By Topic

Biometrics and Kansei Engineering, 2009. ICBAKE 2009. International Conference on

Date 25-28 June 2009

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (412 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (156 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Conference Officers

    Page(s): x - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (193 KB)  
    Freely Available from IEEE
  • International Scientific Committee

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • list-reviewer

    Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Plenery abstracts

    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (223 KB)  

    Summary form only given, as follows. In this paper, we will discuss about the intelligent multi-agent based health information system. The multi-agent concept is varied from 2 or 3 agents to many agents. Therefore, to construct the appropriate concept which you want to implement is more important. In this paper, we will discuss about the concept of multi-agent, and discuss some application areas of fuzzy logic based multi-agent, especially in bioinformatics. And finally we will discuss about the future research areas of multi-agent in AI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outliers in Biometrical Data - Two Real Examples of Analysis

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    The problem of finding and identifying outliers in multivariate measurement data is as old as the data analysis itself. The question: "what is an outlier" has many answers, is is especially difficult when considering high-dimensional data. In the paper a search for outliers in two real data sets is shown. It is stressed that identifying outliers should not be done on the basis of asymptotical cutoffs derived under assumption of normality of the analyzed data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Multi-agent Based Health Information System

    Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    In this paper, we will discuss about the intelligent multi-agent based health information system. The multi-agent concept is varied from 2 or 3 agents to many agents. Therefore, to construct the appropriate concept which you want to implement is more important. In this paper, we will discuss about the concept of multi-agent, and discuss some application areas of fuzzy logic based multi-agent, especially in bioinformatics. And finally we will discuss about the future research areas of multi-agent in AI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Evolutionary Approach for Biometric Fusion

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    A noticeable amount of research has been focused on biometric fusion. A new area is looking at utilization of AdaBoost-type learning methods in biometric fusion domain. These methods rely on an idea that by selecting a variety of biometric classifiers the error rate can be reduced. This paper presents a new evolutionary algorithm based on the multi-objective genetic approach, which automatically preserves diversity in face detection system. The proposed algorithm creates classifiers based on the amount of error computed for each class, and then uses multi-objective genetic algorithm to combine them to produce a set of powerful ensembles. The application is developed for face detection biometric system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applicability of F-value to Classification Problems with a Numerous Number of Explanatory Variables: Toward Classification Problems in Biometric and Kansei Engineering

    Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (499 KB) |  | HTML iconHTML  

    F-value is a statistics which estimates a significance of variables participating discriminant efficiency. It has been used in statistical discriminant analysis. However, it seems a few investigations on real problems which must cope with a numerous number of explanatory variables amount to tens of thousands. In such cases, it becomes important to extract useful variables for classification from a numerous number of variables, because we do not know in advance which variables make significant contribution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Biometric Identification Using the Motion of Fingers

    Page(s): 22 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (437 KB) |  | HTML iconHTML  

    We propose a new method of biometric identification using the bending motion of fingers that is one of the highest repeated motions of the body. Forefingers consist of hinge joints that enable them to move in one direction only. They also have a tendon that helps the first joint of the finger move in tandem with the second joint. It causes high repeatability. In the algorithm, curvature, one of the behavioral profiles, is calculated from the edge pixels of binary image of the forefinger. Joint angle of the forefinger is measured, and the behavioral profiles are compared only when the joint angle of compared data is consistent with registered data. Proposed behavioral biometrics is able to define the comparison based on temporal continuity and static profiles providing high accuracy. From the experimental results, it is learned that this much data is sufficiently accurate for the identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice as a Key

    Page(s): 28 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4960 KB) |  | HTML iconHTML  

    Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of particular people and how to do it independent on the text pronounced by recognized person. Methods used for this purpose are complementary ones in comparison with widely used speech recognition goals, where we must understand the merit content of the utterance disregarding individual features of the voices of different speakers taken into account. The paper shows general problems related to biometric speaker identification and gives general outline, how to use voice as a key for guarded systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorship Invarianceness for Writer Identification

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    The uniqueness of shape and style of handwriting can be used for authorpsilas authentication. Acquiring individual features to obtain authorship invariance-ness concept have led to an important research in writer identification domain. This paper discusses the investigation of this concept by extracting individual features using geometric moment function. Experiment results have shown that handwriting invarianceness are discerning with better identification accuracy. This has verified that moment function is worth to be explored in identifying the handwritten authorship for writer identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face-Based Access Control and Invigilation Tool for E-learning Systems

    Page(s): 40 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (857 KB) |  | HTML iconHTML  

    Knowledge is a key factor to the personal success. Further, the certifications are the instant tools that are commonly available to assess the personal success. In an e-Learning environment, where the learning projects are delivered with the aim to provide a professional or an academic certification, it is integral that the Learning Management Systems provide security features that will ensure the credibility of the assessment and the certification. In a conventional examination environment, there will be invigilators to overlook the candidates, on the contrary, in an on-line examination environment; it is a mandatory requirement that an invigilation mechanism is implemented to ensure the integrity of the examination. In this paper, we present a face recognition based invigilation tool for online e-Learning systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vowels in Speaker Verification

    Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    In the paper the possibility of using a single vowel in peoplespsila identity verification process is described. The usage of sounds which period do not change over the whole duration time, allows applying Fourier series to its analysis. The amplitudes of consecutive harmonics as well as their frequencies are the basis of creating individual featurespsila vector. In order to record sounds of such characteristic, the acquisition process has been performed taking strict measurementpsilas assumption into consideration. The similarity measure of two vowels can be a coefficient which construction is based on the Euclidean distance with contribution of particular components. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Immune Approach to Recognition of Handwritten Words

    Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    This paper presents an immune-based approach to recognition of handwritten words, or more generally, to binary classification. It is inspired by the negative selection mechanism attending the discrimination between self and nonself molecules in living organisms. Our approach incorporates two types of detectors: binary and real-valued. Relatively short binary detectors are used for primary detection, while the real valued detectors are used to resolve eventual doubts. Such a hybrid solution is much more economical in comparison with "pure" approaches. The binary detectors are faster than real-valued ones with respect to the number of operations needed to compare two items. Thus, we gain simplicity and speed of comparisons. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris-Based Person Identification Using Gabor Wavelets and Moments

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    In this paper, we presented an iris recognition algorithm based on Gabor wavelets and invariant moments. The proposed system includes three modules: image preprocessing, feature extraction, and recognition modules. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Normalization Impact on SVD-Based Iris Recognition

    Page(s): 60 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4152 KB) |  | HTML iconHTML  

    In this paper, we compare the performance of singular value decomposition for the recognition of human irises based for both unmodified irises and their normalized versions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Biometric Passport: The Technical Requirements and Possibilities of Using

    Page(s): 65 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB) |  | HTML iconHTML  

    This paper discusses the requirements, national regulations, and application requirements to introduction of a new biometric passport in the European Union (EU), especially in the Republic of Poland. The biometric passport is sometimes called e-passport. The biometric systems depend highly on the existing hardware biometrical technologies and its software components. Some important national solutions will be also described in this article. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Authentication with Keystroke Dynamics Using Fixed Text

    Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    User authentication is an important problem for any restricted access computer system, especially with remote access. Constant spread of Internet makes efficient remote authentication a pressing issue while the distributed nature of interaction introduces additional difficulties. Authentication methods based on most biometrics techniques require dedicated hardware that is unhandy for remote applications. In contrast keystroke dynamics requires only limited dedicated software and does not require any dedicated hardware. The approach we propose is aimed at efficient user authentication with keystroke dynamics using short fixed text, that may for example occur simultaneously to logging process. We have tested the suggested approach on a large group of individuals, with data gathered over Internet using browser-based WWW application. The obtained results are promising and encourage further development in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Driving Style Identification Method Based on Speed Graph Analysis

    Page(s): 76 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    In the paper presented results of analyzing driver's speed profile treated as a criterion of behavioral biometric. As an input data records registered on tachograph paper disk were used. Driving dynamic features such as speed and acceleration distribution in the specific time intervals were determined and compared. Shown that driving style analysis can be also used for person psycho-physiological state recognition, especially for driver sleepiness and fatigue detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.