P164 - BIOSIG 2010 - Proceedings of the 9th International Conference of the Biometrics Special Interest Group
Auflistung P164 - BIOSIG 2010 - Proceedings of the 9th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 15
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragActivity related biometrics based on motion trajectories(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Drosou, Anastasios; Moustakas, Konstantinos; Ioannidis, Dimos; Tzovaras, DimitriosThe current paper contributes to the concept of activity-related biometric authentication in ambient Intelligence environments. The motivation behind the proposed approach derives from activity-related biometrics and is mainly focusing on everyday activities. The activity sequence is captured by a stereoscopic camera and the resulting 2.5D data are processed to extract valuable unobtrusive activity-related features. The novel contribution of the current work lies in the warping of the extracted movements trajectories, so as to compensate for different environmental settings. Au- thentication is performed utilizing both HMM and GMMs. The authentication results performed on a database with 32 subjects show that the current work outperforms existing approaches especially in the case of non-interaction restricting scenarios.
- KonferenzbeitragUser survey on phone security and usage(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Breitinger, Frank; Nickel, ClaudiaMobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a wide variety of data stored on the devices which could be a high security risk in case of unauthorized access. A comprehensive user survey was conducted to get information about what data is really stored on the mobile devices, how it is currently protected and if biometric authentication methods could improve the current state. This paper states the results from about 550 users of mobile devices. The analysis revealed a very low securtiy level of the devices. This is partly due to a low security awareness of their owners and partly due to the low acceptance of the offered authentication method based on PIN. Further results like the experiences with mobile thefts and the willingness to use biometric authentication methods as alternative to PIN authentication are also stated.
- KonferenzbeitragTemplate protection for biometric gait data(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Nickel, Claudia; Zhou, Xuebing; Busch, ChristophBiometric gait recognition is a well suited method for authentication on mobile devices as it is unobtrusive and concurrent. Hence, in contrast to PIN authentication it is no extra-effort for the user. The characteristic gait of a subject can be recorded using accelerometers which are nowadays already contained in many mobile devices. From this data biometric feature vectors can be extracted and stored as reference data on the device. Only if the user is not recognized by his walk an active authentication via PIN is necessary. As the number of attacks on mobile devices increases it cannot be assumed that the data stored on the device is under constant control of the subject. Therefore, template protection techniques should be applied to secure biometric data. As biometric gait recognition is a new field of research no specific template protection methods have been developed so far. This paper describes a new method for securing biometric gait features based on histograms and using the earth mover's distance for comparison. The method is tested with gait data of 48 subjects recorded using a mobile phone and the results are compared to the ones obtained without template protection.
- KonferenzbeitragTowards best practices for biometric visa enrolment(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Rahmun, Fares; Hick, SibyllePublic sector applications - e.g. the process of application of a biometric visa - are connected to different kinds of technical, organisational, and legal requirements. But how can those requirements and recommendations be retrieved, analysed and described? The German federal government has taken part in the European pilot project BioDEV II in order to gain comprehensive experiences regarding the handling and processing of biometric visa. Furthermore, the Federal Office for Information Security (BSI) publishes technical guidelines that address different topics in information security. In this context, the Technical Guideline Biometrics for Public Sector (TR Biometrics) has been published in order to describe technical and organisational requirements and recommendations in the context of biometrics for electronic identity documents. In this paper the authors give an overview of the pilot project BioDEV II and show how the results have been introduced in the TR Biometrics.
- KonferenzbeitragIncreasing the reliability of biometric verification by using 3D face information and palm vein patterns(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Nikisins, Olegs; Greitans, Modris; Fuksis, Rihards; Pudzs, Mihails; Serzane, ZandaThe improvment of the reliability for biometric image-based identification systems is discussed in this paper. Accuracy rising of the verification process is based on two main principles: implementation of multidimensionality and advanced image acquisition. The multidimensionality principle is based on two factors: the system structure (multimodality of biometric system) and the acquired biometric data (visual and spatial information about the object). The advanced image acquisition is based on multi-view principle and photography that is sensitive in infrared spectrum.
- KonferenzbeitragBiometric systems in future preventive scenarios – Legal issues and challenges(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Hornung, Gerrit; Desoi, Monika; Pocs, MatthiasThe privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may develop and change with the technical enhancement of the respective systems, which also induces the emergence of new application scenarios. One group of such new scenarios appears to be the prevention of criminal or in other ways dangerous behaviour. From a legal point of view, this brings about new challenges which go well beyond the problems of authentication as such. While some of the features of the scenarios discussed below may not be feasible in the short term, it is apparent that the associated fundamental rights and data protection law problems will have to be addressed in the future. This applies to the international plane as well as to national legal orders, for which Germany will serve as an example in the following.
- KonferenzbeitragModular biometric authentication service system (MBASSy)(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Witte, Heiko; Nickel, ClaudiaIn this paper we present the design of a modular authentication system, which enables users to select an authentication procedure by preference. A survey, carried out by N.L. Clarke and S.M. Furnell [CF05], proved the classical PIN-authentication to be inconvenient for many users. Passwords and PINs are either secure or easy to remember. Since humans tend to forget complex permutations of characters and numbers, the chosen secrets are often insecure. The purpose of the system is to provide an infrastructure which allows the implementation and usage of alternative authentication procedures. This approach could lead to an increased acceptance of authentication on smartphones and thus an increased security of the devices. A prototype based on the concepts presented in this paper was implemented for the android operating system and a gait recognition module is being actively developed. Further modules like face recognition, voice recognition or graphical authentication schemes can be integrated which depicts the flexibility of the system.
- KonferenzbeitragPerformance of the fuzzy vault for multiple fingerprints(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Merkle, Johannes; Niesing, Matthias; Schwaiger, Michael; Ihmor, Heinrich; Korte, UlrikeThe fuzzy vault is an error tolerant authentication method that ensures the privacy of the stored reference data. Several publications have proposed the application of the fuzzy vault to fingerprints, but the results of subsequent analyses indicate that a single finger does not contain sufficient information for a secure implementation. In this contribution, we present an implementation of a fuzzy vault based on minutiae information in several fingerprints aiming at a security level comparable to current cryptographic applications. We analyze and empirically evaluate the security, efficiency, and robustness of the construction and several optimizations. The results allow an assessment of the capacity of the scheme and an appropriate selection of parameters.
- KonferenzbeitragA reference framework for the privacy assessment of keyless biometric template protection systems(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Kevenaar, Tom; Korte, Ulrike; Merkle, Johannes; Niesing, Matthias; Ihmor, Heinrich; Busch, Christoph; Zhou, XuebingOver the past decades, a number of methods have been reported in the scientific literature to protect the privacy of biometric information stored in biometric systems. Keyless Biometric Template Protection (KBTP) methods aim to protect biometric information without the use of long-term secrets by deploying one-way functions. These KBTP methods are currently developed to an extent that commercial products have become available. When assessing and comparing different KBTP methods it is important to have a common and generic approach. Therefore, in this paper we present a reference framework that can be used in assessing and comparing the privacy properties of KBTP systems.
- KonferenzbeitragFingerprint recognition with cellular partitioning and co-sinusoidal triplets(BIOSIG 2010: Biometrics and Electronic Signatures. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 2010) Hirzel, Jan; Hartung, Daniel; Busch, ChristophIn this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of fixed length. A related ISO standard recommends three different approaches for the selection of these. It suggests a cell size of approximately two ridges per cell. For the co-sinusoidal triplet approach for the retrieval of the spectral component this assumption was investigated. The influence of the cell size on the biometric performance was supported and additionally, a sound comparison method was implemented. To maintain a comprehensible evaluation the open Fingerprint Verification Competition (FVC) databases FVC2000 and FVC2002 were used.