P230 - BIOSIG 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group
Autor*innen mit den meisten Dokumenten
Neueste Veröffentlichungen
- KonferenzbeitragOn the vulnerability of finger vein recognition to spoofing(BIOSIG 2014, 2014) Tome, Pedro; Vanoni, Matthias; Marcel, SébastienThe vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Experimental results lead to a spoofing false accept rate of 86\%, thus showing that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions.
- KonferenzbeitragPre-processing cascades and fusion in finger vein recognition(BIOSIG 2014, 2014) Kauba, Christoph; Reissig, Jakob; Uhl, AndreasPreprocessing and fusion techniques for finger vein recognition are investigated. An experimental study involving a set of preprocessing approaches shows the importance of selecting the appropriate single technique and the usefulness of cascading several different preprocessing methods for subsequent feature extraction of various types. Score level fusion is able to significantly improve recognition results, in particular when combining features describing complementary finger image properties.
- KonferenzbeitragSpeedup for European epassport authentication(BIOSIG 2014, 2014) Peeters, Roel; Hermans, Jens; Mennink, BartThe overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on verification of biometrics. We demonstrate that our proposed solution allows to replace the current combination of PACE and EAC with a more efficient authentication procedure that provides even better security and privacy guarantees. When abstracting away from the time needed for the ePassport to verify the terminal's certificate, a speed-up of at least 40\% in comparison with the current ePassport authentication procedure is to be expected.
- KonferenzbeitragWhen a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system(BIOSIG 2014, 2014) Hermans, Jens; Mennink, Bart; Peeters, RoelBiometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds with probability at least 96\%. We also present a security analysis on generating false positives or recovering the key, both leading to undesirably low attack complexities: 225 for generating false positives for the smaller versions of the scheme, and a complexity between 22 and 28 for recovering the secret key.
- KonferenzbeitragShattering the glass maze(BIOSIG 2014, 2014) Hermans, Jens; Peeters, Roel; Mennink, BartTemplate protection plays a crucial role in protecting the privacy of biometric data, by providing irreversibility and unlinkability. The Glass Maze, as presented by Trugenberger at BIOSIG 2011, is a fingerprint key binding mechanism that is claimed to provide template protection. With the correct fingerprint, the key that is entangled with the fingerprint data can be retrieved. The template protection of the Glass Maze is based on the convergence properties of a Hopfield model, a neural network. We however show how to revert the Glass Maze to recover the key, without requiring a correct fingerprint. This completely breaks the irreversibility property, and hence also unlinkability.
- KonferenzbeitragBimodal palm biometric feature extraction using a single RGB image(BIOSIG 2014, 2014) Eglitis, Teodors; Pudzs, Mihails; Greitans, ModrisThis paper proposes a method for palm bimodal biometric feature (vein and crease pattern) acquisition from a single RGB image. Typical bimodal biometric systems require combining infrared and visible images for this task. We use a single CMOS color sensor and a specific illumination comprising of two wavelengths to acquire the image. As a result each biometric modality is more pronounced in its own color channel. The image is processed by applying adapted matched filters with nonlinear modifications. Performance of the proposed method is evaluated against feature separation with optical band-pass and band-stop approach on a database of 64 people. The results show the average true positive rate is 70.6 \% for vein detection and 64.7 \% for crease detection, whereas in 14.8 \% and 9.29 \% of the cases feature of wrong modality is detected.
- KonferenzbeitragSymmetry assessment by finite expansion: application to forensic fingerprints(BIOSIG 2014, 2014) Mikaelyan, Anna; Bigun, JosefCommon image features have too poor information for identification of forensic images of fingerprints, where only a small area of the finger is imaged and hence a small amount of key points are available. Noise, nonlinear deformation, and unknown rotation are additional issues that complicate identification of forensic fingerprints. We propose a feature extraction method which describes image information around key points: Symmetry Assessment by Finite Expansion (SAFE). The feature set has built-in quality estimates as well as a rotation invariance property. The theory is developed for continuous space, allowing compensation for features directly in the feature space when images undergo such rotation without actually rotating them. Experiments supporting that use of these features improves identification of forensic fingerprint images of the public NIST SD27 database are presented. Performance of matching orientation information in a neighborhood of core points has an EER of 24\% with these features alone, without using minutiae constellations, in contrast to 36\% when using minutiae alone. Rank-20 CMC is 58\%, which is lower than 67\% when using notably more manually collected minutiae information.
- KonferenzbeitragFuzzy vault and template-level fusion applied to a binary fingerprint representation(BIOSIG 2014, 2014) Bringer, Julien; Favre, Mélanie; Pelle, Chloé; Saxcé, Hughes DeThe fuzzy vault is an error-tolerant authentication scheme that stores data in a privacy-preserving way. It allows to hide and retrieve a secret by presenting a set of elements that can slightly differ. This paper aims at applying the scheme to a transformation-invariant binary fingerprint representation. We also show how to perform multi-finger fusion with no extra space requirement and perform fuzzy vault in this case. Our results are quite encouraging with respect to the inherent constraint of decreasing False Accept attacks on template protection schemes in order to ensure higher privacy.
- KonferenzbeitragSmartphone Authentication System Using Periocular Biometrics(BIOSIG 2014, 2014) Raja, Kiran B.; Ramachandra, Raghavendra; Stokkenes, Martin; Busch, ChristophThe increasing usage of smartphones has raised security concerns regarding these devices due to presence of high amount of personal and sensitive data. The risk is higher without a proper mechanism to handle the authentication to access the smartphone device. In this work, we present a standalone modular biometric system based on periocular information to authenticate towards device. The proposed system has been implemented on the Android operating system. We field tested and evaluated the proposed system using a new database acquired capturing samples with three different devices. We apply the three well known feature extraction techniques, SIFT, SURF and BSIF independently in the proposed peroicular based authentication system. The best performance achieved with GM R = 89.38\% at F M R = 0.01\% indicates the applicability of the proposed periocular based mobile authentication system in a reallife scenario.
- KonferenzbeitragEvaluation of independence between multiple fingerprints for multibiometrics(BIOSIG 2014, 2014) Yamada, Shigefumi; Shinzaki, TakashiMultibiometrics provides high recognition accuracy and population coverage by combining different biometric sources. However, some multibiometrics may obtain smaller-than-expected improvement of recognition accuracy if the combined biometric sources are dependent in terms of a false acceptance by mistakenly perceiving biometric features from two different persons as being from the same person. In this paper, we evaluated whether or not features of multiple fingerprints from a same person are statistically independent. By evaluating false acceptance error using matching scores obtained by Verifinger SDK, we confirmed that these features were dependent and the FAR obtained by a fusion of the multiple fingerprints could be affected by the dependence.
- «
- 1 (current)
- 2
- 3
- »