{"title":"Secure and simplified access to home appliances using Iris recognition","authors":"A. Mondal, K. Roy, P. Bhattacharya","doi":"10.1109/CIB.2009.4925682","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925682","url":null,"abstract":"Moving towards an ‘always-on’, ‘mobile’ and technology driven lifestyle, people are demanding greater technical triumph to make life more exciting, convenient and trouble-free. Automation at home has already started catering to this growing need. Another major motivating factor for this is the prospect of higher energy efficiency, greater control on home from remote locations and the decreasing cost of network-controlled home appliances. In this paper, we propose a novel scheme for accessing home appliances over the Internet using secure communication channel offered by Secure Socket Layer (SSL) with mandatory certificate verification, perform user authentication using Iris image, and then hash the biometric data to provide an impregnable three-factor security to the biometric data as well as user instructions while in transit between the user terminal and the home appliance. Additionally, we propose the use of a single Authentication Server for multiple residences, that would store users' sensitive biometric data, perform authentication, access control and quality of service, thereby reducing cost, effort, user dependability and improve security, acceptability and user-friendliness of home automation universally, together with SIP and UPnP protocols. The proposed approach proves to be more effective because of its well integrated three levels of security, less equal error, very small hash code used for authentication, lower computational complexity while matching, and thus, very fast response.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Person authentication with RDTW based on handwritten PIN and signature with a novel biometric smart pen device","authors":"M. Bashir, J. Kempf","doi":"10.1109/CIB.2009.4925688","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925688","url":null,"abstract":"This paper presents writer authentication using features of handwritten single characters, PIN words and signatures. The kinematics and dynamics of handwriting movement were recorded with a novel ballpoint pen equipped with a diversity of sensors mounted inside the pen. The time series provided by five different sensor channels including refill and finger grip pressures, acceleration and tilt data was analyzed by using a DTW algorithm. To speed up computation a “Reduced Dynamic Time Warping RDTW” technique was applied which is based on the sum of sensor channels and a two steps down-sampling of the multi-dimensional time series. Preliminary results have shown that processing time and memory size could significantly be reduced without deterioration of authentication performance using single characters, signatures and PIN words. Excellent accuracy in recognition was achieved which is mainly due to RDTW technique and the high quality of data sampled by a novel pen device.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing security through a hybrid multibiometric system","authors":"M. Monwar, M. Gavrilova","doi":"10.1109/CIB.2009.4925691","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925691","url":null,"abstract":"Biometric user authentication techniques for security and access control have evoked an enormous interest by science, industry and society in the last two decades. Scientist and researchers have constantly pursued the technology for automated confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. But even the best single biometric system suffers from spoof attacks, intra-class variability, noise, susceptibility etc. To address this issue, we develop a hybrid multibiometric system which integrates multi-algorithm and multi-modal approaches of multibiometric system and use bilevel fusion to combine biometric information. We use face, ear and signature biometric traits which are first classified by three classification techniques- multilayer perceptron, Fisher-image and Bayesian network. The outcomes of these classifiers for face are fused by rank fusion method. Outcomes for ear and signature are also fused similarly. The second level fusion occurs when we combine the results of these three rank fusion methods' outcomes for face, ear and signature with decision fusion method. We use Borda count and Borda fuse approaches for rank fusion and majority voting, weighted majority voting and behavioral knowledge space approaches for decision fusion. The final results indicate that this hybrid multi biometric system outperforms the single biometric systems build on the same data using the same classification algorithms. This system can be effectively used in law enforcement or homeland security department or for commercial purposes.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the feasibility of the visible wavelength, at-a-distance and on-the-move iris recognition","authors":"Hugo Proença","doi":"10.1109/CIB.2009.4925680","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925680","url":null,"abstract":"The dramatic growth in practical applications for iris biometrics has been accompanied by relevant developments in the underlying algorithms and techniques. Among others, one active research area concerns about the development of iris recognition systems less constrained to users, either increasing the imaging distances, simplifying the acquisition protocols or the required lighting conditions. In this paper we address the possibility of perform reliable recognition using visible wavelength images captured under high heterogeneous lighting conditions, with subjects at-a-distance (between 4 and 8 meters) and on-the-move. The feasibility of this extremely ambitious type of recognition is analyzed, its major obstacles and challenges discussed and some directions for forthcoming work pointed.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}