Biometrics and Image processing

Size: px
Start display at page:

Download "Biometrics and Image processing"

Transcription

1 Biometrics and Image processing M. M Saad, C. Rosenberger, A. Elmoataz GREYC research lab (UMR 6072) ENSICAEN - CNRS Université de Caen Basse-Normandie FRANCE

2 Outline 1 GREYC research lab 2 E-payment & Biometrics research unit 3 Image processing research unit (NAE presentation) GREYC version / 21

3 Introduction Presentation GREYC research lab : supported by University of Caen Basse-Normandie, ENSICAEN and CNRS (computer science department) with research activities in the field of Information Technologies. The GREYC research lab is directed by M. M Saad (director), F. Jurie and A. Mouadib (vice-directors). It is composed of more than 230 members : 93 associate and full professors 7 full time CNRS researchers 17 administrative and technical staff 70 PhD students with 12 co-funded with a company 41 post-doc, engineers... (NAE presentation) GREYC version / 21

4 Organization Research units (8) UCBN Campus 2 site Algorithmic, Computation models, Random, Cryptography, Complexity (AMACC) COnstraints, Data mining and Graphs (CODaG) Models, Agents and Decision (MAD) HUman Language TECHnology (HULTECH) ENSICAEN sites A and B Automatics Electronics Image processing E-payment & Biometrics (NAE presentation) GREYC version / 21

5 Some pictures (NAE presentation) GREYC version / 21

6 Synthesis http :// (NAE presentation) GREYC version / 21

7 Outline 1 GREYC research lab 2 E-payment & Biometrics research unit 3 Image processing research unit (NAE presentation) GREYC version / 21

8 Research topics Credo of the research unit The E-payment & Biometrics research unit in the GREYC lab works on research activities in computer security following 2 research topics with a continuity from theoretical to applied research aspects, both of them gaining from the other. Computer security Biometrics Definition and evaluation of biometric systems, protection of biometric data Trust Applied Cryptography, software applications using a SE, security and privacy protocols Applications E-payment Digital identity Contactless transactions Project management (NAE presentation) GREYC version / 21

9 Research activities in biometrics Scientific trends New biometric systems (2) : continuous keystroke dynamics, palm veins, Soft biometrics (1) : profiling individuals, improvement of biometric systems performance, Biometric template update (1) : definition and evaluation of biometric template update schemes, Quality of biometric data (1) : metrics for the comparison of sensors, improvement of biometric systems performance, Multi-biometrics : fusion of biometric modalities and systems, Protection of biometric data (2) : crypto-biometrics, BioHashing, Evaluation of biometric systems (1) : sensors and MOC algorithms, Biometrics on mobile devices : application to e-payment. (NAE presentation) GREYC version / 21

10 Studied biometric modalities (NAE presentation) GREYC version / 21

11 Focus on keystroke dynamics Figure 1: Keystroke dynamics recognition (Windows version) (NAE presentation) GREYC version / 21

12 Focus on biometrics on mobile phones Figure 2: Android biometric applications (NAE presentation) GREYC version / 21

13 Focus on multi-biometrics Figure 3: Multi-biometrics between face an keystroke dynamics with genetic algorithms : EER=2.2%, with genetic programming : 1.5% (NAE presentation) GREYC version / 21

14 Focus on biometric template update Figure 4: Template update (double threshold) on keystroke dynamics. (NAE presentation) GREYC version / 21

15 Focus on soft biometrics Figure 5: Soft biometrics on keystroke dynamics (NAE presentation) GREYC version / 21

16 Focus on the evaluation of biometric systems Figure 6: EVABIO platform for performance and security assessments (NAE presentation) GREYC version / 21

17 Focus on the evaluation of biometric systems Figure 7: EVABIO Sensors : Evaluation of biometric sensors (NAE presentation) GREYC version / 21

18 Focus on the quality of biometric data Figure 8: Quality of fingerprints : 85% correlation with the matching score (NFIQ : 20%) (NAE presentation) GREYC version / 21

19 Focus on cancelable biometrics Figure 9: BioHashing protection (Windows version) (NAE presentation) GREYC version / 21

20 Questions http :// (NAE presentation) GREYC version / 21

Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France

Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France Quality of biometric data: definition and validation of metrics Christophe Charrier GREYC - Caen, France 1 GREYC Research Lab Le pôle TES et le sans-contact Caen 2 3 Introduction Introduction Quality of

More information

Keystroke Dynamics Performance Enhancement With Soft Biometrics

Keystroke Dynamics Performance Enhancement With Soft Biometrics Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus Universiti Malaysia Perlis 01000 Kangar, Perlis, Malaysia syzul@unimap.edu.my Christophe Rosenberger Université

More information

How to Evaluate Transformation Based Cancelable Biometric Systems?

How to Evaluate Transformation Based Cancelable Biometric Systems? How to Evaluate Transformation Based Cancelable Biometric Systems? Rima Belguechi, Estelle Cherrier, Christophe Rosenberger To cite this version: Rima Belguechi, Estelle Cherrier, Christophe Rosenberger.

More information

Palm Vein Verification System Based on SIFT Matching

Palm Vein Verification System Based on SIFT Matching Palm Vein Verification System Based on SIFT Matching Pierre-Olivier Ladoux 1, Christophe Rosenberger 2, and Bernadette Dorizzi 1 1 Institue TELECOM Télécom & Management SudParis 9 Rue Charles Fourier,

More information

A Novel Scheme for On-demand Distribution of Secure Element Keys

A Novel Scheme for On-demand Distribution of Secure Element Keys A Novel Scheme for On-demand Distribution of Secure Element Keys Vincent Alimi Normandie Univ, France UNICAEN, ENSICAEN, GREYC CNRS, UMR 6072 F-14032 Caen, France fvincent.alimi@ensicaen.fr ABSTRACT: The

More information

Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamicsand 2D Face Recognition

Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamicsand 2D Face Recognition Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamicsand 2D Face Recognition Romain Giot, Baptiste Hemery, Christophe Rosenberger To cite this version: Romain Giot, Baptiste Hemery,

More information

Fast computation of the performance evaluation of biometric systems: application to multibiometric

Fast computation of the performance evaluation of biometric systems: application to multibiometric Fast computation of the performance evaluation of biometric systems: application to multibiometric Romain Giot, Mohamad El-Abed, Christophe Rosenberger To cite this version: Romain Giot, Mohamad El-Abed,

More information

Biometrics Day Behavioural Authentification by Orange

Biometrics Day Behavioural Authentification by Orange Biometrics Day Behavioural Authentification by Orange July 07, 2017 J-J Schwartzmann Motivations, techniques, privacy, and next steps 1 Content 1. Motivations 2. Techniques 3. Privacy protection 4. Next

More information

Privacy and Security Assessment of Biometric Systems

Privacy and Security Assessment of Biometric Systems Privacy and Security Assessment of Biometric Systems Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger To cite this version: Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger. Privacy and

More information

Synchronous One Time Biometrics With Pattern Based Authentication

Synchronous One Time Biometrics With Pattern Based Authentication Synchronous One Time Biometrics With Pattern Based Authentication Patrick Lacharme, Christophe Rosenberger To cite this version: Patrick Lacharme, Christophe Rosenberger. Synchronous One Time Biometrics

More information

Speaker Recognition for Mobile User Authentication

Speaker Recognition for Mobile User Authentication Author manuscript, published in "8ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'information (SAR SSI), France (2013)" Speaker Recognition for Mobile User Authentication K. Brunet

More information

Keystroke Dynamics Performance Enhancement With Soft Biometrics

Keystroke Dynamics Performance Enhancement With Soft Biometrics Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours To cite this version: Syed Zulkarnain

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis Studying Leakages on an Embedded Biometric System Using Side Channel Analysis M. Berthier, Y. Bocktaels, J. Bringer, H. Chabanne, T. Chouta, J-L. Danger, M. Favre, T. Graba Institut Mines-Télécom Outline

More information

Visualization and text mining of patent and non-patent data

Visualization and text mining of patent and non-patent data of patent and non-patent data Anton Heijs Information Solutions Delft, The Netherlands http://www.treparel.com/ ICIC conference, Nice, France, 2008 Outline Introduction Applications on patent and non-patent

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

Image Smoothing and Segmentation by Graph Regularization

Image Smoothing and Segmentation by Graph Regularization Image Smoothing and Segmentation by Graph Regularization Sébastien Bougleux 1 and Abderrahim Elmoataz 1 GREYC CNRS UMR 6072, Université de Caen Basse-Normandie ENSICAEN 6 BD du Maréchal Juin, 14050 Caen

More information

Integrated Security Destination Area Workshop May

Integrated Security Destination Area Workshop May Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems

More information

PIN-based cancelable biometrics

PIN-based cancelable biometrics PIN-based cancelable biometrics Patrick Lacharme, Aude Plateaux To cite this version: Patrick Lacharme, Aude Plateaux. PIN-based cancelable biometrics. International Journal of Automated Identification

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

Keystroke Dynamics Authentication For Collaborative Systems

Keystroke Dynamics Authentication For Collaborative Systems Keystroke Dynamics Authentication For Collaborative Systems Romain Giot, Mohamad El-Abed, Christophe Rosenberger GREYC Laboratory, ENSICAEN University of CAEN CNRS romain.giot@ensicaen.fr, melabed@greyc.ensicaen.fr,christophe.rosenberger@greyc.ensicaen.fr

More information

Advances in Stand-off Biometrics

Advances in Stand-off Biometrics Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported

More information

Combating Accuracy Issues in Biometric Solutions

Combating Accuracy Issues in Biometric Solutions NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018 Biometric Authentication

More information

IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY

IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY WHAT IS MULTIMODALITY? MULTIMODALITY: COMBINATION OF 2 OR SEVERAL COMPLEMENTARY BIOMETRICS Examples: Face and Iris, Hand and face, Finger vein & Fingerprint

More information

COMPUTATION EvaBio: A TOOL FOR PERFORMANCE EVALUATION IN BIOMETRICS

COMPUTATION EvaBio: A TOOL FOR PERFORMANCE EVALUATION IN BIOMETRICS International Journal of Automated Identification Technology, 3(2), July-December 2011, pp. 51-60 COMPUTATION EvaBio: A TOOL FOR PERFORMANCE EVALUATION IN BIOMETRICS Julien Mahier, Baptiste Hemery, Mohamad

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Fingerprint Quality Assessment: Matching Performance and Image Quality

Fingerprint Quality Assessment: Matching Performance and Image Quality Fingerprint Quality Assessment: Matching Performance and Image Quality Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger e-mail: {jean-marie.lebars; christophe.charrier}@unicaen.fr

More information

Biometric Secret Path for Mobile User Authentication: A Preliminary Study

Biometric Secret Path for Mobile User Authentication: A Preliminary Study Biometric Secret Path for Mobile User Authentication: A Preliminary Study Michael Beton, Vincent Marie, Christophe Rosenberger To cite this version: Michael Beton, Vincent Marie, Christophe Rosenberger.

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

A Real Time Human Detection System Based on Far Infrared Vision

A Real Time Human Detection System Based on Far Infrared Vision A Real Time Human Detection System Based on Far Infrared Vision Yannick Benezeth 1, Bruno Emile 1,Hélène Laurent 1, and Christophe Rosenberger 2 1 Institut Prisme, ENSI de Bourges - Université d Orléans

More information

De Cifris incontra Milano Milano-Bicocca 11 settembre 2018

De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 Alberto Leporati Università degli Studi di Milano Bicocca Dip. di Informatica, Sistemistica e Comunicazione (DISCo) Viale Sarca 336/14 Milano

More information

Access Control with Fingerprint Recognition

Access Control with Fingerprint Recognition Access Control with Fingerprint Recognition Christoph Busch Gjøvik University College http://www.christoph-busch.de/ Finse Winterschool May 7, 2014 Norwegian Biometrics Laboratory (NBL) A very international

More information

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Saint Petersburg Electrotechnical University LETI (ETU LETI) , Saint Petersburg, Russian FederationProfessoraPopova str. Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor

More information

A Survey on Fusion Techniques for Multimodal Biometric Identification

A Survey on Fusion Techniques for Multimodal Biometric Identification A Survey on Fusion Techniques for Multimodal Biometric Identification S.R.Soruba Sree 1, Dr. N.Radha 2 Research Scholar, Department of Computer Science, P.S.G.R. Krishnammal College for Women, Coimbatore,

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA) Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

More information

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Biometrics Evaluation and Testing. Dr Alain MERLE CEA-LETI

Biometrics Evaluation and Testing. Dr Alain MERLE CEA-LETI Biometrics Evaluation and Testing Dr Alain MERLE CEA-LETI The BEAT project CC & Biometrics Towards a technical committee on Biometrics A. Merle 2 The BEAT project EU Funded project (FP7 SEC) grant agreement

More information

A Literature Review of Fingerprint Quality Assessment and Its Evaluation

A Literature Review of Fingerprint Quality Assessment and Its Evaluation A Literature Review of Fingerprint Quality Assessment and Its Evaluation Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger To cite this version: Zhigang Yao, Jean-Marie Le Bars,

More information

Mobile software security Building trust in mobile apps

Mobile software security Building trust in mobile apps Mobile software security 2016 More use of mobile devices 53% Of polled smart phone users say they use their device to pay online - 2014 26 Times per month for mobile apps usage against less than twice

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Contact less Hand Recognition using shape and texture features

Contact less Hand Recognition using shape and texture features Contact less Hand Recognition using shape and texture features Julien Doublet, Olivier Lepetit, Marinette Revenu To cite this version: Julien Doublet, Olivier Lepetit, Marinette Revenu. Contact less Hand

More information

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages 3D Face Project Paul Welti Sagem Défense Sécurité Technical coordinator Overview! Background! Objectives! Workpackages 2 1 ! Biometric epassport Biometrics and Border Control! EU-Council Regulation No

More information

( It will be applied from Fall)

( It will be applied from Fall) İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)

More information

CORMORANT Continuous risk-aware multi-modal authentication

CORMORANT Continuous risk-aware multi-modal authentication CORMORANT Continuous risk-aware multi-modal authentication Android Security Symposium, Vienna, Austria, 9th September 2015 Rainhard Findling, Muhammad Muaaz, Daniel Hintze rainhard.findling@fh-hagenberg.at

More information

Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment

Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Highest security, easy use on all modern phones Adaptive Trust Level for big and small payments

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

Obtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems

Obtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 6 th, 2016 Obtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems George Kulakis, Karen Olson, Jeffrey

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Blackboard 9.1: Level I

Blackboard 9.1: Level I Handout Objectives Blackboard 9.1: Level I I. Making course Available II. Creating Announcements III. Inserting Staff Information IV. Uploading Course Documents V. Creating Assignments VI. How to Send

More information

Extraction of tiled top-down irregular pyramids from large images

Extraction of tiled top-down irregular pyramids from large images Extraction of tiled top-down irregular pyramids from large images Romain Goffe 1 Guillaume Damiand 2 Luc Brun 3 1 SIC-XLIM, Université de Poitiers, CNRS, UMR6172, Bâtiment SP2MI, F-86962, Futuroscope Chasseneuil,

More information

Comparative Study on Texture Features for Fingerprint Recognition: Application to The BioHashing Template Protection Scheme

Comparative Study on Texture Features for Fingerprint Recognition: Application to The BioHashing Template Protection Scheme Comparative Study on Texture Features for Fingerprint Recognition: Application to The BioHashing Template Protection Scheme Rima Belguechi, Adel Hafiane, Estelle Cherrier, Christophe Rosenberger To cite

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

User Guide. Module 7: Generating Reports

User Guide. Module 7: Generating Reports User Guide Module 7: Generating Reports Module 7 provides information on generating reports to meet the needs of students, faculty, and administration. NOTE: There may be a 10-minute delay from the time

More information

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon) Save money and increase productivity with an affordable biometric soft clock for Kronos that runs on PCs, tablets & smartphones! Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User

Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User Skip to main content Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User - Course details Course Outline Module 1: The Role of the Site Owner This module provides an introduction

More information

D. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,

D. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai, Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Two Step Verification

More information

Face anti-spoofing using Image Quality Assessment

Face anti-spoofing using Image Quality Assessment Face anti-spoofing using Image Quality Assessment Speakers Prisme Polytech Orléans Aladine Chetouani R&D Trusted Services Emna Fourati Outline Face spoofing attacks Image Quality Assessment Proposed method

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...

More information

Fingerprint Authentication Guide

Fingerprint Authentication Guide Fingerprint Authentication Guide What is fingerprint authentication? An electronic device is used to capture a digital image of a fingerprint pattern. This image is digitally processed to create a biometric

More information

Comparison of No-Reference Image Quality Assessment Machine Learning-based Algorithms on Compressed Images

Comparison of No-Reference Image Quality Assessment Machine Learning-based Algorithms on Compressed Images Comparison of No-Reference Image Quality Assessment Machine Learning-based Algorithms on Compressed Images Christophe Charrier 1 AbdelHakim Saadane 2 Christine Fernandez-Maloigne 3 1 Université de Caen-Basse

More information

Innovations in Identity & Access Management (IdAM)

Innovations in Identity & Access Management (IdAM) Innovations in Identity & Access Management (IdAM) Lee Taylor Chief, Infrastructure Applications Branch Disclaimer The information provided in this briefing is for general information purposes only. It

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017

ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017 ECEN 5060 - Security and Privacy for Big Data Introduction Professor Yanmin Gong 08/22/2017 Administrivia Course Hour: T/R 3:30-4:45 pm @ CLB 101 Office Hour: T/R 2:30-3:30 pm Any question besides assignment

More information

Developing a Research Data Policy

Developing a Research Data Policy Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

CHAPTER 6 RESULTS AND DISCUSSIONS

CHAPTER 6 RESULTS AND DISCUSSIONS 151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print

More information

Research Directions in Secure Software Engineering

Research Directions in Secure Software Engineering 1 Acknowledgments Research Directions in Secure Software Engineering This work is part of the SoBeNeT project, an IWT project funded by the Flemish government Visit http://sobenet.cs.kuleuven.be Riccardo

More information

Energy Efficient Computing Systems (EECS) Magnus Jahre Coordinator, EECS

Energy Efficient Computing Systems (EECS) Magnus Jahre Coordinator, EECS Energy Efficient Computing Systems (EECS) Magnus Jahre Coordinator, EECS Who am I? Education Master of Technology, NTNU, 2007 PhD, NTNU, 2010. Title: «Managing Shared Resources in Chip Multiprocessor Memory

More information

Indirect Attacks on Biometric Systems

Indirect Attacks on Biometric Systems Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN

More information

How can OSSIM help you with your PCI DSS Wireless requirements?

How can OSSIM help you with your PCI DSS Wireless requirements? How can OSSIM help you with your PCI DSS Wireless requirements? Topics PCI DSS How PCI applies to Wireless What is OSSIM? The advantages of Open Source The Open Source approach PCI DSS PCI DSS is a security

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

More crypto and security

More crypto and security More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade

More information

Business Mobile Banking

Business Mobile Banking Business Mobile Banking User Guide MEMBER FDIC MKT4171/0318 Table of Contents Downloading the App... 3 Requirements... 3 Log In... 3 User ID and Password... 3 Security Token... 4 Apple Touch ID... 5 Viewing

More information

Gaithashing: a two-factor authentication scheme based on gait features

Gaithashing: a two-factor authentication scheme based on gait features Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece

More information

Towards e-passport Duplicate Enrolment Check in the European Union

Towards e-passport Duplicate Enrolment Check in the European Union 2013 European Intelligence and Security Informatics Conference Towards e-passport Duplicate Enrolment Check in the European Union Moazzam Butt, Sandra Marti, Alexander Nouak,Jörg Köplin, R. Raghavendra

More information

Guide to SciVal Experts

Guide to SciVal Experts Guide to SciVal Experts Contents What is SciVal Experts and How Can I Benefit From It?....... 3 How is My Profile Created?... 4 The SciVal Experts Interface.... 5-6 Organization Home Page Unit Individual

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

A Study on the Convergence of FingerHashing and a Secured Biometric System

A Study on the Convergence of FingerHashing and a Secured Biometric System A Study on the Convergence of FingerHashing and a Secured Biometric System Rima Belguechi 1, Christophe Rosenberger 2, 1 LCSI Laboratory, National School of Computer Science, ESI, Algeria r_belguechi@esi.dz

More information

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK Mohammad Alwadi 1 and Girija Chetty 2 1 Department of Information Sciences and Engineering, The University of Canberra, Canberra, Australia

More information

Informativeness for Adhoc IR Evaluation:

Informativeness for Adhoc IR Evaluation: Informativeness for Adhoc IR Evaluation: A measure that prevents assessing individual documents Romain Deveaud 1, Véronique Moriceau 2, Josiane Mothe 3, and Eric SanJuan 1 1 LIA, Univ. Avignon, France,

More information

Primitive roots of bi-periodic infinite pictures

Primitive roots of bi-periodic infinite pictures Primitive roots of bi-periodic infinite pictures Nicolas Bacquey To cite this version: Nicolas Bacquey. Primitive roots of bi-periodic infinite pictures. Words 5, Sep 5, Kiel, Germany. Words 5, Local Proceedings.

More information

SGM (SLO) Template Directions. to access the SGM tool (SLO portal) only available in CMSD

SGM (SLO) Template Directions.   to access the SGM tool (SLO portal) only available in CMSD SGM (SLO) Template Directions Go to: http://esupport/sgm to access the SGM tool (SLO portal) only available in CMSD NEW: If an error message pop up appears, read the message and act accordingly. Step 1:

More information

RANK TRANSFORMATION AND MANIFOLD LEARNING FOR MULTIVARIATE MATHEMATICAL MORPHOLOGY

RANK TRANSFORMATION AND MANIFOLD LEARNING FOR MULTIVARIATE MATHEMATICAL MORPHOLOGY 17th European Signal Processing Conference (EUSIPCO 2009) Glasgow, Scotland, August 24-28, 2009 RANK TRANSFORMATION AND MANIFOLD LEARNING FOR MULTIVARIATE MATHEMATICAL MORPHOLOGY Olivier Lezoray, Christophe

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

BSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests

BSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2

More information

Cryptography & Data Privacy Research in the NSRC

Cryptography & Data Privacy Research in the NSRC Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography

More information

Match On Card MINEX 2

Match On Card MINEX 2 Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card

More information

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

Authentication: Beyond Passwords

Authentication: Beyond Passwords HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint

More information