Authentication Using Pulse-Response Biometrics
|
|
- Thomasine Barton
- 5 years ago
- Views:
Transcription
1 Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1.
2 A Bit About Myself Lecturer at University of Oxford. Current Research Topics Security of Wireless Networks Protocol design Applied Cryptography Security of embedded systems Cyber-physical systems Oh yes Biometrics. Slide 2.
3 Outline 1 Background on Biometrics 2 Pulse-Response 3 Security Applications 4 Experimental Results Slide 3.
4 Biometrics: A Definition Biometrics A means to identify individual human beings by their characteristics or traits. Slide 4.
5 Biometrics Behavioral Keystroke timing, speech pattern analysis, gait recognition and hand-writing Physiological Fingerprints, hand geometry, facial recognition, speech analysis and iris/retina scans Slide 5.
6 Biometrics Unobtrusive Keystroke timing, speech pattern analysis, gait recognition, hand-writing, facial recognition and speech analysis Invasive Fingerprints, hand geometry and iris/retina scans Slide 6.
7 Why a New Biometric? Some biometrics are secure but hard to use. Fingerprints Iris/Retina Others are less secure but easy to use. Face recognition Key-stroke dynamics Slide 7.
8 Biometric Design Goals 1 Universal: The biometric must be universally applicable, to the extent required by the application. 2 Unique: The biometric must be unique within the target population. 3 Permanent: The biometric must be consistent over the time period where it s used. Slide 8.
9 Biometric Design Goals...cont. 4 Unobtrusive: An unobtrusive biometric is much more likely to be accepted. 5 Difficult to circumvent: Essential for a biometric in any security context....also, for completeness Collectability, Acceptability and Cost Effectiveness Slide 9.
10 Biometrics in Security Identification Obtain the identity of a user. vs. Authentication Confirm the identity of a user. Slide 10.
11 Biometrics in Security Identification Obtain the identity of a user. vs. Authentication Confirm the identity of a user. Continuous Authentication Continuously confirm the identity of a user. Slide 11.
12 Pulse-Response Biometric Pulse signal applied to the palm of one hand. The biometric is captured by measuring the response in the user s hand. Slide 12.
13 User Safety Voltage (V) Max Current (ma) Exposure ns 500ms Slide 13.
14 Case 1: Hardening PIN Entry Slide 14.
15 Case 1: Hardening PIN Entry Biometric Properties Universality, Uniqueness, Permanence, Unobtrusiveness, Circumvention Difficulty Slide 15.
16 ATM Decision Flowchart Start Is PIN Correct? No Yes Accept! Yes Does pulse-response match? No Reject! End Slide 16.
17 ATM Decision Flowchart Start Is PIN Correct? No Yes Accept! Yes Does pulse-response match? No Reject! P break = P guess P forge End Slide 17.
18 Case 2: Continuous Authentication Slide 18.
19 Case 2: Continuous Authentication Biometric Properties Universality, Uniqueness, Permanence, Unobtrusiveness, Circumvention Difficulty Slide 19.
20 Cont. Auth. Decision Flowchart Start Yes Wait for login. Get pulse-response reference. Wait Reacquire pulse-response Does pulse-response match? No Take action. Pulse-response database Policy database End Slide 20.
21 Cont. Auth. Security "Start" Adv sits Passed biometric 1 down test 2 Start Wait for login. Get pulse-response reference. Wait Reacquire pulse-response Yes Does pulse-response match? No Take action. Detected 3 Pulse-response database Policy database End Slide 21.
22 Cont. Auth. Security "Start" Adv sits Passed biometric 1 down test 2 Start Wait for login. Get pulse-response reference. Wait Reacquire pulse-response Yes Does pulse-response match? No Take action. Detected 3 Pulse-response database Policy database End P = 0 1 α α 0 1 β β Slide 22.
23 Cont. Auth. Security P = 0 1 α α 0 1 β β Probabilities after i rounds, starting in state 1 [1, 0, 0] P i = [0, (1 α)(1 β) i 1, 1 (1 α)(1 β) i 1 ] Probability of detection (state 3) for i = 10 1 (1 α)(1 β) i 1 = 1 (1 0.99)(1 0.3) 10 1 = % Slide 23.
24 Cont. Auth. Security P = 0 1 α α 0 1 β β Probabilities after i rounds, starting in state 1 [1, 0, 0] P i = [0, (1 α)(1 β) i 1, 1 (1 α)(1 β) i 1 ] Probability of detection (state 3) for i = 10 1 (1 α)(1 β) i 1 = 1 (1 0.99)(1 0.3) 10 1 After 50 rounds this grows to % = % Slide 24.
25 Experimental Setup Slide 25.
26 Signals Signal magnitude [Volt] Input pulse Measured pulse Time [ns] Spectral density Frequency bins Slide 26.
27 Classification Slide 27.
28 Selecting the Classifier Support Vector Machine, Euclidean Distance, Latent Dirichlet Allocation, K-Nearest Neighbor Binary detection error rate 100% 75% 50% 25% Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin % SVM Euclidean LDA Knn SineLin SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SquareLin SquareLin Slide 28.
29 Selecting the Classifier 100% Binary detection error rate 100% 75% 50% 25% 0% Support Vector Machine, Euclidean Distance, Latent Dirichlet Allocation, K-Nearest Neighbor SVM Euclidean LDA Knn SVM Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin quarelin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin quarelin SquareLin Pulse % 50% Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin % 0% SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin Euclidean SineLin SineLin SineLin SineLin SquareLin SquareLin Pulse 1 1 Pulse Pulse SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SineLin SquareLin SquareLin SineL S Pulse Pulse 1 1 Slide 29.
30 ROC Curves True positive rate (TPR) Equal Error Rate Classifier Euclidean Mahalanobis SVM 0.00 Data set Over time Single data set False positive rate (FPR) Slide 30.
31 Authentication Classifier Over Time Sensitivity (TPR) 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% Aiden Jacob Mason Threshold [%] Ethan Liam Slide 31.
32 Auth: Single Session Sensitivity (TPR) 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% 100% 75% 50% 25% 0% Charles Ethan Liam Mason Richard David Jackson Lucas Noah Sophia Threshold [%] Slide 32.
33 Identification Classifier 100% Over time Single data set Sensitivity (TPR) 75% 50% 25% 0% Aiden Ethan Jacob Liam Mason Charles David Ethan Jackson Liam Lucas Mason Noah Richard Sophia Slide 33.
34 Future Work Prototype Build PIN entry prototype. Gather experience on acquisition time, etc. Gather more data. Acquisition Signal Higher bandwidth No signal Effects of stress, blood sugar levels, etc. Assess impersonation strategies. Slide 34.
35 WiSec 2014, in Oxford Slide 35.
36 Conclusion A new biometric based on Pulse-Response. Two simple application scenarios for Pulse-Response integration. Very promising results. Very high degree of uniqueness and good stability over time. Slide 36.
37 Conclusion Questions? A new biometric based on Pulse-Response. Two simple application scenarios for Pulse-Response integration. Very promising results. Very high degree of uniqueness and good stability over time. Thank you for your attention. Questions? kasper.rasmussen@cs.ox.ac.uk Slide 37.
Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationEfficient Signal Identification using the Spectral Correlation Function and Pattern Recognition
Efficient Signal Identification using the Spectral Correlation Function and Pattern Recognition Theodore Trebaol, Jeffrey Dunn, and Daniel D. Stancil Acknowledgement: J. Peha, M. Sirbu, P. Steenkiste Outline
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationDevice Pairing at the Touch of an Electrode
Device Pairing at the Touch of an Electrode Marc Roeschlin, Ivan Martinovic, Kasper B. Rasmussen NDSS, 19 February 2018 NDSS 2018 (slide 1) Device Pairing (I) Bootstrap secure communication Two un-associated
More informationUser Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno
CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationBiometric: EEG brainwaves
Biometric: EEG brainwaves Jeovane Honório Alves 1 1 Department of Computer Science Federal University of Parana Curitiba December 5, 2016 Jeovane Honório Alves (UFPR) Biometric: EEG brainwaves Curitiba
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationPreventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics Simon Eberz University of Oxford, UK simon.eberz@cs.ox.ac.uk Kasper B. Rasmussen University of Oxford, UK kasper.rasmussen@cs.ox.ac.uk
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationUser Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationEdge Histogram Descriptor for Finger Vein Recognition
Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationBIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the
More informationTransient-based Identification of Wireless Sensor Nodes
Transient-based Identification of Wireless Sensor Nodes ABSTRACT Boris Danev System Security Group ETH Zurich, Switzerland bdanev@inf.ethz.ch Identification of wireless sensor nodes based on the characteristics
More informationBIOMETRIC IDENTIFICATION USING 3D FACE SCANS
BIOMETRIC IDENTIFICATION USING 3D FACE SCANS Chao Li Armando Barreto Craig Chin Jing Zhai Electrical and Computer Engineering Department Florida International University Miami, Florida, 33174, USA ABSTRACT
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationSoftware LEIC/LETI. Lecture 21
Software Engineering @ LEIC/LETI Lecture 21 Last Lecture Offline concurrency patterns (continuation) Object-relational behavioral patterns Session state patterns Presentation logic Services Domain logic
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationPrivacy preserving data mining multiplicative perturbation techniques
Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationAuthentication using Iris
Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College
More informationFEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos
FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationPassive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-channel Femto Cell Underlays
Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-channel Femto Cell Underlays Presenter: Irwin O. Kennedy, Bell Labs Ireland Patricia Scanlon: Bell Labs Ireland
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationOUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS
1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationBiometrical verification based on infrared heat vein patterns
Proceedings of the 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015 Biometrical verification based on infrared heat vein patterns Elnaz Mazandarani a, Kaori Yoshida b,
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationDistinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design
Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Sundara Venkataraman, Dimitris Metaxas, Dmitriy Fradkin, Casimir Kulikowski, Ilya Muchnik DCS, Rutgers University, NJ November
More informationInvestigation of Recognition Methods in Biometrics
Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.
More informationLabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System
LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a
More informationVoice Activity Detection
Voice Activity Detection Speech Processing Tom Bäckström Aalto University October 2015 Introduction Voice activity detection (VAD) (or speech activity detection, or speech detection) refers to a class
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationA Comparison Study of Image Descriptors on Low- Resolution Face Image Verification
A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification Gittipat Jetsiktat, Sasipa Panthuwadeethorn and Suphakant Phimoltares Advanced Virtual and Intelligent Computing (AVIC)
More informationTowards Automated Forensic Pen Ink Verification by Spectral Analysis
Towards Automated Forensic Pen Ink Verification by Spectral Analysis Michael Kalbitz 1,2(B), Tobias Scheidat 1,2, Benjamin Yüksel 1, and Claus Vielhauer 1,2 1 Department of Informatics and Media, University
More informationECG Biometrics using Intuitive Bases and Support Vector Machines. Peter Sam Raj
ECG Biometrics using Intuitive Bases and Support Vector Machines by Peter Sam Raj A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationCory Cornelius. Usable Security for Wireless Body-Area Networks
Cory Cornelius Usable Security for Wireless Body-Area Networks Dartmouth Computer Science Technical Report TR2013-741 Submitted September 2013 Abstract We expect wireless body-area networks of pervasive
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationBiometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh
Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division
More informationI Think, Therefore I Am. Usability and Security of Authentication Using Brainwaves. John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson
I Think, Therefore I Am Usability and Security of Authentication Using Brainwaves John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson UC Berkeley 2013 Workshop on Usable Security April 1, 2013
More informationPunjabi Offline Signature Verification System Using Neural Network
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh
More informationIndoor navigation with smartphones
Indoor navigation with smartphones REinEU2016 Conference September 22 2016 PAVEL DAVIDSON Outline Indoor navigation system for smartphone: goals and requirements WiFi based positioning Application of BLE
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationDevice Pairing at the Touch of an Electrode
Device Pairing at the Touch of an Electrode Marc Roeschlin Department of Computer Science University of Oxford marc.roeschlin@cs.ox.ac.uk Ivan Martinovic Department of Computer Science University of Oxford
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationIRIS RECOGNITION USING GABOR
IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationSecurity System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Security System Using Biometric Technology: Design and Implementation of
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK USE OF AUTOMOTIVE SECURITY SYSTEM IN REAL TIME DECLINE OF CAR THEFT MR. R. A. MUKKAWAR,
More informationAuthenticated Automated Teller Machine Using Raspberry Pi
Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.
More informationDORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM
DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and
More informationCompound Object Detection Using Region Co-occurrence Statistics
Compound Object Detection Using Region Co-occurrence Statistics Selim Aksoy 1 Krzysztof Koperski 2 Carsten Tusk 2 Giovanni Marchisio 2 1 Department of Computer Engineering, Bilkent University, Ankara,
More informationNon-Contact Vein Recognition Biometrics
Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization
More informationCHAPTER 4 MINUTIAE EXTRACTION
67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationStudy and Analysis on Biometrics and Face Recognition Methods
37 Study and Analysis on Biometrics and Face Recognition Methods Anjani Kumar Singha Department of Computer Science and Engineering Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand Anshu Singla Department
More informationSensors. CSE 666 Lecture Slides SUNY at Buffalo
Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various
More informationHuman Recognition Using Biometrics: An Overview
Human Recognition Using Biometrics: An Overview Arun Ross 1 and Anil K. Jain 2 1 Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506 arun.ross@mail.wvu.edu
More informationA Survey of Multibiometric Systems
A Survey of Multibiometric Systems Harbi AlMahafzah P.E.T. Research Center, University Of Mysore, Mandya, India hmahafzah@hotmail.com Ma en Zaid AlRwashdeh Department of Study in Computer science, University
More informationDesign of Finger-vein Capture Device with Quality Assessment using Arduino Microcontroller
Design of Finger-vein Capture Device with Quality Assessment using Arduino Microcontroller A.R. Syafeeza 1, K. Faiz 2, K. Syazana-Itqan 3, Y. C. Wong 4, Zarina Mohd Noh 5, M.M. Ibrahim 6, N. M. Mahmod
More informationSPECIFIC EMITTER IDENTIFICATION FOR GSM CELLULAR TELEPHONES. Jeevan Ninan Samuel
SPECIFIC EMITTER IDENTIFICATION FOR GSM CELLULAR TELEPHONES by Jeevan Ninan Samuel Submitted in partial fulfilment of the requirements for the degree Master of Engineering (Computer Engineering) in the
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationSecure Location Verification with Hidden and Mobile Base Stations
Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint
More informationAuto-tagging The Facebook
Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely
More informationAutomated Signature Detection from Hand Movement ¹
Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify
More informationRank 50 Search Results Against a Gallery of 10,660 People
Market Comparison Summary This document provides a comparison of Aurora s face recognition accuracy against other biometrics companies and academic institutions. Comparisons against three major benchmarks
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationCan Implementing Smart City Technologies Save the African Cities? Part I
6 Can Implementing Smart City Technologies Save the African Cities? Part I PROF. JOSEPH M. KIZZA 1, Editor-in-Chief Department of Computer Science and Engineering, The University of Tennessee-Chattanooga,
More informationComputer Vision in Human-Computer Interaction
Invited talk in 2010 Autumn Seminar and Meeting of Pattern Recognition Society of Finland, M/S Baltic Princess, 26.11.2010 Computer Vision in Human-Computer Interaction Matti Pietikäinen Machine Vision
More informationThe Center for Identification Technology Research (CITeR)
The Center for Identification Technology Research () Presented by Dr. Stephanie Schuckers February 24, 2011 Status Report is an NSF Industry/University Cooperative Research Center (IUCRC) The importance
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationAn Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander
More informationReading: Schwarz and Oldham (light on non-ideal) and comparator viewgraphs. Lecture 14: October 17, 2001
Lecture 4: October 7, 00 Op-Amp Circuits and Comprators A)Cascade Op-Amps B)Integration/Differentiation Op-Amps C)I vs. V of Op-Amps Source Limits D)Comparator Circuits E)D to A Converters Reading: The
More informationABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA
ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,
More informationSpectrum Enforcement in a Spectrum Sharing World. Suman Banerjee
Spectrum Enforcement in a Spectrum Sharing World Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Laboratory Collaborations and discussions with: Victor Bahl (MSR) Vladimir Brik, Arunesh
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationIdentification of Suspects using Finger Knuckle Patterns in Biometric Fusions
Identification of Suspects using Finger Knuckle Patterns in Biometric Fusions P Diviya 1 K Logapriya 2 G Nancy Febiyana 3 M Sivashankari 4 R Dinesh Kumar 5 (1,2,3,4 UG Scholars, 5 Professor,Dept of CSE,
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationRecognition System for Pakistani Paper Currency
World Applied Sciences Journal 28 (12): 2069-2075, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.12.300 Recognition System for Pakistani Paper Currency 1 2 Ahmed Ali and
More informationStatic Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More information