The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many large-scale biometric systems operate in the identification mode and include multimodal information. While biometric fusion is a well-studied problem, most of the fusion schemes have been implicitly designed for the verification scenario and cannot account for missing data (missing modalities or incomplete score lists) that is commonly encountered in multibiometric identification systems. In...
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such an application poses a very challenging pattern recognition problem: the training samples are often sparse and they cannot represent the biometrics of a person. The query features are easily affected by the acquisition...
The decrease of representativeness of available templates during time is due to the large intra-class variations characterizing biometrics (e.g. faces). This requires the design of algorithms able to make biometric verification systems adaptive to such variations. Among others, the template co-update algorithm, which uses the mutual help of two complementary biometric matchers, has shown promising...
Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desirable, as stronger non-repudiation is introduced, along with enhanced ease-of-use. In order to support such transactions, some sort of secure template construct is required that, when re-encoded, can release session specific data. The...
Biometric watermarking was introduced as the synergistic integration of biometrics and digital watermarking technology. This paper proposes a novel biometric watermarking technique, which embeds offline handwritten signature in host image for copyright protection. We propose to combine the conventional LSB-based and DWT-based watermarking techniques into a unison framework, which is known as LSB-DWT...
The robustness of talking-face identity verification (IV) systems is best evaluated by monitoring their behavior under impostor attacks. We propose a scenario where the impostor uses a still face picture and a sample of speech of the genuine client to transform his/her speech and visual appearance into that of the target client. We propose MixTrans, an original text-independent technique for voice...
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric authentication system without the knowledge of...
An important phenomenon influencing the performance of a biometric experiment, attributed to Doddington et al (1998), is that the match scores (whether under genuine or impostor matching) are strongly dependent on the model or template from which the match scores have been derived. Although there exist studies to classify the characteristic of the template/model, as well as the query data, into animal...
We present an usability study for a bi-modality Continuous Biometrics Authentication System (CBAS) that runs on the Windows platform. Our CBAS combines fingerprint and facial biometrics to authenticate users. As authentication is continuous, CBAS constantly contributes a computational overhead of up to 42% to the computer system. This usability study seeks to investigate (a) whether this overhead...
This paper presents the concept of contact-based biometric features, which are behavioral biometric features related to the dynamic manipulation of objects that exist in the surrounding environment. The motivation behind the proposed features derives from activity-related biometrics and the extension of them to activities involving objects. The proposed approach exploits methods from different scientific...
Template representativeness is a fundamental problem in a biometric recognition system. The performance of the system degrades if the enrolled templates are un-representative of the substantial intra-class variations encountered in the input biometric samples. Recently, several template updates methods based on supervised and semi-supervised learning have been proposed in the literature with an aim...
Many applications of ocular biometrics require long-term stability, yet only limited data on the effects of disease and aging on the error rates of ocular biometrics is currently available. Based on pathologies simulated using image manipulation validated by opthalmology and optometry specialists, the present paper reports on the effects that selected common ocular diseases and age-related pathologies...
In this paper, we propose a novel method of Cancelable Biometrics for correlation-based matching. The biometric image is transformed by Number Theoretic Transform (Fourier-like transform over a finite field), and then the transformed data is masked with a random filter. By applying a particular kind of masking technique, the correlation between the registered image and the input matching image can...
An information theoretic framework is established to analyze the performance of biometric security systems. Two performance metrics, namely privacy, measured by the normalized equivocation rate of the biometric measurements, and security, measured by the rate of the key generated from the biometric measurements, are first defined. A fundamental tradeoff between these two metrics is then identified...
We propose a probabilistic model for constructing passwords on the basis of outcomes of biometrical measurements. An algorithm for the transformation of biometrical data to passwords is given. The performance of the authentication scheme is evaluated by the compression factor, the false acceptance/rejection rates, the probability distribution over the set of passwords, and the probability of a correct...
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these concerns...
In this paper, we propose a new remote biometric based authentication scheme, which is designed for distributed systems with a central database for the storage of the biometric data. For our scheme, we consider the recently introduced security notions of Identity and Transaction privacy and present a different storage mechanism for biometrics resulting in a reduced database storage cost. Besides,...
We describe a new framework to bind cryptographic keys with biometric signatures using correlation filters. This scheme combines correlation filter based biometric recognition with biometric key-binding while offering template protection, revocability, diversity and security. We demonstrate the effectiveness of our scheme via numerical results on the CMU-PIE face database.
Fuzzy vault is a practical and promising fingerprint template protection technology. However, this scheme has some security issues, in which cross-matching between different vaults may be the most serious one. In this paper, we develop an improvement version of fuzzy vault integrating minutiae’s local ridge orientation information. The improved fuzzy fingerprint vault, a two factor authentication...
As a result of the growing interest in biometrics a new field of research has emerged entitled Biometric Cryptosystems. Only a small amount of work, which additionally tends to be custom-built according to the specific application context, has been published in this area. This work provides a systematic treatment of how to construct biometric cryptosystems based on iris biometrics. A cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.