STATISTICAL BIOMETRIC METHODS

Biometric systems have been researched intensively by many organization. It overcomes the conventional security systems by identify ―who you are‖. This paper discusses the current image based biometric systems. It first gives some information about why biometric is needed and what should people look for in biometric systems. Several popular image based biometric systems have been examined in this paper. The technique used in each system for data acquisitions, feature extraction and classifiers are briefly discussed. The biometric systems included are face, fingerprint, hand geometry, hand vein, iris, retina and signature; here also describe the statistical approaches of biometrics. The paper concludes by examining the benefits of multi-modal biometric systems, it is found that there is no one good biometric systems each have its advantages and disadvantages and the performance of each biometric system is summarized.

[1]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[2]  Tieniu Tan,et al.  Iris recognition using circular symmetric filters , 2002, Object recognition supported by user interaction for service robots.

[3]  Pramod K. Varshney,et al.  Improving personal identification accuracy using multisensor fusion for building access control applications , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[4]  Luc Vandendorpe,et al.  Combining face verification experts , 2002, Object recognition supported by user interaction for service robots.

[5]  Raul Sánchez-Reillo Hand geometry pattern recognition through Gaussian mixture modelling , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[6]  James L. Wayman Digital signal processing in biometric identification: a review , 2002, Proceedings. International Conference on Image Processing.

[7]  Jie Tian,et al.  A minutiae matching algorithm in fingerprint verification , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[8]  Nalini K. Ratha,et al.  Fingerprint image enhancement using weak models , 2002, Proceedings. International Conference on Image Processing.

[9]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[10]  James L. Wayman,et al.  Error rate equations for the general biometric system , 1999, IEEE Robotics Autom. Mag..

[11]  Andréa Vergara da Silva,et al.  Wavelet-Based Compared to Function-Based On-Line Signature Verification , 2002, SIBGRAPI.

[12]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[13]  J.L. Wayman,et al.  A generalized biometric identification system model , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).

[14]  Arun Ross,et al.  Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[15]  Ibrahim Emiroglu,et al.  Pre-processing of fingerprint images , 1997 .

[16]  Fernando L. Podio Biometrics - Technologies for Highly Secure Personal Authentication , 2001 .

[17]  R. Sanchez-Reillo,et al.  Iris recognition for biometric identification using dyadic wavelet transform zero-crossing , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[18]  Ioannis Pitas,et al.  Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[19]  Miguel A. Ferrer,et al.  Signature classification by hidden Markov model , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[20]  Thomas S. Huang,et al.  Image processing , 1971 .

[21]  Soo-Won Kim,et al.  An biometric identification system by extracting hand vein patterns , 2001 .

[22]  Arun Ross,et al.  Learning user-specific parameters in a multibiometric system , 2002, Proceedings. International Conference on Image Processing.

[23]  Josef Kittler,et al.  Fusion of multiple experts in multimodal biometric personal identity verification systems , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[24]  Anil K. Jain,et al.  Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[25]  Xiaoyi Jiang,et al.  Adaptive Local Thresholding by Verification-Based Multithreshold Probing with Application to Vessel Detection in Retinal Images , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[26]  Tieniu Tan,et al.  Biometric personal identification based on iris patterns , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[27]  W.A. Barrett,et al.  A survey of face recognition algorithms and testing results , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).

[28]  F. L. Podio Personal authentication through biometric technologies , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[29]  P. L. Venetianer,et al.  An Iris Biometric System for Public and Personal Use , 2000, Computer.

[30]  Ana González-Marcos,et al.  Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[31]  K Tan,et al.  Computational Intelligence Approach to Object Recognition , 2001 .

[32]  Sharath Pankanti,et al.  Minutia verification and classification for fingerprint matching , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[33]  Clifton L. Smith,et al.  Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification , 1995, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology.

[34]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[35]  Jenq-Neng Hwang,et al.  Reliable and fast fingerprint identification for security applications , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[36]  John D. Woodward,et al.  Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.