A Biometric Authentication System That Automatically Generates Feature Points
|
|
- Aubrey Brooks
- 6 years ago
- Views:
Transcription
1 A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga, JAPAN 2 Information Technology Center, Fukuoka University, , Nanakuma, Jonan-ku, Fukuoka JAPAN Abstract Recently, personal information in the mobile devices have been threatened as the popularization of mobile devices because of the lack attention to the information. The purpose of our research is to develop the reliable and convenient authentication system for mobile devices. In this paper, the development of the biometric authentication system, which generates feature points from freehand pattern and uses the points as the anchors for drawing pattern and points for detecting pen speed, is introduced using the experimental results. Keywords: Biometrics, Authentication, Touch panel, Mobile device, Tracing Authentication 1. Introduction Recently, computerization of the information has proceeded very rapidly. Along with the computerization, the mobile devices, such as smartphones and tablets, are spread among people very rapidly. For example, about 70% of Japanese will possess smartphones as ubiquitous devices in However, the owners of mobile devices do not take care of the security of the personal information which stored in the mobile devices. The development of the mobile devices targets the performance or usability, and security is trampled upon. For this problem, the authentication method that is flexible and convenient for the users is proposed. If the authentication method is not annoying and does not require special knowledge about security, the user will naturally use the authentication system, and will have consciousness to the security. 2. Authentication Methods using Touch Panel As the popularization of the mobile devices such as smartphones and tablet devices, the devices which equipped with touch panel become widespread. And, these devices grow in usage and popularity with the people who are not familiar with the conventional computers. In these situations, a simple authentication method which uses a touch panel is desired. As the authentication method using touch panels, the signature written on the touch panel is often used[1]. However, it is difficult to write identical signature on slippery touch panel especially for capacitive type panel that is recently equipped to almost all mobile devices. As another method, the authentication method which uses the knowledge factors in selecting the symbols or positions in the image is often used[2]. However, this method has a weakness for snooping. Android devices use the lock screen which uses the knowledge factor with connecting the points displayed on the touch panel (Figure 1). However, the patterns which can be drawn are not flexible, and users tend to select simple patterns because the points are fixed. Thus, this method also has a weakness for snooping. For avoiding snooping, Fig. 1: Android lock screen biometric authentication[3] is effective. Biometric authentication is classified into two types; biometric authentication using biological features and biometric authentication using behavioral features. As the biological features, the fingerprints, vein patterns and iris patterns are often used. They can achieve high accuracy. However, special sensor devices, such as fingerprint readers, are required for implementation. As the behavioral features, keystroke timings[4][5] and calligraphy of handwritten patterns or signature[1] are often
2 used. They can be obtained from conventional input devices. However, the accuracy of authentication is lower than that of biological features. At the same time, high accuracy is not always necessary for the devices that are used personally because authentication is used as the lock method just in case the device is stolen or possessed by malicious users. In this paper, the biometric authentication method which uses the biological features obtained from touch panel is proposed. We have proposed an authentication system using the behavior biometrics during drawing the symbol displayed in the touch panel[6]. This system uses pen speed and pen pressure at all sampling times as behavior biometrics, and marks 0.1 as Equal Error Rate (EER). However, capacitive type panel, which is mostly used recently, cannot detect pen pressure, and it requires much computational cost for matching all pen speeds and pen pressures at all sampling time. For this problem, we propose an authentication system which generates feature points automatically. as a behavior factor for biometric authentication. The integration of multi-modal biometrics is reported in [7][8], and the combination of knowledge factor and behavior factor is reported in [9]. The feature points are generated on the points which have large curvature factors of curving line. To detect both of shelving curve and sharp curve simultaneously, the curvature factors are calculated in long intervals and short intervals. The detection of feature points in short interval tends to generate dense points due to jiggling of the finger or touch pen. To avoid this problem, the dense points are integrated to one point. Figure 3,4 shows the examples of generating feature points. In case 1, the feature points are successfully gen- 3. The System Which Generates Feature Points At first, we developed a system which generates feature points. As the environments of development, Xcode and ios SDK 4.3 is used, and ipad is used as the target machine. As shown in Figure 2, this system generates feature points automatically from the freehand curving line. These Fig. 3: Generation of feature points(case 1) Fig. 4: Generation of feature points(case 2) erated in both shelving curve and sharp curve. In case 2, the feature points generated closely during drawing circle twice are integrated Fig. 2: The system which generate feature points 4. Authentication using Knowledge Factor points are displayed on the touch panel during authentication to increase reproducibility of the registered curving line. By displaying the points without curving line, the pattern of connecting points is used as a knowledge factor for authentication. The pen speeds between the points are used In this section, the results of authentication experiments using the connection pattern of feature points as knowledge factor are reported. The pattern is represented in the order of the connections of feature points. It faces the possibility of two problems. At first, the pattern may be guessed from the feature points displayed on the touch panel. Secondly, the
3 user cannot remember the pattern from the feature points. The first problem is examined in this section. The settings of the experiment are as follows. 3 patterns of feature points shown in Figure 5 are registered by users. Ten users triy to guess the pattern from the feature points displayed on the screen. Table 1 shows the results. The number in the threshold values for authentication are set, and authentication succeeds if all differences of pen speeds are less than the thresholds. As the behavior factor varies in each drawing, and the dispersion is different for each user, the threshold is set as ασ according to the variance σ 2 of the pattern that is traced three times in registration phase. The procedure of authentication experiment is as follows. Step 1: Generation of Feature Points The user, who is registered on the system, draws a curving line on touch screen. Then, the feature points are generated as mentioned in Section III, and the connecting pattern is registered for the user as shown in Figure 6. The name of the user is set in the text box on the top of screen for later analysis using the recorded data. Fig. 5: Registered patterns of feature points Table 1: Result of authentication experiment using knowledge factor A B C Complete Starting point table denotes the number of successful users. No user can completely guess the patterns. And, only two users can guess the starting point of pattern C. From this experiment, the authentication using knowledge factor is secure enough. However, if the number of feature points decreases or the registered pattern becomes too simple, it may not secure. An algorithm which evaluates the security of registered pattern is required in practical use. 5. Biometric Authentication using Behavior Factor of Pen Speed We have reported the biometric authentication using behavior factors of pen calligraphy of pen speed and pen pressure[6]. However, recent capacitive touch panel, which is equipped with almost all recent devices, cannot detect pen pressure. Considering the compatibility, the biometric authentication using pen speed is effective. However, it may be not secure enough as biometrics, thus the authentication using the knowledge factor of connecting patterns is simultaneously used. In [6], the distribution of the pen speed along the curving line is used as feature value. However, it requires large computation costs because the number of points tends to be large, and it may be problematic for mobile devices. In this paper, much simpler method is used. The pen speeds between the feature points are used as feature value. For each connection between feature points, Fig. 6: Registration screen Step 2: Registration of Behavior Factor of Pen Speed The user traces the pattern on the touch screen which displays the feature points without curving lines in three times. Then, the averages and variances of pen speeds between the feature points are registered as a behavior factor of pen speed. Step 3: Authentication The user who is authenticated draws the curving line on the touch screen which displays the feature points without curving line. Then, the connecting pattern and pen speeds between the feature points are examined, and if both of knowledge factor and behavior factor meet the condition of authentication, the user is authenticated as true user. Next, the experimental results using a behavior factor of pen speed are reported. As the indexes of evaluation, FRR and FAR are used. FRR is the False Rejection Rate, which is the rate of falsely rejecting the true user as false user. FAR is the False Acceptance Rate, which is the rate of falsely accepting the false user as true user. At first, the factor α
4 in the threshold value is set during the experiment of the authentication of the author as to achieve less than 10 % for FRR as shown in Table 2. To examine the effectiveness of Table 2: Result of authentication experiment using pen speed of author A B C FRR behavior factor, the experiments are conducted with giving the knowledge factor of connecting patterns to all users. Thus, following results of experiments denote the security of behavior factor without knowledge factor. At first, experiments are conducted with showing the connecting pattern with straight lines displayed between the feature points as shown in Figure 7. 6 users A-F register The number in brackets denotes the number of feature points. For all users, FRR becomes less than 0.1, and FAR is also small except user D. The EER is not calculated in these experiments. However, it will be more or less than 0.05 on average. Next, the experiments with showing the authentication process of true user to false users are conducted. In the practical case, the false user may snoop the pattern just before spoofing the true user, and can remember the curving line in authentication process. In these experiments, the lines connecting the feature points are not displayed on authentication screen as in Figure 9. Figure Fig. 9: Authentication screen without lines 10 shows the results. User A-F are not identical to those in Fig. 7: Authentication screen with lines the pattern, and for each calculation of FAR and FRR, more than 10 trials are conducted. Figure 8 shows the results. Fig. 10: Result of authentication experiment using behavior factor(2) - under snooping Fig. 8: Result of authentication experiment using behavior factor (1) the previous experiments. In this case, FAR becomes worse because the pattern is snooped. However, the average is less than 0.1, and EER will be more or less than 0.08 on average. In both experiments, FAR becomes larger for smaller number of feature points. Thus, an algorithm which evaluates the security of registered pattern is required also for behavior factor in practical use.
5 These experimental results are the extreme case in which the connecting pattern is known by false users. In the practical use, the combination of knowledge factor and behavior factor will meet secure authentication. 6. Conclusion In this paper, we propose the authentication which generates the feature points from the handwritten curving line automatically. The pattern of connecting feature points is applied to the authentication using a knowledge factor, and pen speeds between the feature points are applied to the authentication using a behavior factor. The effectiveness of both authentication is examined by experiments, and the combination of the authentication will accomplish secure system. As the future work, the authentication accuracy should be more strengthened. In this paper, simple algorithm using threshold is applied. More sophisticated algorithm like neural network should be applied to authentication system. Recently, the cloud system using HTML 5 WEB applications is spread to mobile devices. The application of this method to WEB applications will achieve the security on cloud system. References [1] J. J. Brault and R. Plamondon: A Complexity Measure of Handwritten Curves: Modelling of Dynamic Signature Forgery, IEEE Trans. Systems, Man and Cybernetics, 23:pp (1993) [2] Hiroshi Dozono, Takayuki Inoue and Masanori Nakakuni,et.al, Study of Biometric Authentication Method using Behavior Characteristics on Game Consoles, Proc. of SAM 2009, (2009) [3] R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior, Guide to Biometrics, Springer, 2004 [4] F. Monrose and A.D. Rubin: Keystroke Dynamics as a Biometric for Authentication, Future Generation Computer Systems, March(2000). [5] H. Dozono and M. Nakakuni et.al, The Analysis of Key Stroke Timings using Self Organizing Maps and its Application to Authentication, Proceedings of the International Conference on Security and Management 2006, pp (2006) [6] Hiroshi Dozono and Masanori Nakakuni, et.al: The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Organizing Maps, Proceedings of the International Conference on Security and Management 2005, pp (2005) [7] S.Dokic,A.Kulesh,et.al, An Overview of Multi-modal Biometrics for Authentication, Proceedings of The 2007 International Conference on Security and Management, pp.39-44(2007) [8] Hiroshi Dozono and Masanori Nakakuni et.al: An Integration Method of Multi-Modal Biometrics Using Supervised Pareto Learning Self Organizing Maps., Proc. of the Internal Joint Conference of Neural Network 2008,(2008) [9] Hiroshi Dozono, Takayuki Inoue and Masanori Nakakuni, A study of the Graphical User Interfaces for Biometric Authentication System, Proc. of SAM 2012, (2012)
A study of the Graphical User Interfaces for Biometric Authentication System
A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,
More informationA Combined Method for On-Line Signature Verification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line
More informationBehavior-based Authentication Systems. Multimedia Security
Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through
More informationA Study on the Consistency of Features for On-line Signature Verification
A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu
More informationVisualization of the Packet Flows using Self Organizing Maps
Visualization of the Packet Flows using Self Organizing Maps HIROSHI DOZONO Saga University Faculty of Science and Engineering 1 Honjyo Saga Saga JAPAN hiro@dna.ec.saga-u.ac.jp TAKERU KABASHIMA Saga University
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationFeature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationOn-line Signature Verification on a Mobile Platform
On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,
More informationRecall Based Authentication System- An Overview
Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer
More informationAn Improved Iris Segmentation Technique Using Circular Hough Transform
An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,
More informationGraphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2
Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com
More informationSecure and Private Identification through Biometric Systems
Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant
More informationINTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER
INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA 95035 1 INTRODUCTION The fingerprint-imaging segment of the biometrics
More informationBiometric identity verification for large-scale high-security apps. Face Verification SDK
Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated
More informationGeneration of Artistic Calligraphic Fonts Considering Character Structure
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/242099701 Generation of Artistic Calligraphic Fonts Considering Character Structure Article
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationObtaining Biometric ROC Curves from a Non-Parametric Classifier in a Long-Text-Input Keystroke Authentication Study
Obtaining Biometric ROC Curves from a Non-Parametric Classifier in a Long-Text-Input Keystroke Authentication Study Robert S. Zack, Charles C. Tappert, Sung-Hyuk Cha, James Aliperti, Alpha Amatya, Thomas
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationA BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE
A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE N S Priya 1, A Lenin Fred 2 1 Assistant Professor, Department of Computer Science and Engineering,
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationShape Feature Extraction for On-line Signature Evaluation
Shape Feature Extraction for On-line Signature Evaluation Jungpil Shin School of Computer Science and Engineering The University of Aizu Fukushima, Japan e-mail: jpshin@u-aizu.ac.jp Weichen Lin School
More informationContinuous User Authentication Using Temporal Information
Continuous User Authentication Using Temporal Information Koichiro Niinuma a, Anil K. Jain b a Fujitsu Laboratories, Kawasaki, Japan; b Department of Computer Science & Engineering, Michigan State University,
More informationExploring Games for Improved Touchscreen Authentication on Mobile Devices
Exploring Games for Improved Touchscreen Authentication on Mobile Devices Padmaja Scindia pscindia@nyit.edu Jonathan Voris jvoris@nyit.edu New York Institute of Technology Department of Computer Science
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationTrial decision. Appeal No Kyoto, Japan. Tokyo, Japan
Trial decision Appeal No. 2015-8097 Kyoto, Japan Appellant Tokyo, Japan Patent Attorney KYOCERA CORPORATION SUGIMURA, Kenji The case of appeal against the examiner's decision of refusal of Japanese Patent
More informationOff-line Signature Verification Using Neural Network
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of
More informationTechnical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication
Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...
More informationBody Sensor Network Security
1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is
More informationarxiv: v1 [cs.cr] 7 Jun 2015
Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices Neil Zhenqiang Gong EECS, UC Berkeley neilz.gong@gmail.com Reza Moazzezi EECS, UC Berkeley rezamoazzezi@berkeley.edu Mathias
More informationUS Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)
US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationA semi-incremental recognition method for on-line handwritten Japanese text
2013 12th International Conference on Document Analysis and Recognition A semi-incremental recognition method for on-line handwritten Japanese text Cuong Tuan Nguyen, Bilan Zhu and Masaki Nakagawa Department
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationDiscovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB
Discovering Computers 2008 Chapter 5 Input 1 Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationIntruders, Human Identification and Authentication, Web Authentication
Intruders, Human Identification and Authentication, Web Authentication David Sanchez Universitat Pompeu Fabra 06-06-2006 Lecture Overview Intruders and Intrusion Detection Systems Human Identification
More informationFace Detection Using Radial Basis Function Neural Networks With Fixed Spread Value
Detection Using Radial Basis Function Neural Networks With Fixed Value Khairul Azha A. Aziz Faculty of Electronics and Computer Engineering, Universiti Teknikal Malaysia Melaka, Ayer Keroh, Melaka, Malaysia.
More informationCustomized Data Filtering For Mobile Signature Verification
Customized Data Filtering For Mobile Signature Verification Seungsoo Nam 1, Hosung Park, Changho Seo 1 and Daeseon Choi 1 Department of Conversions Science, Kongju National University, Korea. Department
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationElectronic Signature Systems
Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationMobile Biometric Authentication: Pros and Cons of Server and Device-Based
Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Table of Contents 01 Introduction 01 The Ongoing Debate 02 Server-Centric Architecture 02 Device-Centric Architecture 02 Advantages
More informationCHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM
107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationSecure Fingerprint Matching with External Registration
Secure Fingerprint Matching with External Registration James Reisman 1, Umut Uludag 2, and Arun Ross 3 1 Siemens Corporate Research, 755 College Road East, Princeton, NJ, 08540 james.reisman@siemens.com
More informationExtremely-Large-Scale Biometric Authentication System - Its Practical Implementation
Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationDynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,
More informationDiscovering Computers Chapter 5 Input
Discovering Computers 2009 Chapter 5 Input Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices
More informationBiometric Cryptosystem Using Online Signatures
Biometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci University Faculty of Engineering and Natural Sciences Istanbul 34956, Turkey alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu
More informationMultimodal Biometrics for Voice and Handwriting
Multimodal Biometrics for Voice and Handwriting Claus Vielhauer and Tobias Scheidat School of Computer Science, Department of Technical and Business Information Systems, Advanced Multimedia and Security
More informationEBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS
EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks
More informationGaithashing: a two-factor authentication scheme based on gait features
Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece
More informationThe Future of Authentication
The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication
More informationSignature Verification: Why xyzmo offers the leading solution
Signature Verification: Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered
More informationUsing Biometric Authentication to Elevate Enterprise Security
Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of
More informationObtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 6 th, 2016 Obtaining Receiver Operating Characteristic Curves from Commercial Biometric Systems George Kulakis, Karen Olson, Jeffrey
More informationOff-line signature verification: a comparison between human and machine performance
Off-line signature verification: a comparison between human and machine performance J. Coetzer B.M. Herbst J.A. du Preez Mathematical Sciences, jcoetzer@sun.ac.za Mathematical Sciences, herbst@dip.sun.ac.za
More informationSpatial Topology of Equitemporal Points on Signatures for Retrieval
Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,
More informationDOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION
DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION 1 V.Rajesh, 2 V.Shyamsundar, 3 R.Naveenraj, 4 Mr.N.Karthik, 1,2,3 UG Scholars, Sri
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationRULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION
RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationFace Detection Using Radial Basis Function Neural Networks with Fixed Spread Value
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol., No. 3, July 2011 CSES International 2011 ISSN 0973-06 Face Detection Using Radial Basis Function Neural Networks with Fixed
More informationThe Analysis of Traffic of IP Packets using CGH. Self Organizing Map
2015 International Conference on Computational Science and Computational Intelligence The Analysis of Traffic of IP Packets using CGH Self Organizing Maps Hiroshi Dozono Department of Advanced Fusion Saga
More informationRobust color segmentation algorithms in illumination variation conditions
286 CHINESE OPTICS LETTERS / Vol. 8, No. / March 10, 2010 Robust color segmentation algorithms in illumination variation conditions Jinhui Lan ( ) and Kai Shen ( Department of Measurement and Control Technologies,
More informationIdentification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:
Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:
More informationEVALUATING DIFFERENT TOUCH-BASED INTERACTION TECHNIQUES IN A PUBLIC INFORMATION KIOSK
EVALUATING DIFFERENT TOUCH-BASED INTERACTION TECHNIQUES IN A PUBLIC INFORMATION KIOSK Roope Raisamo Department of Computer Science University of Tampere P.O. Box 607 (Pinninkatu 53B) FIN-33101 Tampere,
More informationOff-line Signature Verification Using Contour Features
Off-line Signature Verification Using Contour Features Almudena Gilperez, Fernando Alonso-Fernandez, Susana Pecharroman, Julian Fierrez, Javier Ortega-Garcia Biometric Recognition Group - ATVS Escuela
More informationRepositorio Institucional de la Universidad Autónoma de Madrid.
Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationIDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY
IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY WHAT IS MULTIMODALITY? MULTIMODALITY: COMBINATION OF 2 OR SEVERAL COMPLEMENTARY BIOMETRICS Examples: Face and Iris, Hand and face, Finger vein & Fingerprint
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationWiFi concierge at home network focusing on streaming traffic
WiFi concierge at home network focusing on streaming traffic Satoru Nishimaki a), Hiroshi Yamamoto, and Katsuyuki Yamazaki Nagaoka University of Technology, 1603 1 Kamitomioka, Nagaoka, Niigata 940 2188,
More informationHow accurate is AGNITIO KIVOX Voice ID?
How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 11, November ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November-2016 483 On Securing Automatic Teller Machine Transactions Using Bank Verification Number Ojulari Hakeem, Oke Alice
More informationA Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models
A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models Gleidson Pegoretti da Silva, Masaki Nakagawa Department of Computer and Information Sciences Tokyo University
More informationwww.worldconferences.org Implementation of IRIS Recognition System using Phase Based Image Matching Algorithm N. MURALI KRISHNA 1, DR. P. CHANDRA SEKHAR REDDY 2 1 Assoc Prof, Dept of ECE, Dhruva Institute
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017
RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria
More informationCAN WE ESCAPE PASSWORDS?
INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an
More informationMahmood Fathy Computer Engineering Department Iran University of science and technology Tehran, Iran
1 Alignment-Free Fingerprint Cryptosystem Based On Multiple Fuzzy Vault and Minutia Local Structures Ali Akbar Nasiri Computer Engineering Department Iran University of science and technology Tehran, Iran
More informationUser Signature Identification and Image Pixel Pattern Verification
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationSemi-Fragile Watermarking in Biometric Systems: Template Self-Embedding
Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More information