P164 - BIOSIG 2010 - Proceedings of the 9th International Conference of the Biometrics Special Interest Group
Auflistung P164 - BIOSIG 2010 - Proceedings of the 9th International Conference of the Biometrics Special Interest Group nach Autor:in "Brömme, Arslan"
1 - 10 von 15
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragActivity related biometrics based on motion trajectories(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Drosou, Anastasios; Moustakas, Konstantinos; Ioannidis, Dimos; Tzovaras, DimitriosThe current paper contributes to the concept of activity-related biometric authentication in ambient Intelligence environments. The motivation behind the proposed approach derives from activity-related biometrics and is mainly focusing on everyday activities. The activity sequence is captured by a stereoscopic camera and the resulting 2.5D data are processed to extract valuable unobtrusive activity-related features. The novel contribution of the current work lies in the warping of the extracted movements trajectories, so as to compensate for different environmental settings. Au- thentication is performed utilizing both HMM and GMMs. The authentication results performed on a database with 32 subjects show that the current work outperforms existing approaches especially in the case of non-interaction restricting scenarios.
- KonferenzbeitragApplikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Abt, Sebastian; Busch, Christoph; Nickel, ClaudiaBiometrische Verfahren werden häufig im Rahmen der Authentifizierung zum Schutz wichtiger Daten und Systeme eingesetzt. Hierzu werden biometrische Referenzen gespeichert, die Informationen über biometrische Charakteristika der betroffenen Individuen enthalten. Um diese biometrischen Referenzen in offenen und verteilten biometrischen Systemen nutzen zu können, ist eine Standardisierung der Datenaustauschformate notwendig. Eine gute Erkennungsleistung ist nur erzielbar, wenn ausgetauschte Datensätze auch standardkonform erstellt werden. Das Einhalten dieser Standards muss mittels geeigneter syntaktischer und semantischer Konformitätstests sichergestellt werden. Im Rahmen eines semantischen Konformitätstests wird geprüft, ob die gespeicherten Referenzen ein wahres Abbild der biometrischen Charakteristika darstellen. Zur Durchführung semantischer Konformitätstests ist jedoch die Existenz eines entsprechenden Referenzdatensatzes unbedingte Voraussetzung. Derartige Referenzdatensätze werden zur Zeit jedoch erst erstellt. Diese Arbeit leistet einen Beitrag zur Erzeugung eines solchen Referenzdatensatzes am Beispiel von Fingerabdruck-Minutien. Hierzu wird das DBSCAN Clustering-Verfahren auf Datenpunkte angewendet, die von daktyloskopischen Experten durch manuelle Analyse von Fingerabdruck-Bildern bestimmt wurden. Mit Hilfe des Clustering-Verfahrens werden Ground-Truth Fingerabdruck-Minutien erzeugt, die als Referenzdatensatz zum Durchführen semantischer Konformitätstests von automatischen Fingerabdruckidentifikationssystemen genutzt werden können.
- KonferenzbeitragBiometric systems in future preventive scenarios – Legal issues and challenges(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Hornung, Gerrit; Desoi, Monika; Pocs, MatthiasThe privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may develop and change with the technical enhancement of the respective systems, which also induces the emergence of new application scenarios. One group of such new scenarios appears to be the prevention of criminal or in other ways dangerous behaviour. From a legal point of view, this brings about new challenges which go well beyond the problems of authentication as such. While some of the features of the scenarios discussed below may not be feasible in the short term, it is apparent that the associated fundamental rights and data protection law problems will have to be addressed in the future. This applies to the international plane as well as to national legal orders, for which Germany will serve as an example in the following.
- KonferenzbeitragFacing the challenge of enrolment in national ID schemes(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Al-Khouri, Ali M.This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were also listed for the purpose of sharing knowledge and experience in the field.
- KonferenzbeitragFingerprint recognition with cellular partitioning and co-sinusoidal triplets(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Hirzel, Jan; Hartung, Daniel; Busch, ChristophIn this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of fixed length. A related ISO standard recommends three different approaches for the selection of these. It suggests a cell size of approximately two ridges per cell. For the co-sinusoidal triplet approach for the retrieval of the spectral component this assumption was investigated. The influence of the cell size on the biometric performance was supported and additionally, a sound comparison method was implemented. To maintain a comprehensible evaluation the open Fingerprint Verification Competition (FVC) databases FVC2000 and FVC2002 were used.
- KonferenzbeitragIncreasing the reliability of biometric verification by using 3D face information and palm vein patterns(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Nikisins, Olegs; Greitans, Modris; Fuksis, Rihards; Pudzs, Mihails; Serzane, ZandaThe improvment of the reliability for biometric image-based identification systems is discussed in this paper. Accuracy rising of the verification process is based on two main principles: implementation of multidimensionality and advanced image acquisition. The multidimensionality principle is based on two factors: the system structure (multimodality of biometric system) and the acquired biometric data (visual and spatial information about the object). The advanced image acquisition is based on multi-view principle and photography that is sensitive in infrared spectrum.
- KonferenzbeitragThe meaningful, safe and reliable use of biometrics(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Grijpink, Jan H. A. M.This paper introduces the current results of the debates within the Netherlands Biometrics Forum (NBF) on the principles that lead to a meaningful safe and reliable use of biometrics. Biometrics is becoming an important element of our information society, but new technology is often initially used incorrectly. This is partly due to so-called fallacies of the wrong level. In practice, large-scale systems tend to work out differently compared with small-scale applications, thus presenting additional problems at that larger scale that should have been taken into account during design and development. That implies that the first major applications can confront us with worrying social risks for which effective solutions have yet to be found. This paper, therefore, proposes to explicitly use the concept of identity fraud (identity theft) as litmus test of any biometrics application. The point is made that excessive concern about privacy inadvertently exacerbates these social risks. It is made clear that the assessment criterion 'safety' implies the protection of privacy, but that this does not necessarily apply the other way round. Because current large-scale applications seem to have neglected major privacy and security risks, this paper is primarily meant to stimulate this debate.
- KonferenzbeitragModular biometric authentication service system (MBASSy)(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Witte, Heiko; Nickel, ClaudiaIn this paper we present the design of a modular authentication system, which enables users to select an authentication procedure by preference. A survey, carried out by N.L. Clarke and S.M. Furnell [CF05], proved the classical PIN-authentication to be inconvenient for many users. Passwords and PINs are either secure or easy to remember. Since humans tend to forget complex permutations of characters and numbers, the chosen secrets are often insecure. The purpose of the system is to provide an infrastructure which allows the implementation and usage of alternative authentication procedures. This approach could lead to an increased acceptance of authentication on smartphones and thus an increased security of the devices. A prototype based on the concepts presented in this paper was implemented for the android operating system and a gait recognition module is being actively developed. Further modules like face recognition, voice recognition or graphical authentication schemes can be integrated which depicts the flexibility of the system.
- KonferenzbeitragPerformance of the fuzzy vault for multiple fingerprints(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Merkle, Johannes; Niesing, Matthias; Schwaiger, Michael; Ihmor, Heinrich; Korte, UlrikeThe fuzzy vault is an error tolerant authentication method that ensures the privacy of the stored reference data. Several publications have proposed the application of the fuzzy vault to fingerprints, but the results of subsequent analyses indicate that a single finger does not contain sufficient information for a secure implementation. In this contribution, we present an implementation of a fuzzy vault based on minutiae information in several fingerprints aiming at a security level comparable to current cryptographic applications. We analyze and empirically evaluate the security, efficiency, and robustness of the construction and several optimizations. The results allow an assessment of the capacity of the scheme and an appropriate selection of parameters.