55 resultados para knotting fingerprint
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The biometric characteristics have been used increasingly as a way to identify an individual, mainly for security reasons. Among them, the fingerprint is the most used biometric characteristic around the world, because it is relatively simple and very efficient. In this scene, there was a significant increase in the size of databases containing information on fingerprints, necessary to perform the recognition of a person. The task of classifying them beforehand has become extremely important as it reduces dramatically the size of the problem during a search, because it is not necessary to go through the whole database. Considering its importance, in the last thirty years, many techniques have been developed to try to increase the efficiency of the classification process. This project followed the rules-based approach and the Software Development Kit (SDK) VeriFinger 6.1 was used to assist in the detection of cores and deltas. Additionally, the classification was also implemented by means of directional map and the Poincar´e index. To make the experiments, the number four database from the National Institute of Standards and Technology (NIST) was used, which is a standard in this area
Resumo:
The use of physical characteristics for human identification is known as biometrics. Among the many biometrics traits available, the fingerprint is the most widely used. The fingerprint identification is based on the impression patterns, as the pattern of ridges and minutiae, characteristics of first and second levels respectively. The current identification systems use these two levels of fingerprint features due to the low cost of the sensors. However, the recent advances in sensor technology, became possible to use third level features present within the ridges, such as the perspiration pores. Recent studies show that the use of third-level features can increase security and fraud protection in biometric systems, since they are difficult to reproduce. In addition, recent researches have also focused on multibiometrics recognition due to its many advantages. The goal of this research project was to apply fusion techniques for fingerprint recognition in order to combine minutia, ridges and pore-based methods and, thus, provide more robust biometrics recognition systems, and also to develop an automated fingerprint identification system using these three methods of recognition. We evaluated isotropic-based and adaptive-based automatic pore extraction methods, and the fusion of pore-based method with the identification methods based on minutiae and ridges. The experiments were performed on the public database PolyUHRF and showed a reduction of approximately 16% in the EER compared to the best results obtained by the methods individually
Resumo:
Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The surface of the digestive tract of Hemisorubim platyrhynchos was analyzed by scanning electron microscopy. Morphometric studies by transmission electron microscopy were performed to analysis the intestinal microvilli. H. platyrhynchos is a Neotropical carnivorous freshwater catfish featuring a short digestive tract composed of a short esophagus, saccular stomach, and intestine with four regions: anterior, middle, posterior, and rectal. The esophageal surface is constituted by fingerprint-like microridges that anchor the mucosubstances secreted by goblet cells facilitating the passage of food. Goblet cells present the opening to the esophageal lumen, between the microridges. Club cells are in basal epithelium and they do not present the opening to the lumen. The gastric luminal surface shows polygon-shaped epithelial cells which secrete granules by exocytose to protect the gastric surface. The intestinal luminal surface reveals folds that are thicker in the anterior intestine than in the posterior intestine, increasing the absorptive surface area. The intestinal surface presents the microvilli of enterocytes and the opening of goblet cells. The morphometric analysis showed that the microvilli are longer in the anterior intestine, significantly decreasing towards the posterior intestine. The microvilli surface area significantly is greater in the anterior and middle intestine than in the posterior intestine. Numerous openings of goblet cells were observed in the posterior intestine acting in epithelial protection and lubrication. SCANNING 9999:1-8, 2015. © 2015 Wiley Periodicals, Inc.
Resumo:
Many methods based on biometrics such as fingerprint, face, iris, and retina have been proposed for person identification. However, for deceased individuals, such biometric measurements are not available. In such cases, parts of the human skeleton can be used for identification, such as dental records, thorax, vertebrae, shoulder, and frontal sinus. It has been established in prior investigations that the radiographic pattern of frontal sinus is highly variable and unique for every individual. This has stimulated the proposition of measurements of the frontal sinus pattern, obtained from x-ray films, for skeletal identification. This paper presents a frontal sinus recognition method for human identification based on Image Foresting Transform and shape context. Experimental results (ERR = 5,82%) have shown the effectiveness of the proposed method.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Ciência da Computação - IBILCE