Biometrics and Image processing
|
|
- Conrad Floyd
- 6 years ago
- Views:
Transcription
1 Biometrics and Image processing M. M Saad, C. Rosenberger, A. Elmoataz GREYC research lab (UMR 6072) ENSICAEN - CNRS Université de Caen Basse-Normandie FRANCE
2 Outline 1 GREYC research lab 2 E-payment & Biometrics research unit 3 Image processing research unit (NAE presentation) GREYC version / 21
3 Introduction Presentation GREYC research lab : supported by University of Caen Basse-Normandie, ENSICAEN and CNRS (computer science department) with research activities in the field of Information Technologies. The GREYC research lab is directed by M. M Saad (director), F. Jurie and A. Mouadib (vice-directors). It is composed of more than 230 members : 93 associate and full professors 7 full time CNRS researchers 17 administrative and technical staff 70 PhD students with 12 co-funded with a company 41 post-doc, engineers... (NAE presentation) GREYC version / 21
4 Organization Research units (8) UCBN Campus 2 site Algorithmic, Computation models, Random, Cryptography, Complexity (AMACC) COnstraints, Data mining and Graphs (CODaG) Models, Agents and Decision (MAD) HUman Language TECHnology (HULTECH) ENSICAEN sites A and B Automatics Electronics Image processing E-payment & Biometrics (NAE presentation) GREYC version / 21
5 Some pictures (NAE presentation) GREYC version / 21
6 Synthesis http :// (NAE presentation) GREYC version / 21
7 Outline 1 GREYC research lab 2 E-payment & Biometrics research unit 3 Image processing research unit (NAE presentation) GREYC version / 21
8 Research topics Credo of the research unit The E-payment & Biometrics research unit in the GREYC lab works on research activities in computer security following 2 research topics with a continuity from theoretical to applied research aspects, both of them gaining from the other. Computer security Biometrics Definition and evaluation of biometric systems, protection of biometric data Trust Applied Cryptography, software applications using a SE, security and privacy protocols Applications E-payment Digital identity Contactless transactions Project management (NAE presentation) GREYC version / 21
9 Research activities in biometrics Scientific trends New biometric systems (2) : continuous keystroke dynamics, palm veins, Soft biometrics (1) : profiling individuals, improvement of biometric systems performance, Biometric template update (1) : definition and evaluation of biometric template update schemes, Quality of biometric data (1) : metrics for the comparison of sensors, improvement of biometric systems performance, Multi-biometrics : fusion of biometric modalities and systems, Protection of biometric data (2) : crypto-biometrics, BioHashing, Evaluation of biometric systems (1) : sensors and MOC algorithms, Biometrics on mobile devices : application to e-payment. (NAE presentation) GREYC version / 21
10 Studied biometric modalities (NAE presentation) GREYC version / 21
11 Focus on keystroke dynamics Figure 1: Keystroke dynamics recognition (Windows version) (NAE presentation) GREYC version / 21
12 Focus on biometrics on mobile phones Figure 2: Android biometric applications (NAE presentation) GREYC version / 21
13 Focus on multi-biometrics Figure 3: Multi-biometrics between face an keystroke dynamics with genetic algorithms : EER=2.2%, with genetic programming : 1.5% (NAE presentation) GREYC version / 21
14 Focus on biometric template update Figure 4: Template update (double threshold) on keystroke dynamics. (NAE presentation) GREYC version / 21
15 Focus on soft biometrics Figure 5: Soft biometrics on keystroke dynamics (NAE presentation) GREYC version / 21
16 Focus on the evaluation of biometric systems Figure 6: EVABIO platform for performance and security assessments (NAE presentation) GREYC version / 21
17 Focus on the evaluation of biometric systems Figure 7: EVABIO Sensors : Evaluation of biometric sensors (NAE presentation) GREYC version / 21
18 Focus on the quality of biometric data Figure 8: Quality of fingerprints : 85% correlation with the matching score (NFIQ : 20%) (NAE presentation) GREYC version / 21
19 Focus on cancelable biometrics Figure 9: BioHashing protection (Windows version) (NAE presentation) GREYC version / 21
20 Questions http :// (NAE presentation) GREYC version / 21
Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France
Quality of biometric data: definition and validation of metrics Christophe Charrier GREYC - Caen, France 1 GREYC Research Lab Le pôle TES et le sans-contact Caen 2 3 Introduction Introduction Quality of
More informationKeystroke Dynamics Performance Enhancement With Soft Biometrics
Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus Universiti Malaysia Perlis 01000 Kangar, Perlis, Malaysia syzul@unimap.edu.my Christophe Rosenberger Université
More informationHow to Evaluate Transformation Based Cancelable Biometric Systems?
How to Evaluate Transformation Based Cancelable Biometric Systems? Rima Belguechi, Estelle Cherrier, Christophe Rosenberger To cite this version: Rima Belguechi, Estelle Cherrier, Christophe Rosenberger.
More informationPalm Vein Verification System Based on SIFT Matching
Palm Vein Verification System Based on SIFT Matching Pierre-Olivier Ladoux 1, Christophe Rosenberger 2, and Bernadette Dorizzi 1 1 Institue TELECOM Télécom & Management SudParis 9 Rue Charles Fourier,
More informationA Novel Scheme for On-demand Distribution of Secure Element Keys
A Novel Scheme for On-demand Distribution of Secure Element Keys Vincent Alimi Normandie Univ, France UNICAEN, ENSICAEN, GREYC CNRS, UMR 6072 F-14032 Caen, France fvincent.alimi@ensicaen.fr ABSTRACT: The
More informationLow Cost and Usable Multimodal Biometric System Based on Keystroke Dynamicsand 2D Face Recognition
Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamicsand 2D Face Recognition Romain Giot, Baptiste Hemery, Christophe Rosenberger To cite this version: Romain Giot, Baptiste Hemery,
More informationFast computation of the performance evaluation of biometric systems: application to multibiometric
Fast computation of the performance evaluation of biometric systems: application to multibiometric Romain Giot, Mohamad El-Abed, Christophe Rosenberger To cite this version: Romain Giot, Mohamad El-Abed,
More informationBiometrics Day Behavioural Authentification by Orange
Biometrics Day Behavioural Authentification by Orange July 07, 2017 J-J Schwartzmann Motivations, techniques, privacy, and next steps 1 Content 1. Motivations 2. Techniques 3. Privacy protection 4. Next
More informationPrivacy and Security Assessment of Biometric Systems
Privacy and Security Assessment of Biometric Systems Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger To cite this version: Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger. Privacy and
More informationSynchronous One Time Biometrics With Pattern Based Authentication
Synchronous One Time Biometrics With Pattern Based Authentication Patrick Lacharme, Christophe Rosenberger To cite this version: Patrick Lacharme, Christophe Rosenberger. Synchronous One Time Biometrics
More informationSpeaker Recognition for Mobile User Authentication
Author manuscript, published in "8ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'information (SAR SSI), France (2013)" Speaker Recognition for Mobile User Authentication K. Brunet
More informationKeystroke Dynamics Performance Enhancement With Soft Biometrics
Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours To cite this version: Syed Zulkarnain
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017
RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria
More informationStudying Leakages on an Embedded Biometric System Using Side Channel Analysis
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis M. Berthier, Y. Bocktaels, J. Bringer, H. Chabanne, T. Chouta, J-L. Danger, M. Favre, T. Graba Institut Mines-Télécom Outline
More informationVisualization and text mining of patent and non-patent data
of patent and non-patent data Anton Heijs Information Solutions Delft, The Netherlands http://www.treparel.com/ ICIC conference, Nice, France, 2008 Outline Introduction Applications on patent and non-patent
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationImage Smoothing and Segmentation by Graph Regularization
Image Smoothing and Segmentation by Graph Regularization Sébastien Bougleux 1 and Abderrahim Elmoataz 1 GREYC CNRS UMR 6072, Université de Caen Basse-Normandie ENSICAEN 6 BD du Maréchal Juin, 14050 Caen
More informationIntegrated Security Destination Area Workshop May
Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems
More informationPIN-based cancelable biometrics
PIN-based cancelable biometrics Patrick Lacharme, Aude Plateaux To cite this version: Patrick Lacharme, Aude Plateaux. PIN-based cancelable biometrics. International Journal of Automated Identification
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationKeystroke Dynamics Authentication For Collaborative Systems
Keystroke Dynamics Authentication For Collaborative Systems Romain Giot, Mohamad El-Abed, Christophe Rosenberger GREYC Laboratory, ENSICAEN University of CAEN CNRS romain.giot@ensicaen.fr, melabed@greyc.ensicaen.fr,christophe.rosenberger@greyc.ensicaen.fr
More informationAdvances in Stand-off Biometrics
Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported
More informationCombating Accuracy Issues in Biometric Solutions
NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018 Biometric Authentication
More informationIDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY
IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY WHAT IS MULTIMODALITY? MULTIMODALITY: COMBINATION OF 2 OR SEVERAL COMPLEMENTARY BIOMETRICS Examples: Face and Iris, Hand and face, Finger vein & Fingerprint
More informationCOMPUTATION EvaBio: A TOOL FOR PERFORMANCE EVALUATION IN BIOMETRICS
International Journal of Automated Identification Technology, 3(2), July-December 2011, pp. 51-60 COMPUTATION EvaBio: A TOOL FOR PERFORMANCE EVALUATION IN BIOMETRICS Julien Mahier, Baptiste Hemery, Mohamad
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationFingerprint Quality Assessment: Matching Performance and Image Quality
Fingerprint Quality Assessment: Matching Performance and Image Quality Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger e-mail: {jean-marie.lebars; christophe.charrier}@unicaen.fr
More informationBiometric Secret Path for Mobile User Authentication: A Preliminary Study
Biometric Secret Path for Mobile User Authentication: A Preliminary Study Michael Beton, Vincent Marie, Christophe Rosenberger To cite this version: Michael Beton, Vincent Marie, Christophe Rosenberger.
More informationDEPARTMENT OF COMPUTER SCIENCE
Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationA Real Time Human Detection System Based on Far Infrared Vision
A Real Time Human Detection System Based on Far Infrared Vision Yannick Benezeth 1, Bruno Emile 1,Hélène Laurent 1, and Christophe Rosenberger 2 1 Institut Prisme, ENSI de Bourges - Université d Orléans
More informationDe Cifris incontra Milano Milano-Bicocca 11 settembre 2018
De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 Alberto Leporati Università degli Studi di Milano Bicocca Dip. di Informatica, Sistemistica e Comunicazione (DISCo) Viale Sarca 336/14 Milano
More informationAccess Control with Fingerprint Recognition
Access Control with Fingerprint Recognition Christoph Busch Gjøvik University College http://www.christoph-busch.de/ Finse Winterschool May 7, 2014 Norwegian Biometrics Laboratory (NBL) A very international
More informationSaint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.
Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor
More informationA Survey on Fusion Techniques for Multimodal Biometric Identification
A Survey on Fusion Techniques for Multimodal Biometric Identification S.R.Soruba Sree 1, Dr. N.Radha 2 Research Scholar, Department of Computer Science, P.S.G.R. Krishnammal College for Women, Coimbatore,
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationBiometrics 101. Presented by The International Biometrics & Identification Association (IBIA)
Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com
More informationFrom the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems
From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationBiometrics Evaluation and Testing. Dr Alain MERLE CEA-LETI
Biometrics Evaluation and Testing Dr Alain MERLE CEA-LETI The BEAT project CC & Biometrics Towards a technical committee on Biometrics A. Merle 2 The BEAT project EU Funded project (FP7 SEC) grant agreement
More informationA Literature Review of Fingerprint Quality Assessment and Its Evaluation
A Literature Review of Fingerprint Quality Assessment and Its Evaluation Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger To cite this version: Zhigang Yao, Jean-Marie Le Bars,
More informationMobile software security Building trust in mobile apps
Mobile software security 2016 More use of mobile devices 53% Of polled smart phone users say they use their device to pay online - 2014 26 Times per month for mobile apps usage against less than twice
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationContact less Hand Recognition using shape and texture features
Contact less Hand Recognition using shape and texture features Julien Doublet, Olivier Lepetit, Marinette Revenu To cite this version: Julien Doublet, Olivier Lepetit, Marinette Revenu. Contact less Hand
More information3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages
3D Face Project Paul Welti Sagem Défense Sécurité Technical coordinator Overview! Background! Objectives! Workpackages 2 1 ! Biometric epassport Biometrics and Border Control! EU-Council Regulation No
More information( It will be applied from Fall)
İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)
More informationCORMORANT Continuous risk-aware multi-modal authentication
CORMORANT Continuous risk-aware multi-modal authentication Android Security Symposium, Vienna, Austria, 9th September 2015 Rainhard Findling, Muhammad Muaaz, Daniel Hintze rainhard.findling@fh-hagenberg.at
More informationMultimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment
Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Highest security, easy use on all modern phones Adaptive Trust Level for big and small payments
More informationRotation Invariant Finger Vein Recognition *
Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop
More informationObtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 6 th, 2016 Obtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems George Kulakis, Karen Olson, Jeffrey
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationBlackboard 9.1: Level I
Handout Objectives Blackboard 9.1: Level I I. Making course Available II. Creating Announcements III. Inserting Staff Information IV. Uploading Course Documents V. Creating Assignments VI. How to Send
More informationExtraction of tiled top-down irregular pyramids from large images
Extraction of tiled top-down irregular pyramids from large images Romain Goffe 1 Guillaume Damiand 2 Luc Brun 3 1 SIC-XLIM, Université de Poitiers, CNRS, UMR6172, Bâtiment SP2MI, F-86962, Futuroscope Chasseneuil,
More informationComparative Study on Texture Features for Fingerprint Recognition: Application to The BioHashing Template Protection Scheme
Comparative Study on Texture Features for Fingerprint Recognition: Application to The BioHashing Template Protection Scheme Rima Belguechi, Adel Hafiane, Estelle Cherrier, Christophe Rosenberger To cite
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationUser Guide. Module 7: Generating Reports
User Guide Module 7: Generating Reports Module 7 provides information on generating reports to meet the needs of students, faculty, and administration. NOTE: There may be a 10-minute delay from the time
More informationRightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)
Save money and increase productivity with an affordable biometric soft clock for Kronos that runs on PCs, tablets & smartphones! Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationCourse 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User
Skip to main content Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User - Course details Course Outline Module 1: The Role of the Site Owner This module provides an introduction
More informationD. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Two Step Verification
More informationFace anti-spoofing using Image Quality Assessment
Face anti-spoofing using Image Quality Assessment Speakers Prisme Polytech Orléans Aladine Chetouani R&D Trusted Services Emna Fourati Outline Face spoofing attacks Image Quality Assessment Proposed method
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationTechnical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication
Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...
More informationFingerprint Authentication Guide
Fingerprint Authentication Guide What is fingerprint authentication? An electronic device is used to capture a digital image of a fingerprint pattern. This image is digitally processed to create a biometric
More informationComparison of No-Reference Image Quality Assessment Machine Learning-based Algorithms on Compressed Images
Comparison of No-Reference Image Quality Assessment Machine Learning-based Algorithms on Compressed Images Christophe Charrier 1 AbdelHakim Saadane 2 Christine Fernandez-Maloigne 3 1 Université de Caen-Basse
More informationInnovations in Identity & Access Management (IdAM)
Innovations in Identity & Access Management (IdAM) Lee Taylor Chief, Infrastructure Applications Branch Disclaimer The information provided in this briefing is for general information purposes only. It
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More informationECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017
ECEN 5060 - Security and Privacy for Big Data Introduction Professor Yanmin Gong 08/22/2017 Administrivia Course Hour: T/R 3:30-4:45 pm @ CLB 101 Office Hour: T/R 2:30-3:30 pm Any question besides assignment
More informationDeveloping a Research Data Policy
Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,
More informationThe Match On Card Technology
Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification
More informationCHAPTER 6 RESULTS AND DISCUSSIONS
151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print
More informationResearch Directions in Secure Software Engineering
1 Acknowledgments Research Directions in Secure Software Engineering This work is part of the SoBeNeT project, an IWT project funded by the Flemish government Visit http://sobenet.cs.kuleuven.be Riccardo
More informationEnergy Efficient Computing Systems (EECS) Magnus Jahre Coordinator, EECS
Energy Efficient Computing Systems (EECS) Magnus Jahre Coordinator, EECS Who am I? Education Master of Technology, NTNU, 2007 PhD, NTNU, 2010. Title: «Managing Shared Resources in Chip Multiprocessor Memory
More informationIndirect Attacks on Biometric Systems
Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN
More informationHow can OSSIM help you with your PCI DSS Wireless requirements?
How can OSSIM help you with your PCI DSS Wireless requirements? Topics PCI DSS How PCI applies to Wireless What is OSSIM? The advantages of Open Source The Open Source approach PCI DSS PCI DSS is a security
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationMore crypto and security
More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade
More informationBusiness Mobile Banking
Business Mobile Banking User Guide MEMBER FDIC MKT4171/0318 Table of Contents Downloading the App... 3 Requirements... 3 Log In... 3 User ID and Password... 3 Security Token... 4 Apple Touch ID... 5 Viewing
More informationGaithashing: a two-factor authentication scheme based on gait features
Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece
More informationTowards e-passport Duplicate Enrolment Check in the European Union
2013 European Intelligence and Security Informatics Conference Towards e-passport Duplicate Enrolment Check in the European Union Moazzam Butt, Sandra Marti, Alexander Nouak,Jörg Köplin, R. Raghavendra
More informationGuide to SciVal Experts
Guide to SciVal Experts Contents What is SciVal Experts and How Can I Benefit From It?....... 3 How is My Profile Created?... 4 The SciVal Experts Interface.... 5-6 Organization Home Page Unit Individual
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationA Study on the Convergence of FingerHashing and a Secured Biometric System
A Study on the Convergence of FingerHashing and a Secured Biometric System Rima Belguechi 1, Christophe Rosenberger 2, 1 LCSI Laboratory, National School of Computer Science, ESI, Algeria r_belguechi@esi.dz
More informationSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK Mohammad Alwadi 1 and Girija Chetty 2 1 Department of Information Sciences and Engineering, The University of Canberra, Canberra, Australia
More informationInformativeness for Adhoc IR Evaluation:
Informativeness for Adhoc IR Evaluation: A measure that prevents assessing individual documents Romain Deveaud 1, Véronique Moriceau 2, Josiane Mothe 3, and Eric SanJuan 1 1 LIA, Univ. Avignon, France,
More informationPrimitive roots of bi-periodic infinite pictures
Primitive roots of bi-periodic infinite pictures Nicolas Bacquey To cite this version: Nicolas Bacquey. Primitive roots of bi-periodic infinite pictures. Words 5, Sep 5, Kiel, Germany. Words 5, Local Proceedings.
More informationSGM (SLO) Template Directions. to access the SGM tool (SLO portal) only available in CMSD
SGM (SLO) Template Directions Go to: http://esupport/sgm to access the SGM tool (SLO portal) only available in CMSD NEW: If an error message pop up appears, read the message and act accordingly. Step 1:
More informationRANK TRANSFORMATION AND MANIFOLD LEARNING FOR MULTIVARIATE MATHEMATICAL MORPHOLOGY
17th European Signal Processing Conference (EUSIPCO 2009) Glasgow, Scotland, August 24-28, 2009 RANK TRANSFORMATION AND MANIFOLD LEARNING FOR MULTIVARIATE MATHEMATICAL MORPHOLOGY Olivier Lezoray, Christophe
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationBSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests
BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2
More informationCryptography & Data Privacy Research in the NSRC
Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography
More informationMatch On Card MINEX 2
Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card
More informationCOMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY
COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of
More informationDiscover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017
Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the
More informationAuthentication: Beyond Passwords
HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint
More information