0% found this document useful (0 votes)
85 views2 pages

Anna University Biometric Systems Exam 2014

Biometrics unit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views2 pages

Anna University Biometric Systems Exam 2014

Biometrics unit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Register No.

Anna University End Semester Examinations April 2014


B.E. (Full Time) Biomedical Engineering
BM 9022- Biometric Systems
V1 Semester
Time: 3 Hours [Link]: 100
Answer All Questions

PART A (10x2=20marks)

1. Distinguish between positive and negative identification.


2. Mention the characteristics of a Biometric?
3. State the civil and commercial applications of fingerprints.
4. How fingerprint images are acquired using ultrasound technology? State its merits and
limitations.
5. Compare Daugman and Wilde's approaches to iris image acquisition.
6. What are the directions for future research in iris recognition?
7. How an eye is detected in a color image?
8. List the strengths and weaknesses of face recognition.
9. What is Dynamic time warping?
10. What are the challenges of Multimodal Biometric systems?

PART B (5x16=80marks)

11 .(i) Describe in detail how Iris is localized and represented in Daugman's approach (12)
(ii) How Iris matching is performed in Wilde's approach? (4)

12a.(i) Describe the various subsystems of a generic biometric system. (8)


(ii) Explain the metrics of accuracy in Biometrics and state the factors affecting these metrics? (8)

(OR)

12b.(i) Discuss the taxonomy of Application environments in Biometrics, (10)


(ii) Explain the privacy issues raised by the use of biometrics. (6)
13a.(i) Explain the method to determine the local ridge frequency.
(ii)How performance of the fingerprint verification algorithm is evaluated? Explain.

(OR)

13b(i) Explain Ridge feature based fingerprint matching using Gabor filters.
(ii)How the ridge ending and bifurcation is detected in a fingerprint image?

14a. Explain how Face recognition is carried out using PCA and LDA techniques

(OR)

14b.(i) Describe face recognition technique using shape and texture


(ii) How 3D model based face recognition is performed? State its merits

15a. Describe Gaussian Mixture Model based speaker recognition.

(OR)

15b.(i)Describe speaker recognition based on mel frequency cepstral coefficient


(ii) Explain about the tasks involved in the NIST speaker evaluation and discuss about the
performance measure.

****************************************************

Common questions

Powered by AI

Face recognition's strengths lie in its non-intrusive nature and growing accuracy with advanced algorithms like PCA and LDA . However, weaknesses like vulnerability to lighting variations, facial expressions, and obstructions such as masks or glasses can reduce accuracy. These limitations impact real-world applications like surveillance and access control, requiring robust systems to address variability and ensure reliable performance . The effectiveness can be constrained by the environmental factors and technology limitations, necessitating hybrid or multimodal systems.

Gaussian Mixture Models (GMMs) in speaker recognition are used to model the distribution of feature vectors corresponding to speech signals, effectively handling variability in speech data. GMMs can represent complex data patterns with multiple Gaussian distributions, capturing the nuances in vocal characteristics . Their advantages include flexibility in modeling diverse speech patterns and robustness against noise and variability in speech input. By capturing the statistical properties of speaker-specific features, GMMs significantly enhance the discrimination capability of speaker recognition systems .

Future research in iris recognition focuses on improving image acquisition under varied environmental conditions, enhancing segmentation algorithms to mitigate noise, and increasing resistance against spoofing attempts . Efforts also include integrating deep learning for more sophisticated pattern matching and improving hardware to accommodate out-of-focus or degraded images. This research aims to enhance the robustness, accuracy, and usability of iris recognition systems under diverse conditions, alongside ensuring user privacy and data security .

Privacy issues arise with biometric systems primarily due to data storage, potential misuse, and unauthorized access. Biometric data is unique and sensitive; any breach can lead to severe privacy invasions for individuals . For organizations, managing such data securely demands robust data protection measures and adherence to compliance requirements, which can be costly. The pervasive use without explicit consent also raises ethical concerns about surveillance and personal freedom impacts .

Daugman's approach to iris image acquisition and processing involves using an integro-differential operator to locate the iris boundary and segments it by detecting the fastest change in the pixel intensity values, which is considered more precise for obtaining unique iris patterns . On the other hand, Wilde's approach utilizes a different method where emphasis is laid on the pattern matching after the segmentation phase, focusing on multiple image processing techniques to ensure image quality . These differences are pivotal in determining the accuracy and reliability of the respective systems.

Principal Component Analysis (PCA) enhances face recognition by reducing the dimensionality of the face image data while preserving variance, transforming data to emphasize patterns and variations. It simplifies complex datasets making processing faster while reducing storage requirements . However, PCA assumes linear relationships and may not effectively handle nonlinear variations like changes in facial expressions and lighting. Compared to algorithms like LDA, which focus on class separability, PCA might be less effective in some scenarios where intra-class variance is significant .

Multimodal biometric systems face challenges like increased complexity in integration, data fusion, and ensuring data security across multiple modalities. Additionally, handling sensor interoperability and user adaptability presents further issues . Mitigation strategies include developing effective algorithms for data fusion that can handle diverse input data and employing advanced encryption for data security. These systems can benefit from redundancy, where failure in one modality can be compensated by others, providing robust authentication . However, deployment costs and user complexity management remain significant hurdles.

Shape and texture-based face recognition techniques rely on identifying distinct facial features and their patterns, using methods such as Local Binary Patterns (LBP) and Gabor filters for analysis . In contrast, 3D model-based techniques construct a three-dimensional model of the face using surface texture data, providing more detailed spatial information and improving performance under varied viewing angles and lighting . This approach tends to be more robust against image distortions and partial occlusions, though at the cost of complexity and computational resources.

In biometric systems, Dynamic Time Warping is predominantly used in speech recognition to handle varying speech speeds by aligning time sequences . This technique ensures that differences in speaking tempo do not affect the system's recognition capability. Outside biometrics, DTW finds applications in areas like data mining, where it aligns time-series data for pattern recognition, and in finance, for comparing patterns of stock trends . Its adaptability to sequences varying in speed makes it a versatile tool across different fields, though the computational cost can be a bottleneck.

Application environments can greatly influence biometrics' performance and security through several factors such as lighting conditions, environmental noise, user cooperation, and spoofing threats. Adverse lighting can affect image quality, while noise can degrade audio biometrics. High-security environments require robust systems capable of handling spoofing attempts and ensuring user privacy, which can become resource-intensive . Moreover, factors like humidity and temperature can affect the sensor's capabilities, influencing the overall reliability of biometric systems.

You might also like