Fast and robust biometric authentication scheme using human ear

Mohammad Mozammel Hoque Chowdhury, MD Rafiqul Islam, Junbin Gao

Research output: Book chapter/Published conference paperConference paperpeer-review

1 Citation (Scopus)


Biometric authentication using human ear is a recent trend in security applications including access control, user recognition, surveillance, forensic, and border security systems. This paper aims to propose a fast and robust authentication scheme using ear biometric. In this work, a fast technique based on the AdaBoost algorithm is used to detect the ear of the user from profile images. An efficient stereo matching algorithm is used to match the user’s ear data (probe) to the previously enrolled (stored) ear data in a gallery database for verification and recognition. Correspondences are established between extracted features of the probe and gallery image sequences. The performance of the recognition approach is evaluated on different standard ear datasets and compared with other techniques. Experimental results suggest the superiority of the proposed approach over other popular techniques reported in this work.
Original languageEnglish
Title of host publicationSecurity and privacy in communication networks
Subtitle of host publicationSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
EditorsXiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Place of PublicationCham
Number of pages12
ISBN (Electronic)9783319788166
ISBN (Print)9783319788159
Publication statusPublished - 25 Apr 2018
Event13th International Conference on Security and Privacy in Communication Networks: SecureComm 2017 - Crowne Plaza Niagara Falls – Fallsview, Niagara Falls, Canada
Duration: 22 Oct 201725 Oct 2017 (Conference website)

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
ISSN (Electronic)1867-8211


Conference13th International Conference on Security and Privacy in Communication Networks
CityNiagara Falls
OtherSecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
Internet address


Dive into the research topics of 'Fast and robust biometric authentication scheme using human ear'. Together they form a unique fingerprint.

Cite this