Research in Biometrics
Biometric Technology Usage Standard Development
2022
Working with Electronic Transactions Development Agency (ETDA), Thailand to develop Biometric Technology Usage Standard (namely usage framework, face, fingerprint, iris, and performance testing) for personal verification.
Published Materials:
The white paper of "Personal Verification using Biometric Systems" is available at: https://www.etda.or.th/getattachment/b116d392-172d-4cf7-8a20-d35d56c11247/WhitePaper_Biometricsfor-PersonalVerification.pdf.aspx
The knowledge sharing slide of "รู้จัก เข้าใจ Biometric Technologies" is available at: https://www.etda.or.th/getattachment/abcf80ec-412e-4a38-ae60-33e53ca748b5/01-Biometric-Technologies-Understanding.pdf.aspx
The knowledge sharing slide of "Biometrics & Privacy Issues" is available at: https://www.etda.or.th/getattachment/a82ee046-377d-4d4c-80bb-4a47349979f6/03-Biometric-Privacy-Issues.pdf.aspx
Recorded video of "Biometric Technologies" knowledge sharing on Facebook live can be visited: https://fb.watch/cP5_NvLNVz/
Latent Fingerprint Enhancement Algorithm
2021
Latent fingerprints are collected from the crime scene. So, the captured images are mostly composed of background and noise capable of distorting the friction ridge pattern of fingerprints. For this reason, a powerful enhancement method is needed to recover the friction ridge pattern from the severe noise background.
This research addresses the powerful enhancement method called "Progressive and Corrective Feedback (PCF) Mechanism" for recovering latent fingerprints from the severe noise background.
The algorithm detail is available at: https://ieeexplore.ieee.org/abstract/document/9469797
Note: IEEE Access is an electronic open-access journal.
Progressive and Corrective Feedback (PCF) mechanism for latent fingerprint enhancement.
Biometric System Software
2006
Development of biometric system software on a personal computer for access control application. This software not only matches an iris or fingerprint against a biometric database in either verification (1:1) or identification (1:N) mode but also plays the important role of a central access control unit in handling and managing a personal database of up to 255 remote access control devices via a network.
Please see the details at:
Engineering News Issue311 of Kasetsart University is available on [pdf].
The exhibition brochure of Kaset Fair'2006 is available at the link: https://kukr.lib.ku.ac.th/kukr_es/kukr/search_detail/dowload_digital_file/308532/48694
and published brochure paper on [pdf].
Biometric verification software
Remote access control management
Iris Recognition Algorithm
2002
Iris is in the human eye, which is a ring shape. The iris texture is formed individually since birth. So, the iris can be used as a biological feature for a person's identity. In this research, we introduced several iris feature extraction and matching methods with both polar-based and rectangular-based texture analyses.
All algorithms' details are available on the Publication page.
Iris Texture Analysis: localization, feature extraction, and matching algorithm