P155 - BIOSIG 2009 - Proceedings of the 8th International Conference of the Biometrics Special Interest Group
Auflistung P155 - BIOSIG 2009 - Proceedings of the 8th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 19
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragSpectral selection for a biometric recognition system based on hand veins detection through image spectrometry(BIOSIG 2009: biometrics and electronic signatures, 2009) Cortés, Franciso; Aranda, José M.; Sanchez-Reillo, Raul; Meléndez, Juan; López, FernandoThis paper presents the result of a work orientated to the spectral optimization of the acquisition devices in vascular biometrics systems. Spectral windows are proposed which will allow to design a multispectral system with a few and well defined bands, obtaining a more robust and reliable device, compared with the standard single band systems. This is in accordance to general trend of electro-optical and infrared acquisition systems in the field of the detection and remote sensing, where the work focus is on obtaining optimized bands. To carry out this work a Hyperespectral Imaging System (HIS) has been used as the acquisition system. In order to analyze the large amount of information and to select the spectral bands, a Principal Component Analysis (PCA) has been done.
- KonferenzbeitragChallenges for the implementation and revision of international biometric standards demonstrated by the example of face image data(BIOSIG 2009: biometrics and electronic signatures, 2009) Ebinger, Peter; Neves, Margarida Castro; Salamon, René; Bausinger, OliverTravel documents such as the electronic passport (ePass) ensure that each person can be uniquely identified by a single document. The development of new ePass security chip technologies allows for the inclusion of biometric properties in the data carrier of the ePass. The International Civil Aviation Organization (ICAO) has determined a personal photograph as being the interoperable feature for all global travel documents; ICAO [Gro04] regulations reference quality requirements for facial images as defined in ISO standard ISO/IEC 19794-5 [Intb]. Project FIReBIRDs goal is to prepare an international facial image database for conformity tests based on ISO/IEC 19794-5 [Intb], to analyze the requirements in the regulating documents, and to develop suggestions for adaptations and extensions of these standards. The FIReBIRD database shall provide a well-defined ground truth for level 3 conformance testing. For this purpose the specifications in the standard were thoroughly analyzed and in some parts refined to allow for a precise definition of ground truth. We show with two examples that there might be a defined common-sense definition for some parameters, but they are not measurable and their specification is not scientifically founded: the definition of full frontal view and the definition of eye and hair colors. Our results show that specifications and requirements should always be checked for necessity, practicability and usability and that a continued review and revision of biometric standards is necessary.
- KonferenzbeitragMinutiae interoperability(BIOSIG 2009: biometrics and electronic signatures, 2009) Tabassi, Elham; Grother, Patrick; Salamon, Wayne; Watson, CraigMany large scale identity management applications require storage and exchange of standardized minutiae templates. Minutia templates offer a more spaceefficient, less resource intensive, and more cost effective alternative to raw images. Recent minutiae interoperability tests (ILO, MTIT, MINEX ) all reported variation in minutia selection and placement as the major factor affecting interoperability. This paper quantifies their effects and investigates how variation in selection and placement of minutia from different suppliers relates to loss of performance compared with proprietary templates. We concur with MTIT findings that conformance testing methodologies for evaluating the semantic content of minutia templates is essential and interoperability can be improved by closer adherence to the minutia placement requirement defined in a standard.
- KonferenzbeitragReverse public key encryption(BIOSIG 2009: biometrics and electronic signatures, 2009) Naccache, David; Steinwandt, Rainer; Yung, MotiThis exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let Ɛ be a public-key encryption algorithm. We observe that if the distributions Ɛ (pk0, \⦁ ) and Ɛ (pk1, \⦁ ) are indistinguishable for two public keys pk0, pk1, then a message bit b ∈ {0, 1} can be embedded in the choice of pkb. As the roles of the public-key and the plaintext are reversed, we refer to the new mode of operation as Reverse Public-Key Encryption (rpke). We present examples of and variations on the idea and explore RPKE's relationship with key privacy, and we also discuss how to employ it to enable a new implementation of deniable encryption.
- KonferenzbeitragOn-line signature biometrics using support vector machine(BIOSIG 2009: biometrics and electronic signatures, 2009) Mendaza-Ormaza, Aitor; Miguel-Hurtado, Oscar; Rubio-Polo, Ivan; Alonso-Moreno, Raul
- KonferenzbeitragSanitizable signatures: how to partially delegate control for authenticated data(BIOSIG 2009: biometrics and electronic signatures, 2009) Brzuska, Christina; Fischlin, Marc; Lehmann, Anja; Schröder, DominiqueSanitizable signatures have been introduced by Ateniese et al. (ESORICS 2005) and allow an authorized party, the sanitizer, to modify a predetermined part of a signed message without invalidating the signature. Brzuska et al. (PKC 2009) gave the first comprehensive formal treatment of the five security properties for such schemes. These are unforgeability, immutability, privacy, transparency and accountability. They also provide a modification of the sanitizable signature scheme proposed by Ateniese et al. such that it provably satisfies all security requirement. Unfortunately, their scheme comes with rather large signature sizes and produces computational overhead that increases with the number of admissible modifications. In this paper we show that by sacrificing the transparency property - thus allowing to distinguish whether a message has been sanitized or notwe can obtain a sanitizable signature scheme that is still provably secure concerning the other aforementioned properties but significantly more efficient. We propose a construction that is based solely on regular signature schemes, produces short signatures and only adds a small computational overhead.
- KonferenzbeitragSupplemental biometric user authentication for digital-signature smart cards(BIOSIG 2009: biometrics and electronic signatures, 2009) Henniger, Olaf; Waldmann, UlrichThis paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card standards. After successful PIN verification, multiple digital signatures can be created; each signature creation, however, is preceded by biometric verification.
- KonferenzbeitragTamper-proof and privacy-protected fingerprint identification systems(BIOSIG 2009: biometrics and electronic signatures, 2009) Schwaiger, MichaelIn this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With its help it is possible to highly protect a system from any external attacker but an internal attacker still has direct access to all stored biometric data. This risk shall be avoided by using biometric encryption with another approach. In the following both approaches will be described and compared.
- Editiertes Buch
- KonferenzbeitragSemantic conformance testing methodology for finger minutiae data(BIOSIG 2009: biometrics and electronic signatures, 2009) Lodrova, Dana; Busch, Christoph; Tabassi, Elham; Krodel, Wolfgang; Drahansky, MartinThis paper proposes a methodology to measure the semantic conformance rate of standardized biometric minutia interchange records. The paper proposes a fingerprint modality specific assertion test. A conformance test based on this methodology can attest for a given algorithm or software under test that the generated minutiae templates are a faithful representation of the input signal (i.e. fingerprint image). The test methodology is based on ground truth data that has been composed by dactyloscopic experts. As individual experts assessment yields slightly diverging coordinates a clustering algorithm is proposed that merges a set of manually placed minutia into one ground truth data set. The methodology is evaluated on ten-print fingerprint images and the NIST baseline minutia extraction algorithm.