oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Hybrid Template Update System for Unimodal Biometric Systems  [PDF]
Romain Giot,Christophe Rosenberger,Bernadette Dorizzi
Computer Science , 2012,
Abstract: Semi-supervised template update systems allow to automatically take into account the intra-class variability of the biometric data over time. Such systems can be inefficient by including too many impostor's samples or skipping too many genuine's samples. In the first case, the biometric reference drifts from the real biometric data and attracts more often impostors. In the second case, the biometric reference does not evolve quickly enough and also progressively drifts from the real biometric data. We propose a hybrid system using several biometric sub-references in order to increase per- formance of self-update systems by reducing the previously cited errors. The proposition is validated for a keystroke- dynamics authentication system (this modality suffers of high variability over time) on two consequent datasets from the state of the art.
Biometric Template Security  [cached]
Anil K. Jain,Karthik Nandakumar,Abhishek Nagar
EURASIP Journal on Advances in Signal Processing , 2008, DOI: 10.1155/2008/579416
Abstract: Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.
Evaluation of Electrocardiogram for Biometric Authentication  [PDF]
Yogendra Narain Singh, S K Singh
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.31005
Abstract: This paper presents an evaluation of a new biometric electrocardiogram (ECG) for individual authentication. We report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. We present a method to delineate ECG waveforms and their end fiducials from each heartbeat. A new authentication strategy is proposed in this work, which uses the delineated features and taking decision for the identity of an individual with respect to the template database on the basis of match scores. Performance of the system is evaluated in a unimodal framework and in the multibiometric framework where ECG is combined with the face biometric and with the fingerprint biometric. The equal error rate (EER) result of the unimodal system is reported to 10.8%, while the EER results of the multibiometric systems are reported to 3.02% and 1.52%, respectively for the systems when ECG combined with the face biometric and ECG combined with the fingerprint biometric. The EER results of the combined systems prove that the ECG has an excellent source of supplementary information to a multibiometric system, despite it shows moderate performance in a unimodal framework. We critically evaluate the concerns involved to use ECG as a biometric for individual authentication such as, the lack of standardization of signal features and the presence of acquisition variations that make the data representation more difficult. In order to determine large scale performance, individuality of ECG remains to be examined.
Fast computation of the performance evaluation of biometric systems: application to multibiometric  [PDF]
Romain Giot,Mohamad El-Abed,Christophe Rosenberger
Computer Science , 2012, DOI: 10.1016/j.future.2012.02.003
Abstract: The performance evaluation of biometric systems is a crucial step when designing and evaluating such systems. The evaluation process uses the Equal Error Rate (EER) metric proposed by the International Organization for Standardization (ISO/IEC). The EER metric is a powerful metric which allows easily comparing and evaluating biometric systems. However, the computation time of the EER is, most of the time, very intensive. In this paper, we propose a fast method which computes an approximated value of the EER. We illustrate the benefit of the proposed method on two applications: the computing of non parametric confidence intervals and the use of genetic algorithms to compute the parameters of fusion functions. Experimental results show the superiority of the proposed EER approximation method in term of computing time, and the interest of its use to reduce the learning of parameters with genetic algorithms. The proposed method opens new perspectives for the development of secure multibiometrics systems by speeding up their computation time.
Performance Evaluation of a Biometric System Based on Acoustic Images  [PDF]
Alberto Izquierdo-Fuente,Lara del Val,María I. Jiménez,Juan J. Villacorta
Sensors , 2011, DOI: 10.3390/s111009499
Abstract: An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.
Design and Evaluation of a Pressure-Based Typing Biometric Authentication System  [cached]
Eltahir WasilElsadig,Salami MJE,Ismail AhmadFaris,Lai WengKin
EURASIP Journal on Information Security , 2008,
Abstract: The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing circuit, and data acquisition devices to generate waveforms, which when concatenated, produce a pattern for the typed password. The system generates two templates for typed passwords. First template is for the force applied on each password key pressed. The second template is for latency of the password keys. These templates are analyzed using two classifiers. Autoregressive (AR) classifier is used to authenticate the pressure template. Latency classifier is used to authenticate the latency template. Authentication is complete by matching the results of these classifiers concurrently. The proposed system has been implemented by constructing users' database patterns which are later matched to the biometric patterns entered by each user, thereby enabling the system to accept or reject the user. Experiments have been conducted to test the performance of the overall PBAS system and results obtained showed that this proposed system is reliable with many potential applications for computer security.
Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
Rajkumar Yadav,Kamaldeep,Ravi Saini
International Journal on Computer Science and Engineering , 2011,
Abstract: In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parity Checker Method ensures that the change in Biometric Template should be minimum. The watermark that is embedded in the Biometric Template may contain person’s name, person’s address or some unique features of the person. The same watermark is embedded four times in the Biometric Template to enhance its security so that if one watermark is changed by attacker, the other watermark remains intact. For each biometric template there will be a secret key that is used for embedding of watermark. The maintenance of secret key will be responsibility of database manager. The same key can be used for all biometric templates which reduces the responsibility of database manager up to a greater extent but at the cost of security. So, we used the separate key for each Biometric Template.
Multimodal Biometric Systems - Study to Improve Accuracy and Performance  [PDF]
K.Sasidhar,Vijaya L Kakulapati,Kolikipogu Ramakrishna,K.KailasaRao
International Journal of Computer Science and Engineering Survey , 2010,
Abstract: Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- The-Shelf (COTS)products. Here we discuss fingerprint and face biometric systems, decision and fusion techniques used in these systems. We also discuss their advantage over unimodal biometric systems.
Multimodal Biometric Systems - Study to Improve Accuracy and Performance  [PDF]
K. Sasidhar,Vijaya L Kakulapati,Kolikipogu Ramakrishna,K. KailasaRao
Computer Science , 2010,
Abstract: Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- The-Shelf (COTS) products. Here we discuss fingerprint and face biometric systems, decision and fusion techniques used in these systems. We also discuss their advantage over unimodal biometric systems.
MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption
M.Mani Roja,Dr.Sudhir Sawarkar
International Journal of Computer Technology and Applications , 2012,
Abstract: A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and then stored on the MySQL server. During the authentication phase, the signatures are brought from the database for feature extraction. After decryption, they are compared with query template. Since, the database is password protected, it provides double security against adversary attacks.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.