P155 - BIOSIG 2009 - Proceedings of the 8th International Conference of the Biometrics Special Interest Group
Auflistung P155 - BIOSIG 2009 - Proceedings of the 8th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 19
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragThe extended access control for machine readable travel documents(BIOSIG 2009: biometrics and electronic signatures, 2009) Chaabouni, Rafik; Vaudenay, SergeMachine Readable travel documents have been rapidly put in place since 2004. The initial standard was made by the ICAO and it has been quickly followed by the Extended Access Control (EAC). In this paper we discuss about the evolution of these standards and more precisely on the evolution of EAC. We intend to give a realistic survey on these standards. We discuss about their problems, such as the inexistence of a clock in the biometric passports and the absence of a switch preventing the lecture of a closed passport. We also look at the issue with retrocompatibility that could be easily solved and the issue with terminal revocation that is harder.
- KonferenzbeitragA survey of distributed biometric authentication systems(BIOSIG 2009: biometrics and electronic signatures, 2009) Sarier, Neyire DenizIn ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to detach the biometric data storage from the service provider. Besides, a new security model is defined using the notions of Identity and Transaction Privacy, which guarantees the privacy of the identity-biometrics relationship under the assumption of non-colluding servers. In this survey, we review the scheme of Bringer et al and the following biometric verification systems that improve upon it in terms of computation and communication complexity. In this context, we discuss about the recent result of Sarier, which describes a secure and efficient multi-factor authentication scheme with a different biometric storage method that results in reduced computation and database storage cost.
- KonferenzbeitragQuantitative standardization of iris image formats(BIOSIG 2009: biometrics and electronic signatures, 2009) Grother, PatrickThis paper gives performance-based results for the application of a leading recognition algorithm applied to standardized iris imagery. The implementation was evaluated in NIST's IREX program. The program was conducted in cooperation with the iris recognition industry to evaluated whether standardized image formats can be interoperable and compact. This is required for federated applications in which iris data is exchanged between interoperating systems, passed across bandwidth-limited networks, or stored on identity credentials. The study gave quantitative support to the revision of the ISO/IEC 19794-6 standard. This paper shows the effect of compression on false non-match rate and also, notably on false match rate also. The paper compares JPEG and JPEG 2000.
- KonferenzbeitragSAMLizing the European citizen card(BIOSIG 2009: biometrics and electronic signatures, 2009) Eichholz, Jan; Hühnlein, Detlef; Schwenk, JörgWhile the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quite a few European countries which are about to introduce national ID cards, which are compliant to the European Citizen Card (ECC) specification prTS 15480. The present contribution shows how these two seemingly opposite approaches may be integrated in a seamless and secure fashion such that it is possible to use the security features of the ECC in a federated scenario, which allows easy integration of Service Providers.
- KonferenzbeitragMulti-sample fusion with template protection(BIOSIG 2009: biometrics and electronic signatures, 2009) Kelkboom, Emile J. C.; Breebaart, Jeroen; Veldhuis, Raymond N. J.; Zhou, Xuebing; Busch, ChristophThe widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, fuzzy extractors, and cancelable biometrics were introduced, also known as the field of template protection. Besides these developments, fusion of multiple sources of biometric information have shown to improve the verification performance of the biometric system. Our work consists of analyzing feature-level fusion in the context of the template protection framework using the helper-data system. We verify the results using the FRGC v2 database and two feature extraction algorithms.
- KonferenzbeitragBiometrie - Beschleuniger oder Bremser von Identitätsdiebstahl(BIOSIG 2009: biometrics and electronic signatures, 2009) Busch, ChristophDer Beitrag betrachtet die Fragestellung, ob Biometrie als Beschleuniger oder Bremser von Identitätsdiebstahl betrachtet werden sollte. Dazu werden Szenarien betrachtet, in denen umfangreich Gesichtsbilddaten gesammelt werden. Diese Szenarien werden anhand etablierter Definitionen analysiert. Ferner werden Vorfälle von Identitätsmissbrauch betrachtet und eine Bewertung von Schutzmechanismen gegeben.
- KonferenzbeitragA note on the protection level of biometric data in electronic passports(BIOSIG 2009: biometrics and electronic signatures, 2009) Baier, Harald; Straub, TobiasFollowing regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio frequency chip for storing personal data. The chip of a first generation German passport only duplicates the information which is already printed on the passport. In the current second version there are now also two fingerprints as additional biometric attributes apart from the digital facial image of the document owner. The note at hand concentrates on attack vectors of biometric characteristics contained in the RF chip and discusses which threats towards fingerprints are thwarted. Our gist is to point to the low protection level of the facial image on the one hand and the high protection level of fingerprints on the other hand although both biometric characteristics are easy to gather.
- KonferenzbeitragTamper-proof and privacy-protected fingerprint identification systems(BIOSIG 2009: biometrics and electronic signatures, 2009) Schwaiger, MichaelIn this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With its help it is possible to highly protect a system from any external attacker but an internal attacker still has direct access to all stored biometric data. This risk shall be avoided by using biometric encryption with another approach. In the following both approaches will be described and compared.
- Editiertes Buch
- KonferenzbeitragSemantic conformance testing methodology for finger minutiae data(BIOSIG 2009: biometrics and electronic signatures, 2009) Lodrova, Dana; Busch, Christoph; Tabassi, Elham; Krodel, Wolfgang; Drahansky, MartinThis paper proposes a methodology to measure the semantic conformance rate of standardized biometric minutia interchange records. The paper proposes a fingerprint modality specific assertion test. A conformance test based on this methodology can attest for a given algorithm or software under test that the generated minutiae templates are a faithful representation of the input signal (i.e. fingerprint image). The test methodology is based on ground truth data that has been composed by dactyloscopic experts. As individual experts assessment yields slightly diverging coordinates a clustering algorithm is proposed that merges a set of manually placed minutia into one ground truth data set. The methodology is evaluated on ten-print fingerprint images and the NIST baseline minutia extraction algorithm.