Dissertations / Theses on the topic 'Biometics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Canavan, Shaun J. "Face Recognition by Multi-Frame Fusion of Rotating Heads in Videos." Youngstown State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1210446052.
Full textFouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.
Full textSumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.
Full textPh.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
Silva, Edson Tenório da. "Análise de crescimento e produtividade de duas variedades de cana-de-açúcar (Saccharum spp) influenciadas por doses de fósforo." Universidade Federal de Alagoas, 2007. http://repositorio.ufal.br/handle/riufal/201.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
O conhecimento da área foliar se faz necessário toda vez em que a cana-deaçúcar é submetida a avaliações, onde se comparam variedades diferentes, ou submete-as a condições ambientais, manejo ou de adubação diferentes, que possam manifestar notadamente alterações nas dimensões das folhas das plantas influindo no processo fotossintético. Maior balanço fotossínteserespiração, aumenta a quantidade de assimilados disponíveis para o crescimento vegetal (Taxa de assimilação líquida), entretanto, a alocação preferencial de carbono pelas diferentes frações da planta-folha, colmos e sistema radicular, condicionada pelo meio e/ou manejo, pode alterar os índices de crescimento. Desta forma, as estimativas desses índices podem fornecer subsídios para o entendimento das adaptações experimentadas pelas plantas sob diferentes condições de meio: luz, temperatura, umidade e fertilidade do solo. A análise do crescimento é considerada um método padrão pois se baseia fundamentalmente no fato de que cerca de 95%, em média, da matéria seca acumulada pelas plantas, ao longo do seu crescimento, resultam da atividade fotossintética (Benincasa, 2003). O restante provém da absorção de nutrientes minerais. Embora em quantidades de menor expressão, os nutrientes minerais são indispensável ao crescimento desenvolvimento vegetal, visto que os mesmos são absorvidos e incorporados em toda biomassa vegetal. Estes participam direta ou indiretamente na produção de compostos orgânicos, bem como de sacarose, que é produzida a partir de trioses-fosfatos transportadas do cloroplasto para o citossol é exportada principalmente para os vacúolos. O presente trabalho teve como objetivo estudar métodos de estimativa de área foliar, densidade populacional, crescimento e a produção de duas variedades de cana-de-açúcar de alto potencial produtivo adubadas com diferentes doses de fósforo, em ciclo de cana planta. O delineamento foi em blocos casualizados com cinco repetições em esquema fatorial 2 x 6, sendo os tratamentos compostos pelas variedades RB867515 e RB92579 sob seis doses de P (0, 30, 60, 90, 120 e 150 kg ha-1). Por ocasião do plantio, todas as parcelas receberam quantidades equivalentes a 33 e 200 kg ha-1 de N e K, respectivamente. No início do período chuvoso, aos 210 DAP, realizou-se a adubação de cobertura e adubação com micronutrientes nas doses de 67; 6; 6; e 7 kg ha-1 de N, Cu, Mn e Zn, respectivamente, ao longo da linha da cultura. Foram realizadas nove avaliações com coletas de plantas em 2,4 m2, em intervalos médios de 30 dias, para estimativas da área foliar, por dois métodos, da população de plantas e do acúmulo de matéria seca nas ativas folhas fotossinteticamente e em toda planta. A décima amostragem foi realizada aos 458 DAP para determinar a produção de sacarose aparente. De posse dos dados realizou-se a análise estatística por meio do programa SISVAR. A estimativa de área foliar apenas com utilização da folha +3, constitui-se em uma alternativa ao método convencional de estimativa, na determinação da área foliar para a cultura da cana-de-açúcar. O aumento da adubação fosfatada contribui com o incremento de área foliar na cultura da cana-de-açúcar, sobretudo para a variedade RB92579. A adubação fosfatada influenciou grandemente no índice de área foliar (IAF), acúmulo de matéria seca na planta, taxa de crescimento da cultura (TCC), taxa de crescimento relativo (TCR), taxa de assimilação líquida (TAL), e produção de colmos e de sacarose. Os maiores IAF e TCC, ocorreram no período de 280 a 310 DAP, tendo a variedade RB92579 apresentada valores maiores. A variedade RB92579, apresentou maiores produções de matéria seca, colmos industrializáveis e sacarose aparente.
Hortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.
Full textSamangooei, Sina. "Semantic biometrics." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/153901/.
Full textSanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.
Full textGreen, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.
Full textDimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.
Full textNowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.
Goswani, B. "Lip-based behavioural biometrics." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533201.
Full textPintro, Fernando. "Comit?s de Classificadores para o Reconhecimento Multibiom?trico em Dados Biom?tricos Revog?veis." Universidade Federal do Rio Grande do Norte, 2013. http://repositorio.ufrn.br:8080/jspui/handle/123456789/18691.
Full textThis work discusses the application of techniques of ensembles in multimodal recognition systems development in revocable biometrics. Biometric systems are the future identification techniques and user access control and a proof of this is the constant increases of such systems in current society. However, there is still much advancement to be developed, mainly with regard to the accuracy, security and processing time of such systems. In the search for developing more efficient techniques, the multimodal systems and the use of revocable biometrics are promising, and can model many of the problems involved in traditional biometric recognition. A multimodal system is characterized by combining different techniques of biometric security and overcome many limitations, how: failures in the extraction or processing the dataset. Among the various possibilities to develop a multimodal system, the use of ensembles is a subject quite promising, motivated by performance and flexibility that they are demonstrating over the years, in its many applications. Givin emphasis in relation to safety, one of the biggest problems found is that the biometrics is permanently related with the user and the fact of cannot be changed if compromised. However, this problem has been solved by techniques known as revocable biometrics, which consists of applying a transformation on the biometric data in order to protect the unique characteristics, making its cancellation and replacement. In order to contribute to this important subject, this work compares the performance of individual classifiers methods, as well as the set of classifiers, in the context of the original data and the biometric space transformed by different functions. Another factor to be highlighted is the use of Genetic Algorithms (GA) in different parts of the systems, seeking to further maximize their eficiency. One of the motivations of this development is to evaluate the gain that maximized ensembles systems by different GA can bring to the data in the transformed space. Another relevant factor is to generate revocable systems even more eficient by combining two or more functions of transformations, demonstrating that is possible to extract information of a similar standard through applying different transformation functions. With all this, it is clear the importance of revocable biometrics, ensembles and GA in the development of more eficient biometric systems, something that is increasingly important in the present day
O presente trabalho aborda a aplica??o de t?cnicas de comit?s de classificadores no desenvolvimento de sistemas de reconhecimento multimodais em biometrias revog?veis. Sistemas biom?tricos s?o o futuro das t?cnicas de identifica??o e controle de acesso de usu?rios, prova disso, s?o os aumentos constantes de tais sistemas na sociedade atual. Por?m, ainda existem muitos avan?os a serem desenvolvidos, principalmente no que se refere ? acur?cia, seguran?a e tempo de processamento de tais sistemas. Na busca por desenvolver t?cnicas mais eficientes, os sistemas multimodais e a utiliza??o de biometrias revog?veis mostram-se promissores, podendo contornar muitos dos problemas envolvidos no reconhecimento biom?trico tradicional. Um sistema multimodal ? caracterizado por combinar diferentes t?cnicas de seguran?a biom?trica e com isso, superar muitas limita- ??es, como: falhas de extra??o ou processamento dos dados. Dentre as v?rias possibilidades de se desenvolver um sistema multimodal, a utiliza??o de comit?s de classificadores ? um assunto bastante promissor, motivado pelo desempenho e flexibilidade que os mesmos v?m demonstrando ao longo dos anos, em suas in?meras aplica??es. Dando ?nfase em rela- ??o ? seguran?a, um dos maiores problemas encontrados se deve as biometrias estarem relacionadas permanentemente com o usu?rio e o fato de n?o poderem ser alteradas caso comprometidas. No entanto, esse problema vem sendo solucionado por t?cnicas conhecidas como biometrias revog?veis, as quais consistem em aplicar uma transforma??o sobre os dados biom?tricos de forma a proteger as caracter?sticas originais, possibilitando seu cancelamento e substitui??o. Com o objetivo de contribuir com esse importante tema, esse trabalho compara o desempenho de m?todos de classifica??es individuais, bem como conjunto de classificadores, no contexto dos dados originais e no espa?o biom?trico transformado por diferentes fun??es. Outro fator a se destacar, ? o uso de Algoritmos Gen?ticos (AGs) em diferentes partes dos sistemas, buscando maximizar ainda mais a efici?ncia dos mesmos. Uma das motiva??es desse desenvolvimento ? avaliar o ganho que os sistemas de comit?s maximizados por diferentes AGs podem trazer aos dados no espa?o transformado. Tamb?m busca-se gerar sistemas revog?veis ainda mais eficientes, atrav?s da combina??o de duas ou mais fun??es de transforma??o revog?veis, demonstrando que ? poss?vel extrair informa??es complementares de um mesmo padr?o atrav?s de tais procedimentos. Com tudo isso, fica claro a import?ncia das biometrias revog?veis, comit?s de classificadores e AGs, no desenvolvimento de sistemas biom?tricos mais eficientes, algo que se mostra cada vez mais importante nos dias atuais
Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.
Full textMikaelyan, Anna. "Compact orientation and frequency estimation with applications in biometrics : Biometrics on the orientation express." Doctoral thesis, Högskolan i Halmstad, CAISR Centrum för tillämpade intelligenta system (IS-lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28205.
Full textZahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.
Full textAriyanto, Gunawan. "Model-based 3D gait biometrics." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/352080/.
Full textReid, Daniel. "Human identification using soft biometrics." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/352293/.
Full textSyed, Idrus Syed Zulkarnain. "Soft biometrics for keystroke dynamics." Caen, 2014. http://www.theses.fr/2014CAEN2024.
Full textAt present, there are a number of usages of biometric systems for many specific purposes such as physical access control, attendance monitoring, electronic payment (e-payment) and others. This PhD thesis focuses on biometric authentication and we propose to use keystroke dynamics in order to avoid password-based authentication problems. Keystroke dynamics measures the rhythm a person exhibits while typing on a keyboard. In this sense, keystroke dynamics is a behavioral biometric modality, as well as signature dynamics, gait and voice. Among the advantages of keystroke dynamics in comparison to other modalities, we can mention that it is a low cost and usable modality: indeed, no extra sensor or device is required and users often type a password. The counterpart to these advantages is the worse performance compared to morphological biometric modalities such as fingerprint, face or iris. The rather worse performances of keystroke dynamics can be explained by the high intra-class variability of the users' behaviour. One way to handle this variability is to take into account additional information in the decision process. This can be done with: (i) multibiometrics (by combining keystroke and another modality); (ii) optimising the enrolment step (a template is stored as reference only if its quality level is sufficient); or (iii) with a new and promising solution: soft biometrics (profiling the user). We address in this PhD thesis these two last aspects. We propose several contributions in order to enhance the performance of keystroke dynamics systems. First, we created a benchmark dataset called 'GREYC-NISLAB Keystroke' with biometric data collection from 110 users in France and Norway. This new benchmark database is available to the international scientific community and contains some profiling information on users: the way of typing (one hand or two hands), gender, age and handedness. We then perform various studies in order to determine the recognition accuracy of soft biometric traits given keystroke dynamics features: (i) the way of typing (one hand or two hands); (ii) gender (male or female); (iii) age class (below 30 or 30 and above); and (iv) handedness (right-handed or left-handed). Subsequently, we study the biometric fusion with keystroke dynamics in order to increase the soft biometrics recognition performance. Finally, by combining the authentication process with soft criteria, we present an improvement of user verification. The results of our experiments show the benefits of the proposed methods
Youmaran, Richard. "Algorithms to Process and Measure Biometric Information Content in Low Quality Face and Iris Images." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19729.
Full textLease, David R. "Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers." Diss., Capella University, 2005. http://hdl.handle.net/10919/71576.
Full textAlsaade, Fawaz. "Score-level fusion for multimodal biometrics." Thesis, University of Hertfordshire, 2008. http://hdl.handle.net/2299/1364.
Full textPillay, Surosh Govindasamy. "Voice biometrics under mismatched noise conditions." Thesis, University of Hertfordshire, 2011. http://hdl.handle.net/2299/5531.
Full textRankin, Deborah M. "Automated image analysis of Iris biometrics." Thesis, University of Ulster, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.587480.
Full textDrosou, Anastasios. "Activity related biometrics for person authentication." Thesis, Imperial College London, 2013. http://hdl.handle.net/10044/1/23659.
Full textFortuna, JoseÌ. "Speaker indexing based on voice biometrics." Thesis, University of Hertfordshire, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427534.
Full textPisani, Paulo Henrique. "Biometrics in a data stream context." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.
Full textA crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
Kruszynski, Joshua A. "Biometrics in Interaction and Interface Design." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1468694579.
Full textHoleksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.
Full textEl, Seuofi Sherif M. "Performance Evaluation of Face Recognition Using Frames of Ten Pose Angles." Youngstown State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1198184813.
Full textGancarčík, Lukáš. "Vicefaktorová autentizace elektronických dokumentů." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224008.
Full textBaig, Asim. "Biometric fusion frameworks." Thesis, Queen's University Belfast, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.534635.
Full textRibeiro, Pedro Miguel dos Santos. "Análise de tendências populacionais e demografia de passeriformes através de dados de anilhagem científica." Master's thesis, Universidade de Évora, 2019. http://hdl.handle.net/10174/26422.
Full textZheng, Nan. "Exploiting behavioral biometrics for user security enhancements." W&M ScholarWorks, 2014. https://scholarworks.wm.edu/etd/1539623640.
Full textHurley, David J. "Force field feature extraction for ear biometrics." Thesis, University of Southampton, 2001. https://eprints.soton.ac.uk/256792/.
Full textVogel, Robin. "Similarity ranking for biometrics : theory and practice." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT031.
Full textThe rapid growth in population, combined with the increased mobility of people has created a need for sophisticated identity management systems.For this purpose, biometrics refers to the identification of individuals using behavioral or biological characteristics. The most popular approaches, i.e. fingerprint, iris or face recognition, are all based on computer vision methods. The adoption of deep convolutional networks, enabled by general purpose computing on graphics processing units, made the recent advances incomputer vision possible. These advances have led to drastic improvements for conventional biometric methods, which boosted their adoption in practical settings, and stirred up public debate about these technologies. In this respect, biometric systems providers face many challenges when learning those networks.In this thesis, we consider those challenges from the angle of statistical learning theory, which leads us to propose or sketch practical solutions. First, we answer to the proliferation of papers on similarity learningfor deep neural networks that optimize objective functions that are disconnected with the natural ranking aim sought out in biometrics. Precisely, we introduce the notion of similarity ranking, by highlighting the relationship between bipartite ranking and the requirements for similarities that are well suited to biometric identification. We then extend the theory of bipartite ranking to this new problem, by adapting it to the specificities of pairwise learning, particularly those regarding its computational cost. Usual objective functions optimize for predictive performance, but recentwork has underlined the necessity to consider other aspects when training a biometric system, such as dataset bias, prediction robustness or notions of fairness. The thesis tackles all of those three examplesby proposing their careful statistical analysis, as well as practical methods that provide the necessary tools to biometric systems manufacturers to address those issues, without jeopardizing the performance of their algorithms
Allen, Anthony W. Jr. "Young Adult Perception and Acceptance of Biometrics." Youngstown State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1363891122.
Full textSaevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.
Full textAlorf, Abdulaziz Abdullah. "Primary/Soft Biometrics: Performance Evaluation and Novel Real-Time Classifiers." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96942.
Full textDoctor of Philosophy
The relevance of faces in our daily lives is indisputable. We learn to recognize faces as newborns, and faces play a major role in interpersonal communication. Faces probably represent the most accurate biometric trait in our daily interactions. Thereby, it is not singular that so much effort from computer vision researchers have been invested in the analysis of faces. The automatic detection and analysis of faces within images has therefore received much attention in recent years. The spectrum of computer vision research about face analysis includes, but is not limited to, face detection and facial attribute classification, which are the focus of this dissertation. The face is a primary biometric because by itself revels the subject's identity, while facial attributes (such as hair color and eye state) are soft biometrics because by themselves they do not reveal the subject's identity. Soft biometrics have many uses in the field of biometrics such as (1) they can be utilized in a fusion framework to strengthen the performance of a primary biometric system. For example, fusing a face with voice accent information can boost the performance of the face recognition. (2) They also can be used to create qualitative descriptions about a person, such as being an "old bald male wearing a necktie and eyeglasses." Face detection and facial attribute classification are not easy problems because of many factors, such as image orientation, pose variation, clutter, facial expressions, occlusion, and illumination, among others. In this dissertation, we introduced novel techniques to classify more than 40 facial attributes in real-time. Our techniques followed the general facial attribute classification pipeline, which begins by detecting a face and ends by classifying facial attributes. We also introduced a new facial attribute related to Middle Eastern headwear along with its detector. The new facial attribute were fused with a face detector to improve the detection performance. In addition, we proposed a new method to evaluate the robustness of face detection, which is the first process in the facial attribute classification pipeline. Detecting the states of human facial attributes in real time is highly desired by many applications. For example, the real-time detection of a driver's eye state (open/closed) can prevent severe accidents. These systems are usually called driver drowsiness detection systems. For classifying 40 facial attributes, we proposed a real-time model that preprocesses faces by localizing facial landmarks to normalize faces, and then crop them based on the intended attribute. The face was cropped only if the intended attribute is inside the face region. After that, 7 types of classical and deep features were extracted from the preprocessed faces. Lastly, these 7 types of feature sets were fused together to train three different classifiers. Our proposed model yielded 91.93% on the average accuracy outperforming 7 state-of-the-art models. It also achieved state-of-the-art performance in classifying 14 out of 40 attributes. We also developed a real-time model that classifies the states of three human facial attributes: (1) eyes (open/closed), (2) mouth (open/closed), and (3) eyeglasses (present/absent). Our proposed method consisted of six main steps: (1) In the beginning, we detected the human face. (2) Then we extracted the facial landmarks. (3) Thereafter, we normalized the face, based on the eye location, to the full frontal view. (4) We then extracted the regions of interest (i.e., the regions of the mouth, left eye, right eye, and eyeglasses). (5) We extracted low-level features from each region and then described them. (6) Finally, we learned a binary classifier for each attribute to classify it using the extracted features. Our developed model achieved 30 FPS with a CPU-only implementation, and our eye-state classifier achieved the top performance, while our mouth-state and glasses classifiers were tied as the top performers with deep learning classifiers. We also introduced a new facial attribute related to Middle Eastern headwear along with its detector. After that, we fused it with a face detector to improve the detection performance. The traditional Middle Eastern headwear that men usually wear consists of two parts: (1) the shemagh or keffiyeh, which is a scarf that covers the head and usually has checkered and pure white patterns, and (2) the igal, which is a band or cord worn on top of the shemagh to hold it in place. The shemagh causes many unwanted effects on the face; for example, it usually occludes some parts of the face and adds dark shadows, especially near the eyes. These effects substantially degrade the performance of face detection. To improve the detection of people who wear the traditional Middle Eastern headwear, we developed a model that can be used as a head detector or combined with current face detectors to improve their performance. Our igal detector consists of two main steps: (1) learning a binary classifier to detect the igal and (2) refining the classier by removing false positives. Due to the similarity in real-life applications, we compared the igal detector with state-of-the-art face detectors, where the igal detector significantly outperformed the face detectors with the lowest false positives. We also fused the igal detector with a face detector to improve the detection performance. Face detection is the first process in any facial attribute classification pipeline. As a result, we reported a novel study that evaluates the robustness of current face detectors based on: (1) diffraction blur, (2) image scale, and (3) the IoU classification threshold. This study would enable users to pick the robust face detector for their intended applications. Biometric systems that use face detection suffer from huge performance fluctuation. For example, users of biometric surveillance systems that utilize face detection sometimes notice that state-of-the-art face detectors do not show good performance compared with outdated detectors. Although state-of-the-art face detectors are designed to work in the wild (i.e., no need to retrain, revalidate, and retest), they still heavily depend on the datasets they originally trained on. This condition in turn leads to variation in the detectors' performance when they are applied on a different dataset or environment. To overcome this problem, we developed a novel optics-based blur simulator that automatically introduces the diffraction blur at different image scales/magnifications. Then we evaluated different face detectors on the output images using different IoU thresholds. Users, in the beginning, choose their own values for these three settings and then run our model to produce the efficient face detector under the selected settings. That means our proposed model would enable users of biometric systems to pick the efficient face detector based on their system setup. Our results showed that sometimes outdated face detectors outperform state-of-the-art ones under certain settings and vice versa.
Ellmauthaler, Andreas, and Eric Wernsperger. "Biometric Identification of Mice." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.
Full textThe identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.
In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.
Out of 20 mice, 18 could be identified successfully using the proposed algorithm.
Abboud, Ali Jassim. "Quality aware adaptive biometric." Thesis, University of Buckingham, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.544109.
Full textSigurnjak, S. K. "Biometric verification using gait." Thesis, Manchester Metropolitan University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.592681.
Full textMoore, Todd M. "Biometric borders and counterterrorism." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5097.
Full textThis thesis investigates the ties between biometrics and state security by analyzing biometric identification and screening programs, their structural elements, and ultimately their effectiveness. Although biometric identification is rapidly becoming an international norm, quantitative assessments of biometric identification programs within the larger context of state and international security are non-existent. This thesis discusses the idea of identity, defines the identity problem, addresses identity's role in state security, and addresses how biometric identification contributes to this end. Individual characteristics of the most prominently used biometric identifiers are discussed in detail (face, fingerprint, and iris), as well as the overall concept of biometric identification. The ICAO e-Passport program and the U.S. specific screening functions are presented to illuminate how biometric identifiers are used in practical applications. These programs, in turn, serve as the basis for the investigation of the effectiveness of biometric identification as it pertains to state security, focusing first on U.S. immigration and then on the broader context of international terrorism. Biometric identification has been largely credited with producing tangible security gains. This thesis seeks to tie a quantitative measure to that assertion and generate future discussion about the merits of biometrically based identification and screening.
Schwartz, Benjamin Matthew. "Biometric Navigation with Ultrasound." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10431.
Full textFerrara, Matteo <1979>. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/.
Full textAbdullah, Mohammed Abdulmuttaleb M. "Advancing iris biometric technology." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3976.
Full textKabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.
Full textIn its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
Wang, Tao, and Weifeng Lin. "Automatic Imaging for Face Biometrics and Eye Localization." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2631.
Full textA proposal for a person authentication system, which localizes facial landmarks and extracts biometrical features for face authentication, is presented in this thesis. An efficient algorithm for eye localization and biometrical feature extraction and person identification is developed by using Gabor filters. In the eye localization part, we build artificial average eye models for eye location. In the person identification part, we construct databases of biometrical features around the eye area of clients and, for authentication, Schwartz inequality and the sum square error (SSE) are used.
This project is implemented in the ‘Matlab’ programming language, on a personal computer system, and experimental results on the proposed system are presented.
Almudhahka, Nawaf Yousef. "Unconstrained human identication using comparative facial soft biometrics." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/419481/.
Full textChitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.
Full textJaha, Emad Sami. "Soft biometrics using clothing attributes for human identification." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/413484/.
Full textMatovski, Darko S. "Extending quality and covariate analyses for gait biometrics." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/347751/.
Full text