The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, several advances in fingerprint scanning technology regarding cost efficiency, quality&performance and presentation attack detection (PAD) helped to establish fingerprint biometry in more and more areas of application for mainstream as well as high security/governmental purposes. However, there are still cases where the current state of the art is struggling with the technological...
Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint matching. To avoid that MCC templates can disclose sensitive information about position and angle of minutiae, a protected MCC representation was recently introduced (called P-MCC). In spite of a satisfactory level of accuracy and irreversibility, P-MCC templates cannot be revoked. In this paper we propose a...
Health monitoring is a field where one's health condition (i.e., vital signs) is continually measured so that appropriate action(s) can be taken once an irregularity is found. However, a patient vital sings are highly individual based on various factors such as age, gender, weight, environment, daily activities, and medical conditions. Thus, a generalized mHealth solution can not satisfy the needs...
The Cloud, Big Data and many emerging technologies are now being considered by many educational establishments as candidates for deriving benefits for both students in their learning and also for the organisation in terms of more effective and efficient operation. This paper considers the governance strategies which need to be developed and implemented in order to ensure that the technologies can...
How to provide both security and privacy in communication networks has been an important issue for ubiquitous computing. Especially, user authentication in the current IT services has become one of important security issues. However, the security weaknesses in the user authentication have been exposed seriously due to the careless secret related information management and the sophisticated attack...
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering...
This paper presents a new approach to user identity currently being explored within the SuperIdentity project and outlines the specific role that biometric measurements can contribute towards a modelling process. The SuperIdentity project aims to define a novel holistic model wherein the proven strengths of relationships between facets of identity are mapped. These facets are drawn from both real...
Human face is a very common biometric trait, with advancement of technology it is possible to capture face images in hyperspectral range. With the availability of such hyperspectral face data it is possible to build systems biometrics authentication systems working in hyperspectral range. Main focus current research is to use hyperspectral face images for biometric authentication. Hyperspectral face...
The purpose of this paper is to describe the complexity of an Automated Border Control (ABC) context and the factors influencing the experience passengers and border guards have when interacting with ABC systems. Automated border control is expected to make border checks quicker and more efficient as well reducing the cost. At the same time, the purpose is to enhance the level of border security....
Cloud computing is the concept of using maximum remote services through a network using various minimum resources, it provides these resources to users via internet. There are many critical problems appeared with cloud computing such as data privacy, security, and reliability etc. But we find that security is the most important between these problems. In this research paper, the proposed approach...
Biometric template protection is a vital issue in deploying a biometric recognition system. In this paper, a novel face template protection scheme based on Biohashing and permutation approach is proposed. In order to increase the template privacy and security, we propose a new version of Biohashing employing the Chaos map to permute feature vectors before providing secure templates. To evaluate the...
Cancelable biometrics is newly emerged biometric technology that can provide the protection over different attacks to a biometric system. In this paper, we have presented a multilevel r andom projection on face and ear biometric traits. The multiple random projections are conducted using multiple random projection matrixes. From multiple random projections, we have generated multiple templates for...
The prevailing applications of fingerprint identification on ID cards has been a primary approach on security check at airport, automated border crossing and financial payments. This article, which mainly describes the applications of fingerprint identification on the ID documents, will also cover brief descriptions on fingerprint identification reader, their implementations and procedures. Even though...
Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts, while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience dilemma by storing and retrieving multiple existing passwords using one master password...
A recent trend in the field of biometrics is ECG-based, where electrocardiogram (ECG) signals are used as input to the biometric system. Previous work has shown that ECG has a good potential, which can be used alone as a biometric parameter or in combination with some other parameters for greater accuracy, due to its main key properties. This paper presents a study on the applicability of ECG signals...
Cancelable biometrics is an important biometric template protection scheme and can effectively address privacy and security concerns in the case of stored biometric templates being compromised. This paper presents a Hadamard transform-based approach to the design of cancelable fingerprint templates. The proposed cancelable templates are alignment-free and hence do not suffer from inaccurate fingerprint...
Multi-modal biometrics enjoy more merits than their single-modal counterparts in terms of accuracy performance and security. The fusion of hand-based biometrics such as palmprint and palmvein is straightforward since they can be acquired simultaneously with a customized image acquisition device. Conjugate 2DPalmHash Code (CTDPHC), which is constructed by 2DPalmHash Codes (2DPHCs) of palmprint and...
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, design issues for efficient and secure biometrics-based remote user authentication scheme have been extensively investigated by research community in these years. Recently, two biometrics-based authentication...
The use of mobile devices is continuously growing, together with their ability to store and exchange sensitive data. This has spurred the interest, from one side, in exploiting their apparent vulnerabilities, and on the other side, in protecting users from any malfeasance. In this scenario, it has become essential to develop and deploy secure access and identification protocols on mobile platforms...
The purpose of developing a biometric identification system is to identify an individual quickly and accurately based on his physiological or behavioral characteristics. The system should ensure that only a person, whose biometric data is there in the database, is accepted. In order to satisfy these requirements, the system should give a false acceptance rate (FAR) approximately equal to zero and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.