P230 - BIOSIG 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group
Auflistung P230 - BIOSIG 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 26
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragFuzzy vault and template-level fusion applied to a binary fingerprint representation(BIOSIG 2014, 2014) Bringer, Julien; Favre, Mélanie; Pelle, Chloé; Saxcé, Hughes DeThe fuzzy vault is an error-tolerant authentication scheme that stores data in a privacy-preserving way. It allows to hide and retrieve a secret by presenting a set of elements that can slightly differ. This paper aims at applying the scheme to a transformation-invariant binary fingerprint representation. We also show how to perform multi-finger fusion with no extra space requirement and perform fuzzy vault in this case. Our results are quite encouraging with respect to the inherent constraint of decreasing False Accept attacks on template protection schemes in order to ensure higher privacy.
- KonferenzbeitragSmartphone Authentication System Using Periocular Biometrics(BIOSIG 2014, 2014) Raja, Kiran B.; Ramachandra, Raghavendra; Stokkenes, Martin; Busch, ChristophThe increasing usage of smartphones has raised security concerns regarding these devices due to presence of high amount of personal and sensitive data. The risk is higher without a proper mechanism to handle the authentication to access the smartphone device. In this work, we present a standalone modular biometric system based on periocular information to authenticate towards device. The proposed system has been implemented on the Android operating system. We field tested and evaluated the proposed system using a new database acquired capturing samples with three different devices. We apply the three well known feature extraction techniques, SIFT, SURF and BSIF independently in the proposed peroicular based authentication system. The best performance achieved with GM R = 89.38\% at F M R = 0.01\% indicates the applicability of the proposed periocular based mobile authentication system in a reallife scenario.
- KonferenzbeitragSpeedup for European epassport authentication(BIOSIG 2014, 2014) Peeters, Roel; Hermans, Jens; Mennink, BartThe overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on verification of biometrics. We demonstrate that our proposed solution allows to replace the current combination of PACE and EAC with a more efficient authentication procedure that provides even better security and privacy guarantees. When abstracting away from the time needed for the ePassport to verify the terminal's certificate, a speed-up of at least 40\% in comparison with the current ePassport authentication procedure is to be expected.
- KonferenzbeitragGenerating and analyzing synthetic finger vein images(BIOSIG 2014, 2014) Hillerström, Fieke; Kumar, Ajay; Veldhuis, Raymond N. J.The finger-vein biometric offers a higher degree of security, personal privacy and strong anti-spoofing capabilities than most other biometric modalities employed today. Emerging privacy concerns with the database acquisition and lack of availability of large scale finger-vein databases have posed challenges in exploring this technology for large scale applications. This paper details the first attempt to synthesize finger-vein images and presents analysis of synthesized images for the biometrics authentication. We generate a database of 50,000 fingervein images, corresponding to 5000 different subjects, with 10 different synthesized finger-vein images from each of the subject. We use tractable probability models to compare synthesized finger-vein images with the real fingervein images for their image variability. This paper also presents matching accuracy using the synthesized finger-vein database from 5000 different subjects, using 225,000 genuine and 1249,750,000 impostor matching scores, which suggests significant promises from finger-vein biometric modality for the large scale biometrics applications.
- Konferenzbeitrag3D face recognition on low-cost depth sensors(BIOSIG 2014, 2014) Mráček, Štěpán; Drahanský, Martin; Dvořák, Radim; Provazník, Ivo; Váňa, JanThis paper deals with the biometric recognition of 3D faces with the emphasis on the low-cost depth sensors; such are Microsoft Kinect and SoftKinetic DS325. The presented approach is based on the score-level fusion of individual recognition units. Each unit processes the input face mesh and produces a curvature, depth, or texture representation. This image representation is further processed by specific Gabor or Gauss-Laguerre complex filter. The absolute response is then projected to lowerdimension representations and the feature vector is thus extracted. Comparison scores of individual recognition units are combined using transformation-based, classifierbased, or density-based score-level fusion. The results suggest that even poor quality low-resolution scans containing holes and noise might be successfully used for recognition in relatively small databases.
- KonferenzbeitragA two-factor protection scheme for MCC fingerprint templates(BIOSIG 2014, 2014) Ferrara, Matteo; Maltoni, Davide; Cappelli, RaffaeleMinutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint matching. To avoid that MCC templates can disclose sensitive information about position and angle of minutiae, a protected MCC representation was recently
- KonferenzbeitragEvaluation of independence between multiple fingerprints for multibiometrics(BIOSIG 2014, 2014) Yamada, Shigefumi; Shinzaki, TakashiMultibiometrics provides high recognition accuracy and population coverage by combining different biometric sources. However, some multibiometrics may obtain smaller-than-expected improvement of recognition accuracy if the combined biometric sources are dependent in terms of a false acceptance by mistakenly perceiving biometric features from two different persons as being from the same person. In this paper, we evaluated whether or not features of multiple fingerprints from a same person are statistically independent. By evaluating false acceptance error using matching scores obtained by Verifinger SDK, we confirmed that these features were dependent and the FAR obtained by a fusion of the multiple fingerprints could be affected by the dependence.
- KonferenzbeitragWhen a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system(BIOSIG 2014, 2014) Hermans, Jens; Mennink, Bart; Peeters, RoelBiometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds with probability at least 96\%. We also present a security analysis on generating false positives or recovering the key, both leading to undesirably low attack complexities: 225 for generating false positives for the smaller versions of the scheme, and a complexity between 22 and 28 for recovering the secret key.
- KonferenzbeitragFingerprint pore characteristics for liveness detection(BIOSIG 2014, 2014) Johnson, Peter; Schuckers, Stephanie
- Editiertes BuchBIOSIG 2014(2014)
- «
- 1 (current)
- 2
- 3
- »