• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2012 Fiscal Year Final Research Report

Discovering Useful Information for Personal Authentication by Statistical Analyses on Biometric Information

Research Project

  • PDF
Project/Area Number 22700149
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Intelligent informatics
Research InstitutionKyushu University

Principal Investigator

BABA Kensuke  九州大学, 附属図書館, 准教授 (70380681)

Project Period (FY) 2010 – 2012
Keywords生体認証 / 統計解析 / パターン認識 / 機械学習
Research Abstract

This research is trying to find useful information for personal authentication by statistical analyses on biometric information in order to realize a secure and useful biometric-based authentication system. This research focused on palmprint images and fingerprint images, and proposed an accurate and efficient authentication system which can search a similar image of a query image fast by a statistical analysis on the similarities between sample images. By the results, the dimension of useful information for personal authentication in biometric images can be estimated, which is expected to lead we are able to discover the information.

  • Research Products

    (16 results)

All 2013 2012 2011 2010

All Journal Article (15 results) (of which Peer Reviewed: 15 results) Presentation (1 results)

  • [Journal Article] On the Order of Search for Personal Identification with Biometric Images2013

    • Author(s)
      K. Baba and S. Egawa
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

      Volume: vol.4, no.2

    • Peer Reviewed
  • [Journal Article] A Data Structure for Efficient Biometric Identification2013

    • Author(s)
      K. Baba and S. Egawa
    • Journal Title

      Lecture Note in Computer Science

      Volume: vol.7804 Pages: 528-533

    • URL

      http://link.springer.com/chapter/10.1007/978-3-642-36818-9_61

    • Peer Reviewed
  • [Journal Article] A Dependability Analysis of Smart Cards for Biometric Authentication2013

    • Author(s)
      K. Baba and S. Egawa
    • Journal Title

      Proc. International Conference e-Society

      Pages: 463-466

    • URL

      https://qir.kyushu-u.ac.jp/dspace/handle/2324/26150

    • Peer Reviewed
  • [Journal Article] A Note on Authentication Accuracy with Multiple Biometric Images2013

    • Author(s)
      K. Baba and S. Egawa
    • Journal Title

      Proc. Fourth International Conference on Intelligent Systems, Modelling and Simulation

      Pages: 52-55

    • URL

      https://qir.kyushu-u.ac.jp/dspace/handle/2324/25893

    • Peer Reviewed
  • [Journal Article] Evaluation of a Fingerprint Identification Algorithm with SIFT Features2012

    • Author(s)
      I. Awad and K. Baba
    • Journal Title

      Proc. 2012 IIAI International Conference on Advanced Applied Informatics

      Pages: 129-132

    • URL

      https://qir.kyushu-u.ac.jp/dspace/handle/2324/25178

    • Peer Reviewed
  • [Journal Article] Evaluation of Acceleration Algorithm for Biometric Identification2012

    • Author(s)
      S. Egawa, A. I. Awad, and K. Baba
    • Journal Title

      Communications in Computer and Information Science

      Volume: vol.294 Pages: 231-242

    • URL

      http://link.springer.com/chapter/10.1007/978-3-642-30567-2_19

    • Peer Reviewed
  • [Journal Article] Singular Point Detection for Efficient Fingerprint Classification2012

    • Author(s)
      A. I. Awad and K. Baba
    • Journal Title

      International Journal on New Computer Architectures and Their Applications

      Volume: vol.2, no.1 Pages: 1-7

    • URL

      http://sdiwc.net/digital-library/singular-point-detection-for-efficient-fingerprint-classification.html

    • Peer Reviewed
  • [Journal Article] Lecture Notes of the Institute for Computer Sciences2011

    • Author(s)
      I. Awad and K. Baba, FingRF: A Generalized Fingerprints Research Framework
    • Journal Title

      Social-Informatics and Telecommunications Engineering

      Pages: 1-6

    • URL

      http://link.springer.com/chapter/10.1007/978-3-642-32573-1_1

    • Peer Reviewed
  • [Journal Article] Efficient Fingerprint Classification Using Singular Point2011

    • Author(s)
      I. Awad and K. Baba
    • Journal Title

      International Journal of Digital Information and Wireless Communications

      Volume: vol.1, no.3 Pages: 611-616

    • URL

      http://sdiwc.net/digital-library/efficient-fingerprint-classificationusing-singular-point.html

    • Peer Reviewed
  • [Journal Article] An Application for Singular Point Location in Fingerprint Classification2011

    • Author(s)
      I. Awad and K. Baba
    • Journal Title

      Communications in Computer and Information Science

      Volume: vol.188 Pages: 262-276

    • URL

      http://link.springer.com/chapter/10.1007/978-3-642-22389-1_24

    • Peer Reviewed
  • [Journal Article] Fingerprint Singularity Detection: a Comparative Study2011

    • Author(s)
      I. Awad and K. Baba
    • Journal Title

      Communications in Computer and Information Science

      Volume: vol.179 Pages: 122-132

    • URL

      http://link.springer.com/chapter/10.1007/978-3-642-22170-5_11

    • Peer Reviewed
  • [Journal Article] Password-based Anonymous Authentication with Private Information Retrieval2011

    • Author(s)
      T. Nakamura, S. Inenaga, D. Ikeda, K. Baba, and H. Yasuura
    • Journal Title

      Journal of Digital Information Management

      Volume: vol.9, no.2 Pages: 72-78

    • Peer Reviewed
  • [Journal Article] Toward An Efficient Fingerprint Classification,Biometrics - Unique and Diverse Applications in Nature2011

    • Author(s)
      A. I. Awad and K. Baba
    • Journal Title

      Science, and Technology

      Pages: 23-40

    • URL

      http://www.intechopen.com/books/biometrics-unique-and-diverse-applications-in-nature-science-and-technology/toward-an-efficient-fingerprintclassification

    • Peer Reviewed
  • [Journal Article] An Anonymous Authentication Protocol with Single-database PIR2011

    • Author(s)
      T. Nakamura, S. Inenaga, K. Baba, D. Ikeda, and H. Yasuura
    • Journal Title

      Conferences in Research and Practice in Information Technology

      Volume: vol.116 Pages: 3-8

    • URL

      https://qir.kyushu-u.ac.jp/dspace/handle/2324/19372

    • Peer Reviewed
  • [Journal Article] An Identifiable Yet Unlinkable Authentication System in Multi-service Environment2010

    • Author(s)
      T. Nakamura, S. Inenaga, D. Ikeda, K. Baba, and H. Yasuura
    • Journal Title

      IPSJ Transactions on Mathematical Modeling and its Applications

      Volume: vol.3, no.3 Pages: 54-66

    • URL

      http://id.nii.ac.jp/1001/00070728/

    • Peer Reviewed
  • [Presentation] An Authentication Protocol with Anonymity against Service Providers and the Central Manager2010

    • Author(s)
      T. Nakamura, S. Inenaga, K. Baba, D. Ikeda, and H. Yasuura
    • Organizer
      コンピュータセキュリティシンポジウム 2010
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-08

URL: 

Published: 2014-08-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi