INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER
|
|
- Vanessa Jennings
- 6 years ago
- Views:
Transcription
1 INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA
2 INTRODUCTION The fingerprint-imaging segment of the biometrics industry is in its embryonic state; a myriad of technologies and concepts have fostered slow but steady growth. As the number of applications and level of acceptance grow, biometric developers are faced with the task of evaluating and contrasting the various solutions on the market. To date, developers of fingerprint authentication products, such as sensors and algorithms, have developed tests tailored to their particular devices and software. Since the relative performance of the fingerprint authentication systems is crucial in the evaluation process, it is imperative that the results be analyzed with care. A comprehensive discussion of performance results is the subject of this white paper. The focus is on the entire authentication system, including the fingerprint image sensor and verification algorithm. In the process, some common definitions and test procedure pitfalls are discussed. PERFORMANCE METRICS Performance tests of fingerprint authentication systems come in many varieties. Some tests are done in the laboratory; others are performed in the field. In addition, these systems usually can be operated under different security settings producing a spread of performance results. There are many different variables to be aware of when testing performance or analyzing test results provided by different vendors. Using any authentication system requires two steps: enrollment and verification. For a passwordbased authentication system, the enrollment is simply the creation of a password. Often times, the enrollment requires the user to re-enter the password to assure that the stored password is what the user intended. Verification in such an authentication system would comprise nothing more than the submission of a password in order to gain access to restricted areas. Similarly, for a fingerprint authentication system, the enrollment step would consist of the user submitting fingerprint image samples to the system. The system would then analyze the samples and generate a template to be stored. Once a user has been enrolled in the system, verification of the user can take place. This would involve the user submitting a fingerprint image sample to be compared with the enrolled template. If the newly submitted image sample matches the stored template, the user is accepted. Otherwise, the user is rejected. Sometimes, the system s decision to reject or accept a user is erroneous. How frequently systems make an incorrect decision is of great importance. There are four basic error rates employed in fingerprint authentication systems: the False Accept Rate (FAR); the False Reject Rate (FRR); the Equal Error Rate (EER); the Failure to Enroll Rate (FER). The FAR represents the probability that a false match occurs, for example, an unauthorized user is erroneously accepted as an authorized user by the system. Its complement is the FRR, which represents the probability that a false rejection occurs, for example, an authorized user is 2
3 erroneously mistaken for an unauthorized user. The FER represents the probability that a single fingerprint cannot be enrolled in the system, such as when an individual wants to use his right thumb with the fingerprint authentication system, but for some reason the system determines that his right thumb is not usable for this purpose. Before the EER can be described, some additional background information must be provided about the performance of these systems. First, understand that there is a trade-off between the FAR and FRR. If a system has various security settings at which it can be operated, then the FAR and FRR will vary in accordance with the security setting selected. In general, as the FAR is reduced the system becomes more secure the FRR is increased. A consequence of a higher FRR is user inconvenience, since successful authentication of an authorized user may require additional access attempts. For a given system, there may be only a handful of security settings available, but the error rates from an infinite number of these settings can be interpolated to form a continuous FAR/FRR trade-off curve. The trade-off curve most often associated with fingerprint authentication systems is known as a Receiver Operating Characteristics (ROC) curve. The ROC curve plots the FAR against the FRR. It can be generated by obtaining FAR and FRR data points under many different security settings on a given system (sensor and verification algorithm). Fig. 1 shows an example of a ROC curve. From this curve, one can easily see the trade-off between FAR and FRR. Fig. 1. With a basic understanding of ROC curves and the FAR-FRR trade-off, the EER can now be described. The EER is the datum on the ROC curve where the FAR is equal to the FRR. In the ROC curve shown in Fig. 1, the EER is approximately The EER is often used for comparisons because it is simpler to obtain and compare a single value characterizing the system performance, as opposed to generating and using full ROC curves. Unfortunately, the EER is 3
4 rarely a good choice for comparing the performance of various fingerprint authentication systems. In particular, the efficacy of a given fingerprint authentication system is highly dependent on its intended application. Some applications require higher security and can sacrifice some convenience, but in others convenience is a top priority. This is the main problem with using the EER as a basis for comparing system performance. Since the EER only gives information that is useful for a single application requirement, it will vary from system to system. Therefore, EERs often compare systems developed for potentially different applications. To further clarify this point, let us consider an example. Say that a company is evaluating several fingerprint authentication systems with the intention of deployment in a high security environment. The company is willing to accept a higher FRR in order to ensure that the chances an unauthorized user can gain access is minimal (for example, an FAR of 1 in 250,000). If the systems being evaluated had the EERs given in Table I, none would clearly stand out as the best because nothing would be known about them for the intended high security application. From this example, one can quickly see the limitations of the EER. Table I. An illustration of the limitations of the EER. Fingerprint Authentication System EER Fingerprint System A 0.2% Fingerprint System B 0.7% Fingerprint System C 1.0% Similar problems plague the FAR and FRR numbers often reported by fingerprint authentication algorithm vendors. With a single reported FAR and FRR, the performance cannot be properly assessed for a given application. This is why it is necessary to compare systems using a family of ROC curves. ROC curves allow for the comparison of various authentication systems for a given application. It is not unusual for one system to outperform another in one application and have their roles reversed in another. This scenario would manifest itself as a crossover in the ROC curves as seen in Fig. 2. These ROC curves show one system performing better than the other in a lower security (higher FAR) environment and worse than the other in a higher security (lower FAR) environment. 4
5 Fig. 2. TESTING PITFALLS Having described some of the fundamental issues in comparing the performance of fingerprint authentication systems, our attention can now be shifted to actual test practices. It is important to understand exactly how the FAR and FRR that make up the ROC curves are determined. Unfortunately, a widely accepted biometrics testing standard currently does not exist. Because of this, it is easy for a specific vendor to skew test results to benefit their own system. In fact, results from fingerprint authentication tests will undoubtedly be biased by a number of uncontrollable factors. The performance results from the test of a fingerprint authentication system are largely affected by the test population. Error rates gathered from a test population containing more individuals with poor quality fingerprints are likely to be worse than a similar test with a population containing more individuals with much higher quality fingerprints. Population selection is highly unscientific. Often times the population is limited to those who volunteer their time. Little or no control of the population is a common occurrence in the testing of authentication systems. Typically, the reported FRR and FAR are determined by the number of failing fingerprint match trials and the number of failing non-match trials, respectively. Say the test to determine the FRR of the system for a given security setting consisted of 20,000 match trials. The FRR is determined by dividing the number of trials that failed to produce the correct result (true match) by the total number of trials. Suppose that of the 20,000 match trials, 250 of them resulted in rejected access. Then the FRR for this example is 250 / 20,000 =.0125 or 1.25%. A similar test could be used to determine the FAR of the system. However, since false accepts occur a lot less frequently than FRRs, many more trials must be run in order to obtain a reasonably accurate FAR. 5
6 There is a mathematical rule of thumb known as Doddington s 30-error criterion, which states that for a measured error rate to lie within 25% of the true error rate with high confidence (90%) then at least 30 instances of that error should have been observed. For example, one can t put too much confidence in a measured FAR rate for some system at a specified security setting of 1 in 100,000 if only 100,000 trials were performed. This is because only one false accept was observed after 100,000 trials. However, if the measured FAR was 1 in 100,000 after 3,000,000 trials, then it can be said that the true error rate is within 25% of the observed error rate with a much higher degree of confidence. In this particular case, the FAR can be said to be 0.001% ± % with 90% confidence based on the Doddington 30-error criterion. Thus, with this rule in mind, one can get a sense of the accuracy of reported error rates from various system vendors once the number of matching trials is known. The independence of trials is another topic to consider when performing due diligence on vendors error rate claims. Ideally, a test of a fingerprint authentication system should consist of what are known as Bernoulli trials. A Bernoulli trial is one that returns a binary output (in the case of a fingerprint authentication system, either a MATCH or a NO MATCH) and is statistically independent from other trials. This is not feasible for large tests, because as soon as an single individual s fingerprint is used in more than a single trial, the independence requirement of a Bernoulli trial is violated. This is because each individual fingerprint s has an error probability distribution with respect to those of another individual. As an example, say Individual A s fingerprints are more likely to match against those of Individual B. Then by having multiple trials of matching fingerprint images from Individuals A and B, the FAR will be inflated. Finally, careful attention must be paid to other factors that could affect test results. One must understand that sources of testing bias cannot be completely eliminated. They are a part of any test involving fingerprint authentication systems. However, it is important to be aware of any bias that might affect the test results. When comparing error rates published by different vendors, one should be conscious of the differences between test parameters and the definitions of the various errors. For example, one vendor might allow three retries in a given trial before considering the trial to be a single failed attempt to match; another vendor might count this as three failed attempts to match. Some consider the FRR to be a measure of false rejects of those who could be enrolled in the system; others consider any failed enrollment to be a contributor to the FRR. Therefore, it is important to have a strong grasp of what the precise definitions of the error rates are when making comparisons of ROC curves. In the absence of published testing standards, this is a very real issue. 6
Biometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationTechnical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication
Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...
More informationThe Expected Performance Curve: a New Assessment Measure for Person Authentication
R E S E A R C H R E P O R T I D I A P The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio 1 Johnny Mariéthoz 2 IDIAP RR 03-84 March 10, 2004 submitted for publication
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationThe Expected Performance Curve: a New Assessment Measure for Person Authentication
The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio Johnny Mariéthoz IDIAP CP 592, rue du Simplon4 192 Martigny, Switzerland {bengio,marietho}@idiap.ch Abstract
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationBio-FactsFigures.docx Page 1
Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationMULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS
MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS I. Introduction James L. Wayman, Director U.S. National Biometric Test Center College of Engineering San
More informationCHAPTER 6 RESULTS AND DISCUSSIONS
151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print
More informationLecture 11: Human Authentication CS /12/2018
Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationPark, Jun Woo KISA / IT Security Evaluation Center
2005. 9. 29 Park, Jun Woo (junupark@kisa.or.kr) KISA / IT Security Evaluation Center Contents Ⅰ Protection Profile Ⅱ Analysis of SOF Ⅲ Analysis Of Vulnerability I. Protection Profile 1. Protection Profile
More informationBasic Concepts of Reliability
Basic Concepts of Reliability Reliability is a broad concept. It is applied whenever we expect something to behave in a certain way. Reliability is one of the metrics that are used to measure quality.
More informationFVC2004: Third Fingerprint Verification Competition
FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -
More informationLecture 3: Linear Classification
Lecture 3: Linear Classification Roger Grosse 1 Introduction Last week, we saw an example of a learning task called regression. There, the goal was to predict a scalar-valued target from a set of features.
More informationViGo Architecture and Principles. Mobile Voice Biometrics as-a-service
ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted
More information6 TOOLS FOR A COMPLETE MARKETING WORKFLOW
6 S FOR A COMPLETE MARKETING WORKFLOW 01 6 S FOR A COMPLETE MARKETING WORKFLOW FROM ALEXA DIFFICULTY DIFFICULTY MATRIX OVERLAP 6 S FOR A COMPLETE MARKETING WORKFLOW 02 INTRODUCTION Marketers use countless
More informationSoftware Quality. Chapter What is Quality?
Chapter 1 Software Quality 1.1 What is Quality? The purpose of software quality analysis, or software quality engineering, is to produce acceptable products at acceptable cost, where cost includes calendar
More information2. On classification and related tasks
2. On classification and related tasks In this part of the course we take a concise bird s-eye view of different central tasks and concepts involved in machine learning and classification particularly.
More informationWeek 10 Part A MIS 5214
Week 10 Part A MIS 5214 Agenda Project Authentication Biometrics Access Control Models (DAC Part A) Access Control Techniques Centralized Remote Access Control Technologies Project assignment You and your
More informationCall for participation. FVC2004: Fingerprint Verification Competition 2004
Call for participation FVC2004: Fingerprint Verification Competition 2004 WEB SITE: http://bias.csr.unibo.it/fvc2004/ The Biometric System Lab (University of Bologna), the Pattern Recognition and Image
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 11, November ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November-2016 483 On Securing Automatic Teller Machine Transactions Using Bank Verification Number Ojulari Hakeem, Oke Alice
More informationADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationMultimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters
Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationNo more than six tables, pictures or figures can be considered for the paper version, although
Archaeometry Thank you for your interest in Archaeometry, we look forward to receiving your paper. We are aiming for the printed edition of Archaeometry to publish papers of no more than 15 pages. We have
More informationChapter 3: User Authentication
Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process
More informationHow accurate is AGNITIO KIVOX Voice ID?
How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,
More informationA GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING
A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at
More informationMobile Biometric Authentication: Pros and Cons of Server and Device-Based
Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Table of Contents 01 Introduction 01 The Ongoing Debate 02 Server-Centric Architecture 02 Device-Centric Architecture 02 Advantages
More informationMetrics for Performance Evaluation How to evaluate the performance of a model? Methods for Performance Evaluation How to obtain reliable estimates?
Model Evaluation Metrics for Performance Evaluation How to evaluate the performance of a model? Methods for Performance Evaluation How to obtain reliable estimates? Methods for Model Comparison How to
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationFunctional Programming in Haskell Prof. Madhavan Mukund and S. P. Suresh Chennai Mathematical Institute
Functional Programming in Haskell Prof. Madhavan Mukund and S. P. Suresh Chennai Mathematical Institute Module # 02 Lecture - 03 Characters and Strings So, let us turn our attention to a data type we have
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationAbout HP Quality Center Upgrade... 2 Introduction... 2 Audience... 2
HP Quality Center Upgrade Best Practices White paper Table of contents About HP Quality Center Upgrade... 2 Introduction... 2 Audience... 2 Defining... 3 Determine the need for an HP Quality Center Upgrade...
More informationThe security challenge in a mobile world
The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario
More informationStart Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE
Verifi ENTERPRISE Start Here IMPORTANT. Always install the Software prior to Hardware Installation Quick Installation Guide Windows XP Fast User Switching Compatible QAS 097 022505 PG1 RA About the Reader
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationPostalOne! System. Release Release Notes
PostalOne! System Release 47.2.0.0 Release Notes CHANGE 5.0 DEPLOYMENT DATE: MAY 20, 2018 RELEASE NOTES PUBLISH DATE: MAY 21, 2018 The following trademarks are owned by the United States Postal Service:
More informationTowards Systematic Usability Verification
Towards Systematic Usability Verification Max Möllers RWTH Aachen University 52056 Aachen, Germany max@cs.rwth-aachen.de Jonathan Diehl RWTH Aachen University 52056 Aachen, Germany diehl@cs.rwth-aachen.de
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationUsing Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V
Using Code Coverage to Improve the Reliability of Embedded Software Whitepaper V2.0 2017-12 Table of Contents 1 Introduction... 3 2 Levels of Code Coverage... 3 2.1 Statement Coverage... 3 2.2 Statement
More informationWELCOME! Lecture 3 Thommy Perlinger
Quantitative Methods II WELCOME! Lecture 3 Thommy Perlinger Program Lecture 3 Cleaning and transforming data Graphical examination of the data Missing Values Graphical examination of the data It is important
More informationTechnical Report. Cross-Sensor Comparison: LG4000-to-LG2200
Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationBits, Words, and Integers
Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationFUNCTIONS AND MODELS
1 FUNCTIONS AND MODELS FUNCTIONS AND MODELS 1.5 Exponential Functions In this section, we will learn about: Exponential functions and their applications. EXPONENTIAL FUNCTIONS The function f(x) = 2 x is
More informationOnline and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationA Biometric Authentication System That Automatically Generates Feature Points
A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,
More informationEffective Threat Modeling using TAM
Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models
More informationPostalOne! System. Release Pre-Release Notes
PostalOne! System Release 47.2.0.0 Pre-Release Notes CHANGE 4.0 SCHEDULED DEPLOYMENT DATE: MAY 20, 2018 SCHEDULED PRE-RELEASE NOTES PUBLISH DATE: MAY 18, 2018 The following trademarks are owned by the
More informationUS Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)
US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider
More informationSurvey Guide: Businesses Should Begin Preparing for the Death of the Password
Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their
More informationAdaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief
Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationUNIT V *********************************************************************************************
Syllabus: 1 UNIT V 5. Package Diagram, Component Diagram, Deployment Diagram (08 Hrs, 16 Marks) Package Diagram: a. Terms and Concepts Names, Owned Elements, Visibility, Importing and Exporting b. Common
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationHow to Choose the Right Designer: A Checklist for Professional Web Design
How to Choose the Right Designer: A Checklist for Professional Web Design How to Choose the Right Designer 2 The Internet has changed the way the world does business and that s just as true for the business
More informationMultimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment
Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment Highest security, easy use on all modern phones Adaptive Trust Level for big and small payments
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationDistributions of random variables
Chapter 3 Distributions of random variables 31 Normal distribution Among all the distributions we see in practice, one is overwhelmingly the most common The symmetric, unimodal, bell curve is ubiquitous
More informationHP Application Lifecycle Management. Upgrade Best Practices
HP Application Lifecycle Management Upgrade Best Practices Document Release Date: October 2010 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationDistributed Sampling in a Big Data Management System
Distributed Sampling in a Big Data Management System Dan Radion University of Washington Department of Computer Science and Engineering Undergraduate Departmental Honors Thesis Advised by Dan Suciu Contents
More informationBECOME A LOAD TESTING ROCK STAR
3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising
More informationSECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY
SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,
More informationCS Authentication of Humans. Prof. Clarkson Spring 2017
CS 5430 Authentication of Humans Prof. Clarkson Spring 2017 Review Course so far: Introduction to security Cryptography Rest of semester: Accountability, both for Prevention and Deterrance Accountability
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationThe Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER
The Bizarre Truth! Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER By Kimmo Nupponen 1 TABLE OF CONTENTS 1. The context Introduction 2. The approach Know the difference
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationZodiac Max OPERATOR GUIDE
Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications
More informationYour Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team
Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and
More informationAdaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More informationChapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.
Chapter 2: Access Control and Site Security ACIS 5584 E-Commerce Security Dr. France Belanger Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall Access Control Definitions Access
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationAuthenticating Nuclear Warheads With High Confidence
Authenticating Nuclear Warheads With High Confidence Moritz Kütt,, Sebastien Philippe, Boaz Barak, Alexander Glaser, and Robert J. Goldston, Princeton University Technische Universität Darmstadt, Germany
More informationUnderstanding Fingerprint Biometrics
TECHNICAL SPECIFICATIONS Understanding Fingerprint Biometrics A brief look at fingerprints, how they are processed and how the accuracy of a biometric system is measured. ipulse Systems 7/1/2014 CONTENTS
More informationCS240 Fall Mike Lam, Professor. Algorithm Analysis
CS240 Fall 2014 Mike Lam, Professor Algorithm Analysis HW1 Grades are Posted Grades were generally good Check my comments! Come talk to me if you have any questions PA1 is Due 9/17 @ noon Web-CAT submission
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationEvaluating Alternatives to Passwords
Security PS Evaluating Alternatives to Passwords Bruce K. Marshall, CISSP, IAM Senior Security Consultant bmarshall@securityps.com Key Topics Key Presentation Topics Authentication Model Authenticator
More informationLouis Fourrier Fabien Gaie Thomas Rolf
CS 229 Stay Alert! The Ford Challenge Louis Fourrier Fabien Gaie Thomas Rolf Louis Fourrier Fabien Gaie Thomas Rolf 1. Problem description a. Goal Our final project is a recent Kaggle competition submitted
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationIncident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014
Incident Requirements and Process Clarification Disposition and FAQ 11/27/2014 Table of Contents 1. Incident Requirements and Process Clarification Disposition... 3 2. Incident Requirements and Process
More informationApplying Context to Web Authentication
Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,
More informationContinuously Discover and Eliminate Security Risk in Production Apps
White Paper Security Continuously Discover and Eliminate Security Risk in Production Apps Table of Contents page Continuously Discover and Eliminate Security Risk in Production Apps... 1 Continuous Application
More informationWHITEPAPER WHAT TO CONSIDER TO SUCCESSFULLY LAUNCH A MOBILE APP! By RG Infotech WHITEPAPER. How to launch a MOBILE APP. Successfully!
WHITEPAPER How to launch a MOBILE APP Successfully! By RG Infotech Since the launch of smartphones, mobile industry embarks several milestones that attracts several industries and developers to enter with
More informationArchitectural Documentation 1
Architectural Documentation Architectural Documentation 1 The Purpose of Architectural Documentation The documentation shall give the reader good understanding of the application's architecture and design.
More informationData Mining and Knowledge Discovery Practice notes 2
Keywords Data Mining and Knowledge Discovery: Practice Notes Petra Kralj Novak Petra.Kralj.Novak@ijs.si Data Attribute, example, attribute-value data, target variable, class, discretization Algorithms
More information1 Machine Learning System Design
Machine Learning System Design Prioritizing what to work on: Spam classification example Say you want to build a spam classifier Spam messages often have misspelled words We ll have a labeled training
More informationAssignment front sheet
Criteria reference To achieve the criteria the evidence must show that the student is able to: Task no. Page numbers P4 Using appropriate design tools, design an interactive website to meet a client need
More informationStructural and Syntactic Pattern Recognition
Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent
More information