IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)最新文献

筛选
英文 中文
Prior resemblance probability of users for multimodal biometrics rank fusion 多模态生物特征等级融合的用户先验相似概率
Hossein Talebi, M. Gavrilova
{"title":"Prior resemblance probability of users for multimodal biometrics rank fusion","authors":"Hossein Talebi, M. Gavrilova","doi":"10.1109/ISBA.2015.7126360","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126360","url":null,"abstract":"Multimodal biometric systems use multiple biometrics traits to increase the recognition rate. The fusion module plays a key role in multi-biometric system performance. This paper presents a novel multimodal rank reinforcement approach based on the prior resemblance probability distribution of each identity in the training data. The resemblance probability distribution is used before the fusion to reinforce the rank list of each biometric matcher. In this paper, we developed a multimodal biometric system based on the frontal face, the profiles face, and the ear. The experimental results show the ability of the prior reinforcement in increasing the accuracy of unimodal biometrics systems as well as increasing the recognition rate of various rank level fusion approaches.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction 一种聚焦细节位置和方向的指纹索引新方法
Guoqiang Li, Bian Yang, C. Busch
{"title":"A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction","authors":"Guoqiang Li, Bian Yang, C. Busch","doi":"10.1109/ISBA.2015.7126346","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126346","url":null,"abstract":"Biometrics identification systems containing a largescale database have been gaining increasing attention. In order to speed up searching in a large-scale fingerprint database, fingerprint indexing algorithm has been studied and introduced into biometrics identification system. One critical component of a fingerprint indexing algorithm is the feature extraction method. Majority of researchers developed the features by combining minutia with other information, such as ridge, singularities, orientation filed, etc. Instead, this paper will focus on only using minutia location and direction to extract features. The performance of proposed fingerprint indexing approach was evaluated on several public databases by being compared to the start-of-the- art fingerprint indexing method - minutia cylinder-code (MCC) - indexing as a benchmark. The experimental results show that the proposed approach gives equivalent performance or even outperforms MCC indexing method on the tested databases.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy 虹膜模式的个性建模和不一致位掩码策略的有效性
Bin Li, Zifei Yan, W. Zuo, Feng Yue
{"title":"Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy","authors":"Bin Li, Zifei Yan, W. Zuo, Feng Yue","doi":"10.1109/ISBA.2015.7126351","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126351","url":null,"abstract":"Iris recognition is one of the most accurate biometric technologies. The uniqueness of iris, also known as iris individuality, has been widely accepted as one foundation for iris recognition. Although a few iris individuality models have been proposed, they are either incomplete or less accurate. In this paper, we investigate the iris individuality problem using Daugman's iris code method. We divide the bits in an iriscode into two groups, i.e., consistent and inconsistent bits, and provide the individuality analysis by both FAR and FRR modeling. Numeric evaluation using real iris data shows its usefulness in predicting the empirical performance. Furthermore, till now it is just experimentally confirmed that the recognition accuracy could be improved by masking out inconsistent bits. In order to formally e- valuate the effectiveness of this strategy, we derive the iris individuality model after masking out the inconsistent bits. Comparison of the two models has demonstrated the improved accuracy of the masking strategy, and the drop of EER is up to about 80%.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Expanding the human-biometric sensor interaction model to identity claim scenarios 扩展人体生物特征传感器交互模型以识别索赔场景
S. Elliott, Kevin O'Connor, Eric Bartlow, Joshua J. Robertson, R. Guest
{"title":"Expanding the human-biometric sensor interaction model to identity claim scenarios","authors":"S. Elliott, Kevin O'Connor, Eric Bartlow, Joshua J. Robertson, R. Guest","doi":"10.1109/ISBA.2015.7126362","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126362","url":null,"abstract":"Biometric technologies represent a significant component of comprehensive digital identity solutions, and play an important role in crucial security tasks. These technologies support identification and authentication of individuals based on their physiological and behavioral characteristics. This has led many governmental agencies to choose biometrics as a supplement to existing identification schemes, most prominently ID cards and passports. Studies have shown that the success of biometric systems relies, in part, on how humans interact and accept such systems. In this paper, the authors build on previous work related to the Human-Biometric Sensor Interaction (HBSI) model and examine it with respect to the introduction of a token (e.g. an electronic passport or identity card) into the biometric system. The role of the imposter within an Identity Claim scenario has been integrated to expand the HBSI model into a full version, which is able to categorise potential False Claims and Attack Presentations.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of human identification accuracy by wavelet of peak-aligned ECG 波峰对准心电小波对人体识别精度的提高
J. B. Fernando, Koji Morikawa
{"title":"Improvement of human identification accuracy by wavelet of peak-aligned ECG","authors":"J. B. Fernando, Koji Morikawa","doi":"10.1109/ISBA.2015.7126358","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126358","url":null,"abstract":"In this paper, a novel method of human identification using electrocardiogram (ECG) is proposed. In the method, while normalizing RR interval, in addition to normalized signal where time interval of P wave, Q wave, R wave, S wave relatively to R wave is unaligned, normalized signal where time interval of those peaks is aligned is also generated. Wavelet transform is then applied to both normalized signals and feature vector is extracted from their wavelet coefficients. ECG data are collected from 10 subjects using a pair of dry electrodes which are held by two fingers. Experiment results show that adding wavelet of peak-aligned ECG improves the classification accuracy, where the maximum accuracy is 100%, 97%, and 90% for data measured in more than 20 seconds, 5 seconds, and 3 seconds respectively.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context independent continuous authentication using behavioural biometrics 使用行为生物识别技术的上下文独立的连续身份验证
Soumik Mondal, Patrick A. H. Bours
{"title":"Context independent continuous authentication using behavioural biometrics","authors":"Soumik Mondal, Patrick A. H. Bours","doi":"10.1109/ISBA.2015.7126342","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126342","url":null,"abstract":"In this research, we focus on context independent continuous authentication that reacts on every separate action performed by a user. The experimental data was collected in a complete uncontrolled condition from 53 users by using our data collection software. In our analysis, we considered both keystroke and mouse usage behaviour patterns to prevent a situation where an attacker avoids detection by restricting to one input device because the continuous authentication system only checks the other input device. The best result obtained from this research is that for 47 bio-metric subjects we have on average 275 actions required to detect an imposter where these biometric subjects are never locked out from the system.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices 二进制水印:一个实用的方法,以解决对消费者移动设备的人脸识别重放攻击
Daniel F. Smith, A. Wiliem, B. Lovell
{"title":"Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices","authors":"Daniel F. Smith, A. Wiliem, B. Lovell","doi":"10.1109/ISBA.2015.7126344","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126344","url":null,"abstract":"Mobile devices (laptops, tablets, and smart phones) are ideal for the wide deployment of biometric authentication, such as face recognition. However, their uncontrolled use and distributed management increases the risk of remote compromise of the device by intruders or malicious programs. Such compromises may result in the device being used to capture the user's face image and replay it to gain unauthorized access to their online accounts, possibly from a different device. Replay attacks can be highly automated and are cheap to launch worldwide, as opposed to spoofing attacks which are relatively expensive as they must be tailored to each individual victim. In this paper, we propose a technique to address replay attacks for a face recognition system by embedding a binary watermark into the captured video. Our monochrome watermark provides high contrast between the signal states, resulting in a robust signal that is practical in a wide variety of environmental conditions. It is also robust to different cameras and tolerates relative movements well. In this paper, the proposed technique is validated on different subjects using several cameras in a variety of lighting conditions. In addition, we explore the limitations of current devices and environments that can negatively impact on performance, and propose solutions to reduce the impact of these limitations.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"4 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigating users' readiness to trade-off biometric fingerprint data 调查用户是否愿意交换生物指纹数据
Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, N. Memon
{"title":"Investigating users' readiness to trade-off biometric fingerprint data","authors":"Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, N. Memon","doi":"10.1109/ISBA.2015.7126366","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126366","url":null,"abstract":"Biometric-based authentication is a growing trend. While this trend is enabled by the introduction of supporting technology, the use of biometrics introduces new privacy and ethical concerns about the direction of authentication. This paper explores willingness of users to share biometric information and therefore take advantage of these technological advances. Specifically, it examines, by means of an experiment, the factors that affect users' decision making when considering providing their fingerprints for a financial incentive. The study surveyed 100 participants and found that most were not willing to share their fingerprints with an e-commerce for any feasible reward. It found that while the financial incentive was a factor, perception of risk (influenced by being exposed to previous cyber-attacks) as well as the participants' self-efficacy had significant effect on the participants' decision making. The study also found that participants make context-based decision about sharing different types of personal data with different entities. The results of the study indicate that many users have concerns sharing their fingerprints with commercial companies. As new systems are being deployed, a better understanding is needed about user perceptions regarding fingerprint data sharing, so they can be better addressed by system designers in the future.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Keystroke dynamics performance enhancement with soft biometrics 击键动力学性能增强与软生物识别
S. Idrus, E. Cherrier, C. Rosenberger, Soumik Mondal, Patrick A. H. Bours
{"title":"Keystroke dynamics performance enhancement with soft biometrics","authors":"S. Idrus, E. Cherrier, C. Rosenberger, Soumik Mondal, Patrick A. H. Bours","doi":"10.1109/ISBA.2015.7126345","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126345","url":null,"abstract":"It is accepted that the way a person types on a keyboard contains timing patterns, which can be used to classify him/her, is known as keystroke dynamics. Keystroke dynamics is a behavioural biometric modality, whose performances, however, are worse than morphological modalities such as fingerprint, iris recognition or face recognition. To cope with this, we propose to combine keystroke dynamics with soft biometrics. Soft biometrics refers to biometric characteristics that are not sufficient to authenticate a user (e.g. height, gender, skin/eye/hair colour). Concerning keystroke dynamics, three soft categories are considered: gender, age and handedness. We present different methods to combine the results of a classical keystroke dynamics system with such soft criteria. By applying simple sum and multiply rules, our experiments suggest that the combination approach performs better than the classification approach with best result of 5.41% of equal error rate. The efficiency of our approaches is illustrated on a public database.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Quality of online signature templates 在线签名模板的质量
Napa Sae-Bae, N. Memon
{"title":"Quality of online signature templates","authors":"Napa Sae-Bae, N. Memon","doi":"10.1109/ISBA.2015.7126354","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126354","url":null,"abstract":"This paper proposes a metric to measure the quality of an online signature template derived from a set of enrolled signature samples in terms of its distinctiveness against random signatures. Particularly, the proposed quality score is computed based on statistical analysis of histogram features that are used as part of an online signature representation. Experiments performed on three datasets consistently confirm the effectiveness of the proposed metric as an indication of false acceptance rate against random forgeries when the system is operated at a particular decision threshold. Finally, the use of the proposed quality metric to enforce a minimum signature strength policy in order to enhance security and reliability of the system against random forgeries is demonstrated.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115708724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信