Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Faisal Farooq
  • Topi, North-West Frontier, Pakistan
The security, lack of anonymity and revocability of the biometric template are critical issues that need to be addressed in order to vindicate the viability of biometric based authentication systems. Several methods have been proposed to... more
The security, lack of anonymity and revocability of the biometric template are critical issues that need to be addressed in order to vindicate the viability of biometric based authentication systems. Several methods have been proposed to address these problems. However, most of these methods offer lower accuracies than the base system where the template is insecure. This is because in most systems the gain in the security is achieved as a result of loss in non-redundant information. In this paper, we describe tradeoff between accuracy of an anonymous system and the security of the biometrics system. As a case study we start with a highly secure representation of a fingerprint. Then we describe several methods and show experimental results proving that every time we add more information to the secure representation, the accuracy increases, however valuable information is revealed to an adversary. We propose, via a k-trial attack model, how the trade-off can be complemented by another security policy such as an account lockout after a given number of attempts.
... best of our knowledge, this is the first linear, anonymous and revocable fingerprint representation that is ... Instead of plain biometrics, this requires cancelable (also known as revocable) and private biomet ... paper presents a... more
... best of our knowledge, this is the first linear, anonymous and revocable fingerprint representation that is ... Instead of plain biometrics, this requires cancelable (also known as revocable) and private biomet ... paper presents a technique for converting a fin-gerprint into a binary-string ...
The security, lack of anonymity and revocability of the biometric template are critical issues that need to be addressed in order to vindicate the viability of biometric based authentication systems. Several methods have been proposed to... more
The security, lack of anonymity and revocability of the biometric template are critical issues that need to be addressed in order to vindicate the viability of biometric based authentication systems. Several methods have been proposed to address these problems. However, most of these methods offer lower accuracies than the base system where the template is insecure. This is because in most systems the gain in the security is achieved as a result of loss in non-redundant information. In this paper, we describe tradeoff between accuracy of an anonymous system and the security of the biometrics system. As a case study we start with a highly secure representation of a fingerprint. Then we describe several methods and show experimental results proving that every time we add more information to the secure representation, the accuracy increases, however valuable information is revealed to an adversary. We propose, via a k-trial attack model, how the trade-off can be complemented by another security policy such as an account lockout after a given number of attempts.
... best of our knowledge, this is the first linear, anonymous and revocable fingerprint representation that is ... Instead of plain biometrics, this requires cancelable (also known as revocable) and private biomet ... paper presents a... more
... best of our knowledge, this is the first linear, anonymous and revocable fingerprint representation that is ... Instead of plain biometrics, this requires cancelable (also known as revocable) and private biomet ... paper presents a technique for converting a fin-gerprint into a binary-string ...
Automatic language identification is an important step prior to optical character recognition (OCR). In this paper we present a system to discriminate between Arabic and Persian in historical Afghan manuscripts. The classification is... more
Automatic language identification is an important step prior to optical character recognition (OCR). In this paper we present a system to discriminate between Arabic and Persian in historical Afghan manuscripts. The classification is performed at a sub-sentence level. We propose a feature extraction algorithm for a sub-sentence based on Gabor filters followed by classification using a support vector machine (SVM). An overall precision of 96.72% and 94.90% is obtained for Persian and Arabic respectively.
Despite several decades of research in document analysis, recognition of unconstrained handwritten documents is still considered a challenging task. Previous research in this area has shown that word recognizers perform adequately on... more
Despite several decades of research in document analysis, recognition of unconstrained handwritten documents is still considered a challenging task. Previous research in this area has shown that word recognizers perform adequately on constrained handwritten documents which typically use a restricted vocabulary (lexicon). But in the case of unconstrained handwritten documents, state-of-the-art word recognition accuracy is still below the acceptable limits. The objective of this research is to improve word recognition accuracy on unconstrained handwritten documents by applying a post-processing or OCR correction technique to the word recognition output. In this paper, we present two different methods for this purpose. First, we describe a lexicon reduction-based method by topic categorization of handwritten documents which is used to generate smaller topic-specific lexicons for improving the recognition accuracy. Second, we describe a method which uses topic-specific language models and a maximum-entropy based topic categorization model to refine the recognition output. We present the relative merits of each of these methods and report results on the publicly available IAM database.
Research Interests:
The possibility that a biometric database is compromised is one of the main concerns in implementing biometric identification systems. The compromise of a biometric renders it permanently useless. In this paper we present a method of... more
The possibility that a biometric database is compromised is one of the main concerns in implementing biometric identification systems. The compromise of a biometric renders it permanently useless. In this paper we present a method of hashing fingerprint minutia information and performing fingerprint identification in a new space. Only hashed data is transmitted and stored in the server database, and it is not possible to restore fingerprint minutia locations using hashed data. We also present a performance analysis of the proposed algorithm.
Abstract Despite several decades of research in document analysis, recognition of unconstrained handwritten documents is still considered a challenging task. Previous research in this area has shown that word recognizers produce... more
Abstract Despite several decades of research in document analysis, recognition of unconstrained handwritten documents is still considered a challenging task. Previous research in this area has shown that word recognizers produce reasonably clean output when used with a restricted lexicon. But in absence of such a restricted lexicon, the output of an unconstrained handwritten word recognizer is noisy. The objective of this research is to process noisy recognizer output and eliminate spurious recognition choices using a topic ...
In this paper we present a system for classification of machine printed and handwritten text in mixed documents. The classification is performed at the word level. We propose a feature extraction algorithm for each word image based on... more
In this paper we present a system for classification of machine printed and handwritten text in mixed documents. The classification is performed at the word level. We propose a feature extraction algorithm for each word image based on Gabor filters followed by classification using an expectation maximization (EM) based probabilistic neural network that reduces overfitting of training data. An overall precision of 94.62% was obtained for the Arabic script using the modified neural network. The accuracies obtained using a simple backpropagation neural network and an SVM were 83.33% and 90.26% respectively
Minutiae based fingerprint matching algorithms are wildly used in fingerprint identification and verification applications. However, they may suffer from spurious matches because they do not use the rich local image information. In this... more
Minutiae based fingerprint matching algorithms are wildly used in fingerprint identification and verification applications. However, they may suffer from spurious matches because they do not use the rich local image information. In this paper, we extend minutiae based methods to incorporate such local image information. Our method uses local mutual information, a proven similarity measure in various applications, to improve the matching rate. The overall minutiae distribution pattern between two fingerprints is represented by the initial minutiae matching result, while the mutual information measures the similarity between neighborhoods of matched minutiae, thus enhancing the final matching decision. FVC2002 DB1 and DB3 databases are used to test the proposed approach. Experimental result shows the improvement when combining minutiae matching scores with mutual information scores.
Despite several decades of research in handwriting recognition, the goal of having computers access handwritten information from unconstrained document images is still elusive. Current handwriting recognition systems are only capable of... more
Despite several decades of research in handwriting recognition, the goal of having computers access handwritten information from unconstrained document images is still elusive. Current handwriting recognition systems are only capable of recognizing words that are present in a restricted lexicon typically comprised of 10 to 1000 words. As the size of the lexicon grows, the recognition accuracy falls sharply and is reported to be around 30% for a10K word lexicon.  The objective of this research is to raise the accuracy levels on unconstrained handwritten documents by reducing the size of lexicons. We present an innovative method of lexicon reduction by topic categorization of handwritten documents. After categorization of a document into a topic e.g. sports, science etc. we use smaller lexicons that include only words with high mutual information with that topic and hence increase performance of recognizers. In this paper we present different techniques and report results on a publicly available dataset.
Research Interests:
Page 1. Pre-processing Methods for Handwritten Arabic Documents Faisal Farooq University at Buffalo 520 Lee Entrance, Suite 202 Amherst, NY, 14221, USA ffarooq2@cedar.buffalo.edu Venu Govindaraju University at Buffalo ...
We present methodologies for three important tasks that will eventually enable digital access of multilingual Indian document images. First, we describe several document image analysis techniques necessary to prepare Devanagari document... more
We present methodologies for three important tasks that will eventually enable digital access of multilingual Indian document images. First, we describe several document image analysis techniques necessary to prepare Devanagari document images for OCR. The second task is OCR for machine printed Devanagari words without the help of a lexicon. We describe the OCR methodology and show how it is being extended to other Indian languages. Finally, we describe a versatile platform that facilitates automatic segmentation of document images in multiple Indian languages and an interface to capture the ground truth corresponding to the text. We use transliterated English text and virtual keyboards in a range of Indian languages for this purpose. The multilingual data entry capabilities of the tool and its underlying UNICODE data representation within a structured XML document also allow users to annotate passages of text in one language in other languages using a markup scheme to switch between scripts. Text and annotations are rendered in the appropriate scripts as the text is being annotated, thus providing users prompt and natural feedback. The XML back-end allows meta-data to be recorded describing the annotated document.