{"title":"Randomized pseudo-random function tree walking algorithm for secure radio-frequency identification","authors":"L. Bolotnyy, G. Robins","doi":"10.1109/AUTOID.2005.41","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.41","url":null,"abstract":"Privacy and security are two main concerns in radio frequency identification (RFID) systems. We first extend the analysis of the randomized tree walking algorithm for RFID tag collision avoidance, which is secure against passive adversaries. Then, we devise a new randomized pseudo-random function (PRF) tree walking algorithm, which is secure against active eavesdroppers and allows for the efficient interrogation of many tags. Our algorithm accommodates the addition and removal of tags from the system, and dynamically adapts to security and privacy policy changes.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115720845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Pillai, J. Peternel, H. Heinrich, R. Martinez, K. Rao
{"title":"Using volatile state storage for substantial improvement in RFID throughput","authors":"V. Pillai, J. Peternel, H. Heinrich, R. Martinez, K. Rao","doi":"10.1109/AUTOID.2005.49","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.49","url":null,"abstract":"One of the major problems facing RFID systems today is that of tags not being read, resulting in reduced tag identification rates. This is more likely to happen as large number of tags is present in a small enclosure. We examine one of the causes for missed tags, namely coupling between adjacent tags. We present a theoretical explanation for the cause of coupling between tags and the mechanism by which it causes tags not to be identified. The concept of using a volatile state storage cell is examined. We study how state storage helps to eliminate missed tags, using the ISO 18000-6B protocol as an illustrative example. Experimental results using chips that have state storage capability are presented and we compare identification rates with and without using state storage. It is seen that when state storage is used, all tags are identified and is vastly superior to tag identification without state storage. For the first time, we present results showing how indispensable the concept of state storage is for passive RFID operation. The concept is readily extended to any protocol for passive RFID operation.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ultra-low power, optically-interrogated smart tagging and identification system","authors":"G. B. Perez, M. Malinowski, J. Paradiso","doi":"10.1109/AUTOID.2005.12","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.12","url":null,"abstract":"We present a wireless identification system that employs an optical communications link between an array of uniquely identifiable smart tags and an interrogator flashlight. As the tags consume a quiescent current of under 2 microamperes and are woken up directly by the interrogator's modulated illumination, they are able to last nearly the shelf life of their battery with moderate use. Unlike RFID, which requires a large antenna to achieve significant range, our system requires only a small photodiode, which enables very compact tags to be rapidly queried at a range of over 8 meters with a handheld flashlight interrogator. Our tags are currently aimed at an asset location scenario, where they pulse an onboard LED when their stored ID matches a query broadcast by the interrogator. We also present two different techniques that allow the tags to talk back to the interrogator-one that uses an onboard IR LED to send data a meter away when the interrogator illumination is off and another that uses the onboard green indicator LED for proximate operation. We present our hardware and system design, analyze its performance, and discuss powering the tag from ambient illumination sources.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Bolle, J. Connell, Sharath Pankanti, N. Ratha, A. Senior
{"title":"The relation between the ROC curve and the CMC","authors":"R. Bolle, J. Connell, Sharath Pankanti, N. Ratha, A. Senior","doi":"10.1109/AUTOID.2005.48","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.48","url":null,"abstract":"The cumulative match curve (CMC) is used as a measure of 1: m identification system performance. It judges the ranking capabilities of an identification system. The receiver operating characteristic curve (ROC curve) of a verification system, on the other hand, expresses the quality of a 1:1 matcher. The ROC plots the false accept rate (FAR) of a 1:1 matcher versus the false reject rate (FRR) of the matcher. We show that the CMC is also related to the FAR and FRR of a 1:1 matcher, i.e., the matcher that is used to rank the candidates by sorting the scores. This has as a consequence that when a 1:1 matcher is used for identification, that is, for sorting match scores from high to low, the CMC does not offer any additional information beyond the FAR and FRR curves. The CMC is just another way of displaying the data and can be computed from the FAR and FRR.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A floor sensor system for gait recognition","authors":"L. Middleton, A. A. Buss, A. Bazin, M. Nixon","doi":"10.1109/AUTOID.2005.2","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.2","url":null,"abstract":"This paper describes the development of a prototype floor sensor as a gait recognition system. This could eventually find deployment as a standalone system (e.g. a burglar alarm system) or as part of a multimodal biometric system. The new sensor consists of 1536 individual sensors arranged in a 3 m by 0.5 m rectangular strip with an individual sensor area of 3 cm/sup 2/. The sensor floor operates at a sample rate of 22 Hz. The sensor itself uses a simple design inspired by computer keyboards and is made from low cost, off the shelf materials. Application of the sensor floor to a small database of 15 individuals was performed. Three features were extracted : stride length, stride cadence, and time on toe to time on heel ratio. Two of these measures have been used in video based gait recognition while the third is new to this analysis. These features proved sufficient to achieve an 80% recognition rate.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A taxonomy for physics based synthetic biometric models","authors":"D. Buettner, Nicholas M. Orlans","doi":"10.1109/AUTOID.2005.8","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.8","url":null,"abstract":"Computer generated \"synthetic\" biometrics are not widely used within the biometrics community beyond their current use as a research tool. Yet they offer a number of potential advantages that can be developed further to support the science and practical use of biometrics. Physics-based and intermediate-pattern generation of biometrics will require validation of the underlying statistical distributions if they are to be used as more than just a research tool. This paper proposes taxonomy for physics-based models to be used in the creation of synthetic biometrics.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gaussian mixture models based on the frequency spectra for human identification and illumination classification","authors":"S. Mitra, M. Savvides","doi":"10.1109/AUTOID.2005.31","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.31","url":null,"abstract":"The importance of Fourier domain phase in human face identification is well-established Hayes et al., (1982). It therefore seems natural that identification tools based on phase features should be very efficient. In this paper we introduce a model-based approach using Gaussian mixture models (GMM) based on phase for performing human identification. Identification is performed using a MAP estimate and we show that we are able to achieve misclassification error rates as low as 2% on a database with 65 individuals with extreme illumination variations. The proposed method is easily adaptable to deal with other distortions such as expressions and poses, and hence this establishes its robustness to intra-personal variations. Finally, we demonstrate that GMM based on the Fourier domain magnitude is effective for illumination normalization, so that near perfect identification is obtained using the reconstructed illumination-free images.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker verification with combined threshold, identification front-end, and UBM","authors":"N. Fan, J. Rosca, R. Balan","doi":"10.1109/AUTOID.2005.45","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.45","url":null,"abstract":"This paper presents a novel approach to improve accuracy performance of a speaker verification system through combination or cascading three different verification methods using an identification \"front-end\", a universal background model, and an individual matching score threshold. The performance of a speaker verification system can be determined in terms of false rejection rate and false acceptance rate using a standard benchmark speech corpus, which represents fixed common populations in testing voice and claimed identities. By further assuming uniform distributions, it can show analytically that the false acceptance rate of a standalone system either using the threshold or the universal background model can be significantly reduced when combined with the identification ''front-end''. Experiments have provided clear evidence, and even more gains to combine all three methods together. The results show 60% reduction in the false acceptance rate for combining with the identification \"front-end\" alone, and 80% reduction for combining all three methods without adding penalty in the false rejection rate.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117251873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid method for fingerprint image quality calculation","authors":"Jinqing Qi, D. Abdurrachim, Dongju Li, H. Kunieda","doi":"10.1109/AUTOID.2005.3","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.3","url":null,"abstract":"This paper proposes a new hybrid scheme to measure fingerprint image quality by combining both local and global features of a fingerprint image. Distinguished from traditional methods (e.g. local standard deviation or orientation information based method, etc.), not only the local texture features but also some global factors such as foreground area, central position of foreground, the number of minutiae and the existence of singular points, are taken into account in the proposed method. Besides the detail definitions of seven quality indices, two weighting methods are also proposed for finding the correlation between the final quality value and each quality index. Experimental results on FVC2002 and our private database show that the EER (equal error rate) value can be downed by 12%-34% with 10% images rejected. It demonstrates that the hybrid method is an effective and efficient scheme to discard poor quality images and, hence, can be used to guarantee the reliability and performance of fingerprint recognition system.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time face verification system on a cell-phone using advanced correlation filters","authors":"Chee Kiat Ng, M. Savvides, P. Khosla","doi":"10.1109/AUTOID.2005.42","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.42","url":null,"abstract":"We present a real-time face recognition system that we implemented on a cell-phone using computationally efficient minimum average correlation energy filters. We examine the challenges faced in realizing such a practical system that can perform both enrollment and verification in real-time on the cell-phone using its limited memory and computational resources. Due to the speed and memory constraints of the cellphone, we optimize the correlation filters using a fast fixed-point implementation of 2D Fourier transform optimal for the cell-phone platform. We also detail an efficient algorithm for synthesizing these filters efficiently in order to minimize computation load and making the system practical with real-time enrollment of users.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}