Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3369114.3369118acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicaaiConference Proceedingsconference-collections
research-article

Evaluation of the Impact of Noise on Biometric Authentication Systems

Published: 21 January 2020 Publication History

Abstract

Intra-class and inter-class are considered as fundamental premise of biometric authentication systems. In order to have a good recognition rate, the biometric images must be captured from favorable conditions. Biometric trait acquisition and processing can be affected by external elements that influence the treatment and the functionality of biometric authentication systems. In effect, the performance can be degraded and the security of the biometric authentication system can be also affected. There are several factors that can affect the performance and the security of biometric systems. There are several factors that can affect the performance and the security of biometric systems. In this work the impact of noise on authentication biometric systems is evaluated. Face and fingerprint images are successively noised in order to measure the impact of the noise on the fingerprint and face biometric systems. Experiment results show that the noise degradation has an important impact on the security and the performance of different biometric authentication system; the system accepts very degraded request (that can be presented by an unknown person) and reject the real user.

References

[1]
N. K. Ratha, J. H. Connell, and R. M. Bole, 2001. "An analysis of minutiae matching strength," in Proceedings of the International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA '01), pp. 223--228, Halmstad, Sweden.
[2]
A. K. Jain, A. Ross, and U. Uludag, 2005 "Biometric template security: challenges and solutions,", in Proceedings of the 13th European Signal Processing Conference (EUSIPCO '05), pp. 1934--1937, Antalya, Turkey.
[3]
A. Nagar, K. Nandakumar, and A.K. Jain. 2010, "Biometric template transformation: a security analysis." Proc. SPIE, Electronic Imaging, Media Forensics and Security XII,
[4]
M. Theofanos, B. Stanton, R. Micheals, and S. Orandi, 2007. "Biometrics Systematic Uncertainty and the User," Proc. IEEE Conference on Biometrics: Theory, Applications and Systems, BTAS, Washington DC (USA),
[5]
F. Alonso-Fernandez, 2008 "Biometric Sample Quality and its Application to Multimodal Authentication Systems," Ph.D. dissertation, Universidad Politecnica de Madrid, Madrid, Spain, available online at http://atvs.ii.uam.es.
[6]
Alqahtani, Abdulrahman, 2014 "Evaluation of the Impact of Noise on Iris Recognition Biometric Authentication Systems". Proceedings of the International Conference on Image Processing, Computer Vision and Pattern Recognition (IPCV).
[7]
D. Cherifi, N. Radji, A. Nait-Ali, 2011 "Effect of noise, blur and motion on global appearance face recognition based methods performance"., International Journal of Computer Applications, India, V:16, N: 6, pp: 4--13.
[8]
B, Samarth and V, Mayank and S, Richa, 2014 "Biometric quality: a review of fingerprint, iris, and face", EURASIP Journal on Image and Video Processing, Springer N 1, pp: 34.
[9]
A. de Santos, C. S. Avila, G. Bailador, and J. Guerra, 2011 "Study of the effect of blurriness in image acquisition for Hand Biometrics in Mobile Devices". IEEE International Carnahan Conference on Security Technology (ICCST), pp: 1--7.
[10]
J. Wagner; A. Pflug; C. Rathgeb; C. Busch,2014. "Effects of severe signal degradation on ear detection", International Workshop on Biometrics and Forensics (IWBF).
[11]
D. A. Ramli, S. A. S. Aini Hussain, "Performances of speech signal biometric systems based on signal to noise ratio degradation", 2010. Computational Intelligence in Security for Information Systems. pp 73--80.
[12]
F. A. Fernandez1, J Fierrez, J. O.Garcia, 2012. "Quality Measures in Biometric Systems", IEEE Security and Privacy. Pp: 52--62.
[13]
A. Pflug; J. Wagner; C. Rathgeb; C. Busch, 2014 "Impact of severe signal degradation on ear recognition performance", 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[14]
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, "Handbook of Fingerprint Recognition ",2009. Springer, Berlin, Germany.
[15]
P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, "Eigenfaces vs. fishefaces: recognition using class specific linear projection", 1997. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711--720.
[16]
A. Martinez and R. Benavente, "The AR face atabase," 1998. Tech. Rep. CVC 24.
[17]
A. El-Sisi, "Design and implementation biometric access control system using fingerprint for restricted area based on Gabor filter," 2011. International Arab Journal of Information Technology, vol. 8, no. 4, pp. 355--363,
[18]
S. Arora, J. Acharya, A. Verma, and P. K. Panigrahi, 2008. "Multilevel thresholding for image segmentation through a fast statistical recursive algorithm," Pattern Recognition Letters, vol. 29, no. 2, pp. 119--125,
[19]
C. Shixiang, Jie, Zhang, G. Y, Yan. 2013 "An edge-based scale-and affine-invariant algorithm for remote sensing image registration". V:37, N:7, pp=2301--2326,

Cited By

View all
  • (2021)Acceleration of Inner-Pairing Product Operation for Secure Biometric VerificationSensors10.3390/s2108285921:8(2859)Online publication date: 19-Apr-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICAAI '19: Proceedings of the 3rd International Conference on Advances in Artificial Intelligence
October 2019
253 pages
ISBN:9781450372534
DOI:10.1145/3369114
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Northumbria University: University of Northumbria at Newcastle

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 January 2020

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICAAI 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Acceleration of Inner-Pairing Product Operation for Secure Biometric VerificationSensors10.3390/s2108285921:8(2859)Online publication date: 19-Apr-2021

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media