Salil Prabhakar

Learn More
A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer(More)
With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications, biometrics-based verification, especially fingerprint-based identification, is receiving a lot of attention. There are two major shortcomings of the traditional approaches to fingerprint(More)
Fingerprint classification provides an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for a large database. We present a fingerprint classification algorithm which is able to achieve an accuracy better than previously reported in the literature. We classify(More)
In traditional cryptosystems, user authentication is based on possession of secret keys, which falls apart if the keys are not kept secret (i.e., shared with nonlegitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide nonrepudiation. Current authentication systems based on physiological and behavioral characteristics of(More)
Reliable person identification is an important problem in diverse businesses. Biometrics, identification based on distinctive personal traits, has the potential to become an irreplaceable part of any identification system. While successful in some niche markets, the biometrics technology has not yet delivered its promise of foolproof automatic(More)
Integration of various ®ngerprint matching algorithms is a viable method to improve the performance of a ®ngerprint veri®cation system. Di€erent ®ngerprint matching algorithms are often based on di€erent representations of the input ®ngerprints and hence complement each other. We use the logistic transform to integrate the output scores from three di€erent(More)