Now showing items 1-10 of 26
When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system
Biometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not ...
Speedup for European epassport authentication
The overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on ...
A biometric key-binding scheme using lattice masking
Template protection technology can protect the confidentiality of a biometric template by certain conversion. We focus on the key-binding approach for template protection. This approach generates a secure template (or a conversion template) from joint data of a user's specific key with a user's template, and the key can ...
On the vulnerability of finger vein recognition to spoofing
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out ...
Fixed FAR vote fusion of regional facial classifiers
Holistic face recognition methods like PCA and LDA have the disadvantage that they are very sensitive to expression, hair and illumination variations. This is one of the main reasons they are no longer competitive in the major benchmarks like FRGC and FRVT. In this paper we present an LDA based approach that combines ...
Assessing facial age similarity: A framework for evaluating the robustness of different feature sets
A framework that can be used for assessing the suitability of different feature vectors in the task of determining the age similarity between a pair of faces is
Evaluation of independence between multiple fingerprints for multibiometrics
Multibiometrics provides high recognition accuracy and population coverage by combining different biometric sources. However, some multibiometrics may obtain smaller-than-expected improvement of recognition accuracy if the combined biometric sources are dependent in terms of a false acceptance by mistakenly perceiving ...
Pre-processing cascades and fusion in finger vein recognition
Preprocessing and fusion techniques for finger vein recognition are investigated. An experimental study involving a set of preprocessing approaches shows the importance of selecting the appropriate single technique and the usefulness of cascading several different preprocessing methods for subsequent feature extraction ...
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
This paper re-examines the threat of spoofing or presentation attacks in the context of automatic speaker verification (ASV). While voice conversion and speech synthesis attacks present a serious threat, and have accordingly received a great deal of attention in the recent literature, they can only be implemented with a ...