BIOMETRICS ͳ UNIQUE AND DIVERSE APPLICATIONS IN NATURE, SCIENCE, AND TECHNOLOGY Edited by Midori Albert Biometrics - Unique and Diverse Applications in Nature, Science, and Technology Edited by Midori Albert Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Katarina Lovrecic Technical Editor Teodora Smiljanic Cover Designer Martina Sirotic Image Copyright 2010. Used under license from Shutterstock.com First published March, 2011 Printed in India A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Biometrics - Unique and Diverse Applications in Nature, Science, and Technology, Edited by Midori Albert p. cm. ISBN 978-953-307-187-9 free online editions of InTech Books and Journals can be found at www.intechopen.com Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Preface VII Usefulness of Biometrics to Analyse Some Ecological Features of Birds 1 M. Ángeles Hernández, Francisco Campos, Raúl Martín and Tomás Santamaría Toward An Efficient Fingerprint Classification 23 Ali Ismail Awad and Kensuke Baba Dental Biometrics for Human Identification 41 Aparecido Nilceu Marana, Elizabeth B. Barboza, João Paulo Papa, Michael Hofer and Denise Tostes Oliveira Facial Expression Recognition 57 Bogdan J. Matuszewski, Wei Quan and Lik-Kwan Shark Implications of Adult Facial Aging on Biometrics 89 Midori Albert, Amrutha Sethuram and Karl Ricanek Iris Recognition on Low Computational Power Mobile Devices 107 Huiqi Lu, Chris R. Chatwin and Rupert C.D. Young Biometric Data Mining Applied to On-line Recognition Systems 129 José Alberto Hernández-Aguilar, Crispin Zavala, Ocotlán Díaz, Gennadiy Burlak, Alberto Ochoa and Julio César Ponce Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework 145 Arun P. Kumara Krishan, Bon K. Sy and Adam Ramirez Implementing Multimodal Biometric Solutions in Embedded Systems 173 Jingyan Wang, Yongping Li, Ying Zhang and Yuefeng Huang Contents Pref ac e From time immemorial, we as humans have been intrigued by, perplexed by, and en- tertained by observing and analyzing ourselves and the natural world around us. Sci- ence and technology have evolved to a point where we can empirically record a mea- sure of a biological or behavioral feature and use it for recognizing pa erns, trends, and or discrete phenomena, such as individuals—and this is what biometrics is all about. Understanding some of the ways in which we use biometrics and for what spe- cifi c purposes is what this book is all about. Throughout the nine chapters of this book, an international and interdisciplinary team of researchers will enable you to become familiar with the birth and growth of bio- metrics in ecology (Chapter 1) and how it has reproduced, in a sense, off spring that are quite diverse—from applications in individual human identifi cation (Chapters 2 through 6) to technologic improvements in obtaining information or securing privacy in large bodies of data (Chapters 7 through 9). Whereas each chapter focuses on a defi nitive aspect of biometrics; the book as a whole is an amalgamation of examples of state of the art research within the biometrics paradigm. In Chapter 1 we discover what the fi rst biometrics studies were, and how biometrics works in nature—how we gather information on biological species, such as ecology, sex diff erences, seasonality, reproduction and more. Shi ing the focus of biometrics towards humans, particularly human identifi cation, Chapter 2 provides some background on fi ngerprint classifi cation and explains a ro- bust fi ngerprint classifi cation algorithm—how pa erns are determined and classifi ed. The authors share with us their results of a performance evaluation as well. Chapter 3 explores human identifi cation via the dentition. A er a brief history of the use of dental features in human identifi cation, we can see the value of a computer au- tomated approach to dental recognition. Imagine a networked database of all people’s dental records. Imagine you can query this enormous database with information about an individual’s teeth. Imagine the computer fi nds matches of a reasonable number that can then be analyzed and your individual is recognized or identifi ed. Further on the topic of human identifi cation is Chapter 4 where we learn about research on computer automated facial expression recognition. Given that facial expressions derive from emotions and cognition and manifest our aff ective states, we know that we can o en understand how other people feel by observing these facial expressions. However, what if we could not be there to monitor someone at critical times—someone VIII Preface who is ill, unable to speak, and in pain, for example, as the authors suggest. This chap- ter describes existing methods and presents unique work on the use of 3D facial data for the automatic recognition of facial expressions. More generally, the issue of computer automated facial recognition technologies for forensic purposes is raised in Chapter 5. Herein we learn about the challenges normal aging presents to computer face recognition. As faces age, they change. How much do they change? How does this aff ect computer face recognition? We see that a er many years a person’s face may be amazingly diff erent. However, what if our faces change slightly on a daily basis? Would this subtle change aff ect computer face recognition? Chapter 5 explores face aging in face recognition, and introduces an experiment on face changes in one person in one day. Aside from recognizing entire faces, much work in biometrics may be found in explor- ing identity markers based on single features, such as the iris of the eye. Chapter 6 reviews the latest developments in iris recognition used on handheld iris recognition devices, both for government or private sector endeavors. Through a mobile biometric identifi cation system (MBI system) case study, we learn about hardware specifi cs, iris recognition algorithms, and system performance. Current solutions and the step-by- step format of this chapter are sure to captivate interest. From ecology to human identifi cation, it can be seen that biometrics has both breadth and depth of utility. And with all the biometric data collected in large databases, one issue that has been raised with regard to the use of these data is the issue of privacy. Chapter 7 addresses the issue of privacy through an explanation of biometric data- mining. Biometrics systems recognize us in two ways—physically (e.g., fi ngerprints) or behaviorally (e.g., voice); and biometric data-mining merges these aspects of recogni- tion such that we may be identifi ed by how we use computers, for example keystroke pa erns, mouse movements, and online behaviors. Detailed examples and intrigu- ing descriptions of biometric data-mining and its implications are presented in this chapter. Continuing in the theme of privacy issues, Chapter 8 introduces us to the BioAPI 2.0—a new industry standard in biometric systems that allows for interoperability while maintaining security and privacy. If one biometric can serve as a security measure (for example, the iris of the eye is read rather than a key being used to unlock a door), then security may be increased if more than one biometric system may be used. However, because biometric systems are composed of various segments and those segments do various things that are o en isolated—they are non-interchangeable between systems. Vendors of biometric systems are therefore limited; and interfacing is compromised. The BioAPI 2.0 is explained in this chapter as a means to creating an interface that al- lows diff erent biometric systems to work together. The authors provide an excellent background and detailed information on the BioAPI 2.0. Also working on improving the technology and usability of biometric systems are the authors of Chapter 9 who research multi-modal biometrics solutions for embedded systems. Embedded systems that collect, store, modify, and retrieve data, such as personal information, are o en at risk. In this chapter, the researchers discuss the development of multi-modal biometric systems as opposed to less robust uni-modal IX Preface systems; and, they tell us how to design a high performance embedded multimodal biometrics system—one solution to the privacy issue. As can be seen, “Biometrics: Unique and Diverse Applications in Nature, Science, and Technology” provides a unique sampling of the diverse ways in which biometrics is in- tegrated into our lives and our technology. I hope you will enjoy learning or reviewing the biometric applications presented in this collection of research studies, a collection that at this moment is leading a new frontier. February 18, 2011 Midori Albert Wilmington, North Carolina [...]... fingerprint configuration, as less than 5% of all fingerprints is arches Plain Arch is defined as a type of fingerprint in which ridges enter one side and 26 Biometrics - Unique and Diverse Applications in Nature, Science, and Technology flow out of the other with the rise of wave in the center In Tended Arch, most of the ridges enter one side and flow out of the other with rise wave in the center and. .. Full and adjusted ANCOVA models taking into account body mass, body size, habitat, season, age and sex Statistically significant interactions are in bold In the adjusted model, no significant main and interaction effects (P > 0.05) were removed if they were not included in higher order interactions df: degree of freedom P: probability 14 Biometrics - Unique and Diverse Applications in Nature, Science,. .. out one datum from the observers in 8 Biometrics - Unique and Diverse Applications in Nature, Science, and Technology each step and in calculating the classification functions using the remaining data Once obtained, the excluded observation is classified An analogous procedure is followed by excluding a different observation in each step This technique has been used in some studies (Hermosell et al.,... the search domain into smaller database subsets, and hence speeds up the total response time of any AFIS Even for 24 Biometrics - Unique and Diverse Applications in Nature, Science, and Technology fingerprint recognition, a large number of classification methods have been proposed (summarized in Section 2) This chapter proposes a novel method for fingerprint classification using simple and established... when measuring a passerine wing than a raptor wing; 6) errors arising from rounding off, both in continuous variables and in statistical tests in which decimal values are often rounded up or down; 7) error compounding in indices, occurring when ratios, indices, etc., are calculated by multiplying or dividing the original measurements The equipment used for data collection must be appropriate and must... such as fingerprint labelling according to a given classification scheme The continuous classification approach is more preferable than the classical exclusive approach if we want to classify fingerprints only for improving the fingerprint retrieval efficiency 2.2 Exclusive fingerprint classification Exclusive fingerprint classification groups fingerprint images into some predefined classes according to... Continuous fingerprint classification In general, continuous classification overcomes some defects of exclusive classification by representing each fingerprint by a vector which summarizing its main features, instead of assigning them into a single class (Lumini et al., 1997) proposed a continuous classification scheme which characterizes each fingerprint with a numerical vector Apparently, continuous... Efficient Fingerprint Classification 25 Fig 1 Common five classes of fingerprints with singular points (Circle-Core, Triangle-Delta) Fingerprint classification methods can be grouped into two main categories: continuous classification and exclusive classification (Maltoni et al., 2009) Figure 1 shows examples of exclusive fingerprint classes with related singular core and delta points (Amin & Neil,... response time and the accuracy in fingerprint identification systems Moreover, from the versatility and developing cost points of view, the trade-off should be realized in terms of system design, implementation, and usability Fingerprint classification is one of the standard approaches to speed up the matching process between the input sample and the collected database (K Jain et al., 2007) Fingerprint classification... affected by experience or training This is why standard ringing procedures have been regulated in England and Ireland for decades and strict training is required As a result of this study, length of the third primary has been proposed in several countries as a measure, in passerines, which Usefulness of Biometrics to Analyse Some Ecological Features of Birds c 5 is better than wing length to reflect body . BIOMETRICS ͳ UNIQUE AND DIVERSE APPLICATIONS IN NATURE, SCIENCE, AND TECHNOLOGY Edited by Midori Albert Biometrics - Unique and Diverse Applications in Nature, Science, and Technology Edited. Nature, Science, and Technology provides a unique sampling of the diverse ways in which biometrics is in- tegrated into our lives and our technology. I hope you will enjoy learning or reviewing. obtained. The idea of the method, developed in various steps, consists of leaving out one datum from the observers in Biometrics - Unique and Diverse Applications in Nature, Science, and Technology