomial kernel using invariant moment features.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This journal article from Defence Science Journal Vol. 66, No. 6, November 2016, contains metadata and citation information. Discover the details of this research paper.