Defence Science Journal: Citation and Metadata

SplendidDramaticIrony3552 avatar
SplendidDramaticIrony3552
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What is the primary concern in today's digital age?

Assurance of security in online services

What role do computers play in our daily lives?

They play an important role

What is the key to the future of data/cyber security?

Biometrics

Where is the Galgotias College of Engineering and Technology located?

Greater Noida

Who is the corresponding author of the paper?

A. Q. Ansari

What is the volume number of the Defence Science Journal?

66

What is the DOI of the paper?

10.14429/dsj.66.10800

In what year was the paper published?

2016

What is a major concern in today's digital world?

Cyber security

What is a key application of biometric technology?

Online banking

What are the endpoints and crossing points of ridges in a fingerprint called?

Minutiae

What is a characteristic of fingerprint recognition?

Universality

What is the pattern formed by ridges and valleys on a fingertip?

Parallel

What is the primary purpose of using biometric technology in banking?

To authenticate transactions

What is a type of biometric technology that is used to unlock computers or phones?

All of the above

What is the term used to describe the desirable properties of a biometric modality?

All of the above

What is the primary function of a biometric system?

To recognise a person using a specific physiological characteristic

What is the term used to describe the point where three ridges meet in a fingerprint?

Delta

What is the main purpose of a verification system in biometrics?

To compare a test biometric characteristic with a stored one

What is the name of the approach that combines minutiae and non-minutiae based methods?

Hybrid system

What is the term used to describe a set of extracted features from a fingerprint?

Feature vector

What is the purpose of singular points in fingerprint recognition?

To align fingerprints

Who developed the approach using Integrated Wavelet and Fourier Mellin Transform (WFMT) for feature extraction?

Jin, et al.

What is the result of using Multiple WFMT features?

A set of reference invariant features

What are the two feature extraction methods presented in the text?

Fuzzy features and invariant moment features

What is the primary purpose of the logarithmic function in the fuzzy features extraction process?

To reduce the dynamic range of the moments

What is the size of the non-overlapping square blocks in the fuzzy features extraction process?

W x W

What is the equation for φ6 in the text?

(η20 − η02 )(η30 + η12 )

What is the purpose of dividing the image into non-overlapping blocks in the fuzzy features extraction process?

To divide the image into smaller regions for feature extraction

What is the equation for φ7 in the text?

(3η21 − η03 )(η30 + η12 )

What is the main advantage of using fuzzy features and invariant moment features over minutiae-based approaches?

They are more robust to noise and variation

What is the purpose of the logarithmic function in the fingerprint recognition process?

To reduce the dynamic range of the moments

What is the average accuracy of the proposed system using linear, RBF, and polynomial features?

91.25%

Which feature extraction method is used in the fingerprint verification system proposed by Helfroush and Mohammadpour?

Non-minutiae based approach

What is the accuracy of the proposed system using invariant moment features with RBF kernel?

95%

In which conference was the paper by Helfroush and Mohammadpour presented?

International Conference on Computer, Control and Communication

What is the DOI of the paper by Khalil et al.?

10.1016/j.dsp.2009.12.002

What is the title of the paper by Bharkad and Kokare?

Hartley Transform Based Fingerprint Matching

What is the degree received by Dr. Jaspreet Kour from REC (NIT) Bhopal?

B.Tech

How many authors are there in the paper by Kumar et al.?

4

Study Notes

Biometrics in Cyber Security

  • Biometrics is a key to the future of data/cyber security, satisfying properties such as universality, distinctiveness, permeance, and collectability.
  • Fingerprint recognition is one of the oldest and mature biometric technologies, with applications in many areas.

Fingerprint Recognition

  • Ridge patterns on a fingerprint surface are formed by ridges and valleys, with ridges being dark and valleys being bright.
  • Ridges and valleys generally run in parallel, bifurcating, and terminating at various points.
  • Minutiae are the endpoints and crossing points of ridges, and singularities are regions where ridge lines assume distinctive shapes, classified as loop, delta, and whorl.

Biometric System

  • A biometric system recognizes a person using a specific physiological and/or behavioral characteristic possessed by a person.
  • Biometric systems can be classified as either verification or identification systems, depending on the application.

Fingerprint Recognition Approaches

  • Approaches for fingerprint recognition are divided into three categories: minutiae-based, non-minutiae-based (image-based), and hybrid systems.
  • Minutiae-based approaches involve extracting a set of minutiae from fingerprints.
  • Integrated wavelet and Fourier Mellin transform (WFMT) is used for feature extraction in minutiae-based approaches.

Feature Extraction

  • Two set of features, namely fuzzy features and invariant moment features, are obtained from the region of interest (ROI) of the fingerprint image.
  • Fuzzy features are obtained by dividing the cropped image into non-overlapping square blocks, and reducing the dynamic range of moments using a logarithmic function.
  • Invariant moment features are obtained using equations (10) and (11).

Accuracy of Proposed System

  • The proposed system achieved an accuracy of 75% with linear kernel, 87.5% with RBF kernel, and 77.5% with polynomial kernel using fuzzy features.
  • The proposed system achieved an accuracy of 92.5% with linear kernel, 95% with RBF kernel, and 90% with polynomial kernel using invariant moment features.

This journal article from Defence Science Journal Vol. 66, No. 6, November 2016, contains metadata and citation information. Discover the details of this research paper.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Chemical Science Journal Scope Quiz
10 questions
Scientific Research Articles Quiz
5 questions
Tema 4
10 questions

Tema 4

PhenomenalCombination avatar
PhenomenalCombination
Estructura y Calidad de Artículos Científicos
12 questions
Use Quizgecko on...
Browser
Browser