ebook img

Biometric Identification Technologies Based on Modern Data Mining Methods PDF

203 Pages·2021·10.181 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Biometric Identification Technologies Based on Modern Data Mining Methods

Stepan Bilan Mohamed Elhoseny D. Jude Hemanth   Editors Biometric Identification Technologies Based on Modern Data Mining Methods Biometric Identification Technologies Based on Modern Data Mining Methods Stepan Bilan • Mohamed Elhoseny D. Jude Hemanth Editors Biometric Identification Technologies Based on Modern Data Mining Methods Editors Stepan Bilan Mohamed Elhoseny State University of Infrastructure College of Computer Information Technology and Technology American University in the Emirates Kyiv, Ukraine Emirates, UAE D. Jude Hemanth Karunya University Karunya Nagar, India ISBN 978-3-030-48377-7 ISBN 978-3-030-48378-4 (eBook) https://doi.org/10.1007/978-3-030-48378-4 © Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface In today’s world, the population is constantly increasing. Along with population growth, the number of computing and computer-related tools accompanying people is also increasing. Modern society is characterized by wide automation of various spheres of human activity, and in these processes, a special place is occupied by biometric identification of a person. Biometric identification technologies are every- where. For example, modern smartphones contain the option of user access through fingerprints, as well as other human biometric parameters. They are also used in the transport sector, automated computer systems, various access systems, forensic sci- ence, and other spheres of human life. As requests for the use of biometric identification tools increase, the number of financial investments in developing new methods and tools with increased reliabil- ity of identification and authentication is also increasing. In addition, much atten- tion of specialists is paid to the search for new, previously unknown biometric characteristics, such as accuracy, speed, and ease of implementation. At the same time, the bulk of the methods and means of biometric identification are device- dependent. They require a special interaction of the person’s location in relation to scanning and reading devices of a special design. In this regard, researchers’ efforts are spent on the creation and development of methods and tools that do not require distraction of a person from his main activity at the time of identification. This book is very relevant and aims to highlight new modern research in the field of biometric identification. The book will help specialists gain new knowledge and determine the future direction of scientific research. The book consists of 12 chapters. The first chapter describes the application of the triangulation method in the process of biometric identification by an image of a person’s face. In the second chapter, based on the existing methods, a method for correctly describing a person’s gait is presented, and its effectiveness is evaluated on three data sets. The third chap- ter describes the system of biometric identification by keyboard dynamics. Algorithms for the formation of characteristic features and user identification are considered. The fourth chapter focuses on the description of biometric identification methods by the dynamics of handwritten handwriting. Two approaches to v vi Preface identification are considered. The fifth chapter discusses the method of biometric identification of a person’s gait based on parallel shift technology. The sixth chapter describes the use of the Radon transform for biometric identification of a person from handwritten images. The seventh chapter presents a comparison between dif- ferent detectors (Harris, FAST, SIFT, and SURF) for biometric identification using facial images. The eight chapter discusses the existing problems of face recognition in three-dimensional images. A biometric identification method based on scalar per- turbation functions and a set- theoretic subtraction operation is proposed. The ninth chapter describes a new method for analyzing the shape of the palm’s inner side. The tenth chapter describes a method for biometric identification of a person by the palm’s geometric shape based on parallel shift technology. The eleventh chapter provides an unlimited multimodal biometric system for smartphones, which uses a multiuser selfie and behavioral biometrics. The twelfth chapter describes research in the field of biometric identification based on image analysis of the auricle. Kyiv, Ukraine Stepan Bilan Emirates, UAE Mohamed Elhoseny Karunya Nagar, India D. Jude Hemanth Introduction This book is a research book that can be read by students, analysts, scientists, and developers in the field of data mining and biometric identification and authentica- tion. The book acquaints students and novice practitioners with the basics of bio- metric personality identification using static and dynamic biometric characteristics, and to highly qualified specialists and researchers in this field the book helps in modern research and new methods. The book is also useful for organizations involved in developing modern devices designed for biometric identification of people in various access systems and other public places. The book is written in a simple and understandable language, describing modern research and new approaches to biometric identification of a person. Based on the modern develop- ment of biometric technologies, each library and organization involved in the devel- opment of new and reliable biometric identification systems will be interested in acquiring this book. vii Contents Possibilities of Applying the Triangulation Method in the Biometric Identification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Muzafer Saračevič, Mohamed Elhoseny, Aybeyan Selimi, and Zoran Lončeravič Biometric Gait Identification Systems: From Spatio-Temporal Filtering to Local Patch-Based Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Mohammad H. Ghaeminia, Shahriar B. Shokouhi, and Abdollah Amirkhani Interactive Biometric Identification System Based on the Keystroke Dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Stepan Bilan, Mykola Bilan, and Andrii Bilan Analysis of the Dynamics of Handwriting for Biometric Personality Identification Based on Cellular Automata . . . . . . . . . . . . . . . . . . . . . . . . . 59 Stepan Bilan, Mykola Bilan, Andrii Bilan, and Sergii Bilan Gait Identification Based on Parallel Shift Technology . . . . . . . . . . . . . . . . 75 Stepan Bilan, Ruslan Motornyuk, Sergey Yuzhakov, and Mariia Halushko User Identification Using Images of the Handwritten Characters Based on Cellular Automata and Radon Transform . . . . . . . . . . . . . . . . . . . . . . . . 91 Stepan Bilan, Ruslan Motornyuk, Sergii Bilan, and Olga Galan Automated Calculation of Fundamental Matrix from Stereo Images from a Different Point of View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Ahmed Chater and Abdelali Lasfar Identification of Persons Using Stereo Image Pairs and Perturbation Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Sergey Vyatkin, Alexander Romanyuk, Sergey Pavlov, and Oksana Romanyuk ix x Contents Identification of a Person by Palm Based on an Analysis of the Areas of the Inner Surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Mykola Bilan, Andrii Bilan, and Stepan Bilan Search of Informative Biometric Characteristic Features of the Palm Based on Parallel Shift Technology . . . . . . . . . . . . . . . . . . . . . . 147 Sergey Yuzhakov, Sergii Bilan, Stepan Bilan, and Mykola Bilan Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Zahid Akhtar and Attaullah Buriro Research of Biometric Characteristics of the Shape of the Ears Based on Multi-C oordinate Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Ruslan Motornyuk, Andrii Bilan, and Stepan Bilan Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Possibilities of Applying the Triangulation Method in the Biometric Identification Process Muzafer Saračevič, Mohamed Elhoseny, Aybeyan Selimi, and Zoran Lončeravič 1 Introduction Biometrics is an integral part of every individual. It refers to metrics related to body measurements and calculations which have unique characteristics and differs from each other. It is known that there are no two people whose biometric data could coincide. By applying biometrics, you do not need to remember passwords, PIN codes, etc. Some of the essential and significant characteristics of biometrics are a high level of data security, faster data access, reduction of administrative costs, more efficient keys and confidential data distribution, etc. The goal of multi-factor authentication is to form a layered defense that relies on two or more different ways of determining the authenticity of the user when logging onto a system (authentication) and giving access privileges (authorization). These techniques combine what the user knows, what the user owns, and what physically identifies the user (biometric verification). The recognition process is based on the authenticity of specific biometric characteristics, whether physical or behavioral characteristics, with those biometric data that are in the database. The most important thing in building a biometric system is the way in which recognition will be based. M. Saračević (*) Department of Computer Sciences, University of Novi Pazar, Novi Pazar, Serbia e-mail: [email protected] M. Elhoseny College of Computer Information Technology, American University in the Emirates, Emirates, UAE e-mail: [email protected] A. Selimi International Vision University, Gostivar, North Macedonia e-mail: [email protected] Z. Lončeravić ITS - Information Technologies School, Belgrade, Serbia © Springer Nature Switzerland AG 2021 1 S. Bilan et al. (eds.), Biometric Identification Technologies Based on Modern Data Mining Methods, https://doi.org/10.1007/978-3-030-48378-4_1

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.