Learn More
Facial recognition is one of the most studied topics in the field of biometrics because of its varied applications. Detection of dark colored faces and poorly illuminated faces are not well studied in the literature due to several challenges. The most critical challenge is that there is inadequate contrast among facial features. To overcome this challenge,(More)
A biometric system is basically a pattern recognition system. Biometrics based user authentication system serve as a reliable means for meeting the challenges in today's world of information and network security. It has gained enormous interest by scientists and researchers. Unimodal biometric systems that employ only a single biometric trait fails to(More)
Biometrics is the science of the measurement of unique human characteristics, both physical and behavioral. Various biometric technologies are available for identifying or verifying an individual by measuring fingerprint, hand, face, signature, voice, or a combination of these traits. This paper aims to assist readers as they consider biometric solutions by(More)
  • Qinghan Xiao
  • 2005
User authentication is fundamental to the protection of information systems. It is the first and most critical link in the security chain that restricts access to system and data resources to legitimate users only. The advantages of using biometrics to verify a person's identity over using passwords or tokens have been broadly presented. However, recent(More)
Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID(More)
Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural characteristics, the technology has been used to verify the identity of computer or network users. Given today's heightened security requirements(More)
This paper presents a novel approach for fingerprint binarization. The motivation is to simulate the human exercise that distinguishes ridges from valleys in uniform areas. An algorithm for performing such a region generation on fingerprint images is presented, and a data structure for saving generated regions is developed. Thresholding and binarization is(More)