Fast and Robust Biometric Authentication Scheme Using Human Ear

Research output: Book chapter/Published conference paperConference paper

Abstract

Biometric authentication using human ear is a recent trend in security applications including access control, user recognition, surveillance, forensic, and border security systems. This paper aims to propose a fast and robust authentication scheme using ear biometric. In this work, a fast technique based on the AdaBoost algorithm is used to detect the ear of the user from profile images. An efficient stereo matching algorithm is used to match the user’s ear data (probe) to the previously enrolled (stored) ear data in a gallery database for verification and recognition. Correspondences are established between extracted features of the probe and gallery image sequences. The performance of the recognition approach is evaluated on different standard ear datasets and compared with other techniques. Experimental results suggest the superiority of the proposed approach over other popular techniques reported in this work.
Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks
Subtitle of host publicationSecureComm 2017 International Workshops Proceedings
EditorsXiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
PublisherSpringer
Pages133-144
Number of pages12
ISBN (Electronic)9783319788166
ISBN (Print)9783319788159
DOIs
Publication statusPublished - 25 Apr 2018
Event13th International Conference on Security and Privacy in Communication Networks: SecureComm 2017 - Crowne Plaza Niagara Falls – Fallsview, Niagara Falls, Canada
Duration: 22 Oct 201725 Oct 2017
http://securecomm.eai-conferences.org/ (Conference website)

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublisherSpringer
Volume239
ISSN (Electronic)1867-8211

Conference

Conference13th International Conference on Security and Privacy in Communication Networks
CountryCanada
CityNiagara Falls
Period22/10/1725/10/17
OtherSecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
Internet address

Fingerprint Dive into the research topics of 'Fast and Robust Biometric Authentication Scheme Using Human Ear'. Together they form a unique fingerprint.

Cite this