P212 - BIOSIG 2013 - Proceedings of the 12th International Conference of the Biometrics Special Interest Group
Auflistung P212 - BIOSIG 2013 - Proceedings of the 12th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 36
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragVerification of individuals from accelerometer measures of cardiac chest movements(BIOSIG 2013, 2013) Vural, Esra; Simske, Steven; Schuckers, StephanieBiometric verification is gaining popularity particularly for personal security during internet and mobile device usage. A novel approach for verification of individuals is proposed to measure mechanical cardiovascular activity through an accelerometer sensor placed on the surface of the chest above the sternum. Time frequency analysis methods are employed to evaluate biometric performance. Accelerometer measurements were acquired on two different sessions from ten subjects after delays ranging from 1 to 2 weeks. For individual subject verification, Gaussian mixture models were built per each individual and a background model was created for the remaining impostors. A likelihood ratio test with background model was employed for testing. In this study we found preliminary evidence for the use of the cardiovascular signal measured with an accelerometer placed on the sternum as a biometric sensor to verify individuals. Verification testing using this approach obtained a mean EER rate of 0.06 for inter-session testing.
- KonferenzbeitragContinuous authentication using mouse dynamics(BIOSIG 2013, 2013) Mondal, Soumik; Bours, PatrickIn this paper, we demonstrate a new way to perform continuous authentication using Mouse Dynamics as the behavioural biometric modality. In the proposed scheme, the user will be authenticated per mouse event performed on his/her system. We have used a publicly available mouse dynamics dataset and extracted per event features suitable for the proposed scheme. In this research, we have used the mouse dynamics data of 49 users and evaluated the system performance with 6 machine learning algorithms. In this approach, the genuine user has never been classified as an impostor throughout a full session whereas the average number of mouse actions an impostor could perform before detection is 94 from the best classification algorithm with a person based threshold.
- KonferenzbeitragSecurity considerations on extending PACE to a biometric-based connection establishment(BIOSIG 2013, 2013) Buchmann, Nicolas; Peeters, Roel; Baier, Harald; Pashalidis, AndreasThe regulations of the European Union (EU) Council in 2004 are the basis of the deployment of electronic passports within the EU. Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) like national electronic ID cards and electronic residence permits, respectively. The security protocols to communicate with an eMRTD are based on the paradigm of strong cohesion and loose coupling, i.e., each step is designed to ensure only a particular security goal like authorisation to access a certain data group, authenticity and integrity of the data, originality of the chip, or the linkage between the eMRTD and its holder. However, recently a discussion evolved to integrate the linkage security goal within the connection establishment, which currently only aims at limiting basic access of authorised terminals to the eMRTD. For instance, the BioPACE protocol proposes to replace the knowledge-based shared 'secret' of PACE by a biometric-based one. The goal of the paper at hand is twofold: First, we evaluate the BioPACE protocol and propose improvements to enhance its features. Second, we analyse the expediency of integrating our BioPACE version 2 into the eMRTD domain. Our initial evaluation shows that our BioPACE version 2 is expedient if the EAC protocols and the corresponding PKI are abandoned.
- KonferenzbeitragRobust 3D face recognition from low resolution images(BIOSIG 2013, 2013) Drosou, Anastasios; Moschonas, Panagiotis; Tzovaras, DimitriosThis paper proposes a combined approach for robust face recognition from low resolution images captured by a low-budget commercial depth camera. The low resolution of the facial region of interest is compensated via oversampling techniques and efficient trimming algorithms for the generation of an accurate 3D facial model. Two state of the art algorithms for geometric feature extraction are then utilized, i.e. the estimation of the Directional Indices between all the isogeodasic stripes of the same facial surface via the 3D Weighted Walkthroughs (3DW W ) transformation and the estimation of the Spherical Face Representation (SF R). The biometric signature is then enhanced via user-specific cohort biometric templates for each feature, respectively. The experiments have been carried out on the demanding “BIOTAFTOTITA” dataset and the results are very promising even under difficult scenarios (e.g. looking away instances, grimace, etc.). Despite the obvious superiority of the 3DW W transformation over the SF R, it has been noted that the score level fusion of both algorithms improves the authentication performance of the system. On the contrary, only the 3DW W transformation should be preferred in identification scenarios. In- dicatively, the experimental validation on the aforementioned dataset containing 54 subjects illustrates significant succeeds an identification performance of ~ 100% in Rank-1 and Equal Error Rate of 0.25% regarding the authentication performance in the neutral face experiment.
- KonferenzbeitragFPGA based palmprint and palm vein biometric system(BIOSIG 2013, 2013) Pudzs, Mihails; Fuksis, Rihards; Ruskuls, Rinalds; Eglitis, Teodors; Kadikis, Arturs; Greitans, ModrisThis paper presents an FPGA based multimodal palm biometric system. System is prototyped on an Altera DE2-115 board from Terasic, using an additional hardware for palm image acquisition in two light spectrums, communication with smart card, and debugging. System captures person's palmprint and palm vein images, extracts biometric data, encrypts it, and prepares for comparison. The comparison of the biometric data is performed on smart card for additional security. The proposed multimodal palm biometric system achieves a matching accuracy of EER of 16.65 % and a verification processing time of 0.8 seconds.
- KonferenzbeitragCombination of facial landmarks for robust eye localization using the discriminative generalized Hough transform(BIOSIG 2013, 2013) Hahmann, Ferdinand; Böer, Gordon; Schramm, HaukeThe Discriminative Generalized Hough Transform (DGHT) is a general and robust automated object localization method, which has been shown to achieve state-of-the-art success rates in different application areas like medical image analysis and person localization. In this contribution the framework is enhanced by a novel facial landmark combination technique which is theoretically introduced and evaluated for an eye localization task on a public database. The technique applies individually trained DGHT models for the localization of different facial landmarks, combines the obtained Hough spaces into a 3D feature matrix and applies a specifically trained higher-level DGHT model for the final localization based on the given features. In addition to that, the framework is further improved by a task-specific multi-level approach which adjusts the zooming-in strategy with respect to relevant structures and confusable objects. With the new system it was possible to increase the iris localization rate from 96.6% to 97.9% on 3830 evaluation images. This result is promising, since the variation of the head pose in the database is quite large and the applied error measure considers the worst of a left and right eye localization attempt.
- KonferenzbeitragVolumetric fingerprint data analysis using optical coherence tomography(BIOSIG 2013, 2013) Sousedik, Ctirad; Breithaupt, Ralph; Busch, ChristophThe increasing usage of fingerprint biometrics as a security technology requires the biometric systems to be resistant against moderate or even high attack potential. To date, state-of-the-art fingerprint sensors can be deceived by using an accurate imitation of the ridge/valley pattern of an enrolled fingerprint that can be produced utilizing low-cost, commonly available materials and techniques. The structure of high-resolution 3D volumetric scans of fingertips, acquired by using the Optical Coherence Tomography (OCT), has been analyzed by this work so that a Presentation Attack Detection method could be developed that would render the artefact production process extremely difficult or even practically impossible.
- KonferenzbeitragUsability analysis of dynamic signature verification in mobile environments(BIOSIG 2013, 2013) Blanco-Gonzalo, Ramon; Sanchez-Reillo, Raul; Liu-Jimenez, JudithBiometrics has experienced significant advances during the last years becoming involved in several systems. Nevertheless, many of these systems are rejected by users due to a lack of usability. This indicates that the user-system interaction is a factor which needs to be improved in biometric environments. Even less studied, are the dynamic modalities (gait, signature, voice, etc.) which include behavioural conditions which exhibit greater variability from person to person. This paper showcases some of the latest efforts made by authors in the analysis of usability in dynamic signature verification (DSV). Several outcomes (such as the importance of the styluses used or stress in users) were extracted in order to establish guidelines for future developments.
- KonferenzbeitragExperimental evidence of ageing in hand biometrics(BIOSIG 2013, 2013) Uhl, Andreas; Wild, PeterBiometric systems build upon the critical property of measuring behavioral, physiological or chemical human properties remaining stable over time. But both, the age of users and ageing of the user's template may affect performance due to the accumulation of personal changes and indirect behavioral effects like less accurate ability to present the biometric to the sensor. This paper compares short-timespan versus longtimespan effects on different hand-based features presenting the first high-resolution hand-ageing database and identifying features resistant and prone to ageing. Ageing goats, i.e. users responsible for low matching scores across features, are investigated and single-sensor multibiometrics is highlighted to target the ageing problem.
- KonferenzbeitragBehavioral biometrics for DARPA's active authentication program(BIOSIG 2013, 2013) Deutschmann, Ingo; Lindholm, JohanThe aim of the US Defense Advance Research Project Agency`s (DARPA) Active Authentication program is the continuous authentication of users by using behavioral biometrics authentication systems, which does not depend on specific hardware or sensors. This paper presents how such a continuous authentication system would perform in an office like environment. The analysis is performed on a data set captured from 99 users over a 10 week period. Our continuous authentication system builds a behavior biometric profile of the user by observing mouse movement, keystrokes and application usage. The user is then actively matched against his profile. The goal was, as DARPA is mentioning in their Active Authentication program, ”This means the system would, potentially have to falsely reject the user more than five times in a row during continuous usage over a 40 hour period to fail to meet this target. The technologies developed under this solicitation should be able to work invisibly to the user unless five false positives are reached”. The results of our study indicate that the correct user can work through a regular workday without being falsely rejected, while the incorrect user would be detected within 18 seconds using keyboard or 2.4 minutes using mouse. Application process usage results show that the incorrect user would be detected in just over 1.5 minutes.