By Topic
Skip to Results

Search Results

You searched for: biometrics
10,723 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    An application framework for evaluating methods in biometrics systems

    Kautsar, S.A. ; Akbar, S. ; Azizah, F.N.
    Data and Software Engineering (ICODSE), 2014 International Conference on

    DOI: 10.1109/ICODSE.2014.7062685
    Publication Year: 2014 , Page(s): 1 - 6

    IEEE Conference Publications

    In recent years, research in biometrics is focused on the development of new methods/algorithms to improve the accuracy of existing biometrics systems. Researchers are often required to do comparisons of their new methods/algorithms with existing/similar methods/algorithms and to make evaluations to show the performance of their biometrics systems. Currently, a universal environment in which researchers can compare and evaluate openly and objectively their biometrics methods/algorithms is rare since researchers tend to focus more on the biometrics methods/algorithms instead of providing such environment for other researchers. This paper presents Biometrika Framework: an application framework that can be used to evaluate various biometrics methods/algorithms. It is found that biometrics systems share a common topology consisting of: capturing, preprocessing, feature extraction, post-processing, matching and a data storage modules. A generic architecture of the framework is described in this paper. The framework has been tested and used to implement and evaluate two biometrics systems on fingerprint and palm-print data. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Biometrics Verification Techniques Combing with Digital Signature for Multimodal Biometrics Payment System

    Jucheng Yang
    Management of e-Commerce and e-Government (ICMeCG), 2010 Fourth International Conference on

    DOI: 10.1109/ICMeCG.2010.88
    Publication Year: 2010 , Page(s): 405 - 410
    Cited by:  Papers (3)

    IEEE Conference Publications

    The multimodal biometrics payment is a new technology that allows people to pay with their own biometrics such as fingerprints, face, hands and so on. In this paper, the biometrics verification techniques combining with digital signature for multimodal biometrics payment system are introduced. Considering the high universality, distinctiveness, easy collect ability of fingerprint and face, a multimodal biometrics verification system with fingerprint and face as inputs is designed, and the hybrid fingerprint features and infrared (IR) face features for matching is to overcome the shortcomings of the traditional methods and grantee the integrity of the registered multimodal biometrics data. And then nine authentication models for authenticating an open network to ensure the integrity of these data are analyzed respectively. At last, a digital signature procedure with the Public Key Infrastructure (PKI) to illustrate a multimodal biometrics payment system with safe model is proposed. The proposed system can be applied to some public key platforms, too. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Biometrics: Privacy and Social Acceptance

    Scheirer, Walter ; Boult, Terrance
    Publication Year: 2010

    IEEE eLearning Library Courses

    This tutorial will cover the ethics, privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual cultures wish to maintain their separate identities. From an individual perspective, the greater the population and the tendency to reduce people to stereotypes, the greater the desire to establish an individual identity. There is, however, another level where identity and the verification of identity, is becoming increasingly important in relation to all manner of transactions, from those related to mobility, to those related to legal, and political, rights and obligations, finally to financial and economical transactions. The intrusion of technology into these areas is not new, but their heightened visibility and ubiquity can create anxiety. This holds particularly true for biometrics. The tutorial will then present the security and privacy issues with traditional biometrics, introduce the Biometrics Dilemma, various threats it poses and a model for biometric DB risk highlighting the problem with standard large-scale biometrics. The tutorial will explain why standard encryption does not solve the key problems, but also explore best practices in using standard encryption, which can improve security. Moving to security, the tutorial will examine security system architectures, the role of authentication in such systems and the standard architectures for authentication using biometrics. It will examine the advantages that biometrics bring, how biometrics can improve security and even privacy in such systems, and then discuss their weakness in both security and privacy. The tutorial will briefly discusses the Nobel Prize winning Economic theory of asymmetric information, Akerlof's market for lemons and Kerckhoffs' principles for security, and their implications for biometrics systems, especially large scale deployments. The last component the tutorial is an in-depth review of the state of the art in what is sometimes called biometric template protection, including biometric encryption, fuzzy vaults, fuzzy extractors, biometric hashing, and cancelable biometrics. The tutorial will walk through a security analysis of these technologies including the published attacks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Hidden biometrics: Towards using biosignals and biomedical images for security applications

    Nait-Ali, A.
    Systems, Signal Processing and their Applications (WOSSPA), 2011 7th International Workshop on

    DOI: 10.1109/WOSSPA.2011.5931509
    Publication Year: 2011 , Page(s): 352 - 356
    Cited by:  Papers (2)

    IEEE Conference Publications

    When dealing with biometrics, we generally refer to security biometrics which is a set of techniques used to identify an individual using his biological or behavioral features. But sometimes, biometrics, in particular medical biometrics, refers to some specific methods that are used to quantify or to measure some parameters extracted from medical data. In this paper, we bridge the gap between the security biometrics and the medical biometrics and we try to discuss and highlight the idea which consists in using medical data, such as biosignals, MRI images and X-Ray images for the purpose of individual identification or verification. This is what we call the “Hidden biometrics” or “Intrinsic biometrics”. As we will see, some of the techniques using biosignals are suited for applications requiring frequent up-dates and other approaches which use medical images are particularly robust regarding any potential forgery. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Problems and Promises of Using the Cloud and Biometrics

    Albahdal, A.A. ; Boult, T.E.
    Information Technology: New Generations (ITNG), 2014 11th International Conference on

    DOI: 10.1109/ITNG.2014.112
    Publication Year: 2014 , Page(s): 293 - 300

    IEEE Conference Publications

    This paper explores the mutual benefits of biometrics technology and cloud computing. Cloud computing can take advantage of the strong authentication property of biometrics in order to enhance the security of the cloud and to introduce new service models (i.e. Biometric authentication as a Service (BioAaaS)). On the other hand, biometrics technology can leverage the cloud's unbounded computational resources and attractive properties of flexibility, scalability, and cost reduction in order to reduce the cost of the biometrics system requirements of different computational resources (i.e. processing power or data storage) and to enhance the performance of biometrics systems' processes (i.e. biometric matching). In this paper, we explore five potential areas where there are mutual advantages between the cloud and biometrics. For each of these five areas, the current status and how biometrics/cloud can enhance or solve problems of the current state-of-the-art is investigated. Next, the challenges facing biometric/cloud applications in each area are discussed. Finally, the literature of applying biometrics/cloud in each area is surveyed. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Protecting Hidden Transmission of Biometrics Using Authentication Watermarking

    Shumin Ding ; Chunlei Li ; Zhoufeng Liu
    Information Engineering (ICIE), 2010 WASE International Conference on

    Volume: 2
    DOI: 10.1109/ICIE.2010.120
    Publication Year: 2010 , Page(s): 105 - 108
    Cited by:  Papers (1)

    IEEE Conference Publications

    Compared with traditional personal identification techniques such as passwords and PIN codes, automated biometrics authentication provides a convenient and reliable method in diverse applications, but their validity must be guaranteed. Watermarking technique may be a solution to ensure the validity of biometrics. In this paper, a novel scheme of protecting hidden transmission of biometrics using authentication watermarking is proposed. Five watermark bits generated from each DCT block are split into two parts: authentication bits and hidden bits. The four authentication bits are utilized to verify the integrity of each image block; the hidden bit is used as a hidden channel to transmit the biometrics data. At the receiver, the integrity of each block is verified using authentication watermarking. The biometrics data is extracted from the block which has been marked as innocent. Redundancy embedding and voting scheme are used as enhancing the rightness of extracted biometrics data. Theoretical analysis and experimental results show that the proposed scheme protects hidden transmission of biometrics and can efficiently recover the biometrics when the watermarked-images suffer from malicious tamper. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Bimodal biometrics for financial infrastructure security

    Esan, O.A. ; Ngwira, S.M. ; Osunmakinde, I.O.
    Information Security for South Africa, 2013

    DOI: 10.1109/ISSA.2013.6641045
    Publication Year: 2013 , Page(s): 1 - 8

    IEEE Conference Publications

    This research examines whether the integration of facial and fingerprint biometrics can improve the performance in financial infrastructure security such as ATM protection. Fingerprint biometrics consider distorted and misaligned fingerprints caused by environmental noise such as oil, wrinkles, dry skin, dirt and displacement of the query fingerprint with the database fingerprint template during matching. The noisy, distorted and/or misaligned fingerprint produced as a 2-D on x-y image, is enhanced and optimized using a new hybrid Modified Gabor Filter-Hierarchal Structure Check (MGF-HSC) system model based on an MGF integrated with an HSC. However, in order to improve the accuracy of financial infrastructure, face biometrics are introduced using a fast principal component analysis algorithm, in which different face conditions such as lighting, blurriness, pose, head orientation and other conditions are addressed. The MGF-HSC approach minimizes false fingerprint matching and the dominant effect of distortion and misalignment of fingerprints to an acceptable level. The proposed bimodal biometrics increase the accuracy of the False Rejection Rate (FRR) to 98% when the False Acceptance Rate (FAR) is 0.1% in an experiment conducted with 1000 test cases. This result shows that facial biometrics can be used to support fingerprint biometrics for improving financial security based on with significant improvement in both FRR and FAR. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Building systems with predictable performance: A Joint Biometrics Architecture emulation

    Giammarco, K. ; Sidhu, D.
    Military Communications Conference, 2008. MILCOM 2008. IEEE

    DOI: 10.1109/MILCOM.2008.4753135
    Publication Year: 2008 , Page(s): 1 - 8

    IEEE Conference Publications

    The US Army CERDEC supported the Army Chief Information Officer (CIO/G-6) on a joint effort to develop a reliable, robust, secure, survivable and optimized Joint Biometrics Architecture with predictable performance in support of the Warfighter. This paper describes the application of an emulation technique for integrated (OVs, SVs, TVs) architecture assessment, and highlights the emulation of a Joint Biometrics Architecture use case in the TeleniX Suite virtual emulation environment as a case study. This emulation used a synthetic Iris Biometrics Database created for testing technical threads and scenarios in the Joint Biometrics Architecture. The emulation focused on the Base Access thread operation as described in the Biometrics Operational Architecture [DoD-2007] with the following scenarios: Enroll a person with a biometrics sample, Allow base access, and Deny base access. Architecture emulation provides insight into performance parameters of real-time communications systems, such as response times for access decisions, bandwidth utilization and data synchronization among geographically distributed Biometrics Databases and users under realistic operational scenarios. The ability to predict such performance parameters at the systems of systems level enables greater understanding of trade offs and better design of the overall system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Beyond classical biometrics: When using hidden biometrics to identify individuals

    Nait-Ali, A.
    Visual Information Processing (EUVIP), 2011 3rd European Workshop on

    DOI: 10.1109/EuVIP.2011.6045559
    Publication Year: 2011 , Page(s): 241 - 246

    IEEE Conference Publications

    The aim of this invited paper is to discuss some emerging biometric approaches that are currently under consideration. After presenting the state of the art, including some advanced techniques, the idea of using some specific medical data for the purpose of identifying individuals is considered. This type of biometrics is called hidden biometrics. Its main advantage is its robustness regarding any potential forgeries. For example, when dealing with brain Magnetic Resonance (MR) images as a biometric tool, no one can modify deliberately features of his own brain even if these features can change over the time in case of pathological individuals, or during the growth period (not considered in this study). In particular, a special interest is given to brain MRI and X-Ray based biometrics. Some examples using brain MRI images, Hand and Lung X-Ray are highlighted in this paper. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Secure Biometrics: Concepts, Authentication Architectures, and Challenges

    Rane, S. ; Ye Wang ; Draper, S.C. ; Ishwar, P.
    Signal Processing Magazine, IEEE

    Volume: 30 , Issue: 5
    DOI: 10.1109/MSP.2013.2261691
    Publication Year: 2013 , Page(s): 51 - 64
    Referenced in:  Biometrics Compendium, IEEE
    Cited by:  Papers (1)

    IEEE Journals & Magazines

    Biometrics are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variations among the measurements of a given biometric, and, unlike passwords or identification numbers, biometrics are derived from physical characteristics that cannot easily be changed. The proliferation of biometric usage raises critical privacy and security concerns that, due to the noisy nature of biometrics, cannot be addressed using standard cryptographic methods. In this article, we present an overview of secure biometrics, also referred to as biometric template protection, an emerging class of methods that address these concerns. View full abstract»

  • Freely Available from IEEE

    Biometrics Computing”

    Zhang, D.
    Advances in ICT for Emerging Regions (ICTer), 2011 International Conference on

    DOI: 10.1109/ICTer.2011.6075011
    Publication Year: 2011 , Page(s): 32

    IEEE Conference Publications

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Biometrics: privacy's foe or privacy's friend?

    Woodward, J.D.
    Proceedings of the IEEE

    Volume: 85 , Issue: 9
    DOI: 10.1109/5.628723
    Publication Year: 1997 , Page(s): 1480 - 1492
    Cited by:  Papers (18)

    IEEE Journals & Magazines

    From the INS to ATM's, both the public and private sectors are making extensive use of biometrics for human recognition. As this technology becomes more economically viable and technically perfected, and thus more commonplace, the field of biometrics will spark legal and policy concerns. Critics inevitably compare biometrics to Big Brother and the loss of individual privacy. The probiometric lobby generally stresses the greater security and improved service that the technology provides. Is biometrics privacy's friend or privacy's foe? This paper explores the various arguments for and against biometrics and contends that while biometrics may pose legitimate privacy concerns, these issues can be adequately addressed. In the final analysis, biometrics emerges as privacy's friend View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Soft Biometrics and Its Application to Security and Business

    Ichino, M. ; Yamazaki, Y.
    Biometrics and Kansei Engineering (ICBAKE), 2013 International Conference on

    DOI: 10.1109/ICBAKE.2013.86
    Publication Year: 2013 , Page(s): 314 - 319

    IEEE Conference Publications

    Biometric technology enables automatic identification or verification of an individual based on the person's physiological or behavioural characteristics. Soft biometrics is a research topic that has attracted a lot of attention recently. The application of soft biometrics in security technology is very promising because it has strong privacy measures and it improves service quality because service is provided that is appropriate to each subject of the soft biometrics application, i.e., the person picked up on camera. Soft biometrics is defined as characteristics that provide some information about an individual but that lack high distinctiveness and performance to sufficiently differentiate any two individuals. We introduce here a summary of soft biometrics and its applications. We also introduce our work in this field. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Consent biometrics

    Kai Yang ; Yingzi Du, E.
    Computational Intelligence in Biometrics and Identity Management (CIBIM), 2011 IEEE Workshop on

    DOI: 10.1109/CIBIM.2011.5949207
    Publication Year: 2011 , Page(s): 78 - 83
    Cited by:  Papers (1)

    IEEE Conference Publications

    Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy concerns: biometrics guarded system can be accessed when users are under threat, reluctant or even unconscious states. For future consumer biometric applications (such as biometric ATM machines or biometric credit cards), the biggest concern is user safety: criminals may intimidate or even hurt users to get into their accounts. In this paper, we propose a new concept, Consent Biometrics, which incorporates a consent signature into biometric systems. We introduce two schemes that can realize the Consent Biometrics idea and an example design for consent iris recognition. The proposed consent biometrics can not only detect the willingness of users, but also improve recognition accuracy. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Biometrics acceptance in Arab culture: An exploratory study

    Rashed, A. ; Santos, H. ; Al-Eryani, A.
    Computer Applications Technology (ICCAT), 2013 International Conference on

    DOI: 10.1109/ICCAT.2013.6521970
    Publication Year: 2013 , Page(s): 1 - 7

    IEEE Conference Publications

    Biometrics development evidences potential to satisfy the user identifying and authentication requirements. However, it is the user judgment which will impact the behaviour to accept or reject this kind of solutions. There has been extensive research conducted to investigate the technical issues of biometrics systems such as accuracy performance, algorithms and system architecture, and just a few focused on user acceptance. This paper is part of a series that study users' behaviour towards acceptance of biometrics as authentication tool. It also aims to present a view of some problems that users face with passwords and how they manage them, in a particular social environment, the Arab culture (more precisely, at Yemen). The findings show that due to using non-secure methods to recall passwords, most Yemenis (who are familiar with ATM and internet) do not suffer from forgetting passwords. However they prefer using biometrics as they perceived both ease of use and usefulness. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Authentication of e-learners using multimodal biometric technology

    Asha, S. ; Chellappan, C.
    Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on

    DOI: 10.1109/ISBAST.2008.4547640
    Publication Year: 2008 , Page(s): 1 - 6
    Cited by:  Papers (7)

    IEEE Conference Publications

    E-leaming systems represent a new form of learning and are becoming more and more popular everyday. Hence security in e-Learning has become a fundamental requirement. But the problem of e- learning systems is that only little money is invested for security. Also to authenticate an e-learner especially in case of e-exams is a major challenge in an e-learning environment. The role of authentication techniques to prevent unauthorized access by malicious users becomes more significant. User authentication methods can be classified into three categories: (1) methods based on human memory such as passwords, (2) methods based on physical devices such as magnetic or IC cards, and (3) methods based on biometrics such as fingerprint, iris, etc., As the first two categories cannot escape vulnerabilities caused by forgetfulness or losses, the third category attracts much attention these days. A major problem of biometrics authentication is that it is not free from an error in the process of extraction of human characteristics and comparison of biometrics data. Multi - biometrics is useful to improve reliability of biometrics authentication when a single biometrics authentication technology cannot satisfy a required reliability level. This paper proposes an authentication system with multi- biometrics to support various services in e-Learning where user authentication is necessary. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Keynote lecture 3: "On gait and soft biometrics for surveillance"

    Nixon, M.
    Advanced Video and Signal Based Surveillance (AVSS), 2013 10th IEEE International Conference on

    DOI: 10.1109/AVSS.2013.6636606
    Publication Year: 2013 , Page(s): XVIII

    IEEE Conference Publications

    Summary form only given. The prime advantage of gait as a biometric is that it can be used for recognition at a distance whereas other biometrics cannot. There is a rich selection of approaches and many advances have been made, as will be reviewed in this talk. Soft biometrics is an emerging area of interest in biometrics where we augment computer vision derived measures by human descriptions. Applied to gait biometrics, this again can be used where other biometric data is obscured or at too low resolution. The human descriptions are semantic and are a set of labels which are converted into numbers. Naturally, there are considerations of language and psychology when the labels are collected. After describing current progress in gait biometrics, this talk will describe how the soft biometrics labels are collected, and how they can be used to enhance recognising people by the way they walk. As well as reinforcing biometrics, this approach might lead to a new procedure for collecting witness statements, and to the ability to retrieve subjects from video using witness statements. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Multi-modal biometrics for mobile authentication

    Aronowitz, H. ; Min Li ; Toledo-Ronen, O. ; Harary, S. ; Geva, A. ; Ben-David, S. ; Rendel, A. ; Hoory, R. ; Ratha, N. ; Pankanti, S. ; Nahamoo, D.
    Biometrics (IJCB), 2014 IEEE International Joint Conference on

    DOI: 10.1109/BTAS.2014.6996269
    Publication Year: 2014 , Page(s): 1 - 8

    IEEE Conference Publications

    User authentication in the context of a secure transaction needs to be continuously evaluated for the risks associated with the transaction authorization. The situation becomes even more critical when there are regulatory compliance requirements. Need for such systems have grown dramatically with the introduction of smart mobile devices which make it far easier for the user to complete such transaction quickly but with a huge exposure to risk. Biometrics can play a very significant role in addressing such problems as a key indicator of the user identity and thus reducing the risk of fraud. While unimodal biometrics authentication systems are being increasingly experimented by mainstream mobile system manufacturers (e.g., fingerprint in iOS), we explore various opportunities of reducing risk in a multimodal biometrics system. The multimodal system is based on fusion of several biometrics combined with a policy manager. A new biometric modality: chirography which is based on user writing on multi-touch screens using their finger is introduced. Coupling with chirography, we also use two other biometrics: face and voice. Our fusion strategy is based on inter-modality score level fusion that takes into account a voice quality measure. The proposed system has been evaluated on an in-house database that reflects the latest smart mobile devices. On this database, we demonstrate a very high accuracy multi-modal authentication system reaching an EER of 0.1% in an office environment and an EER of 0.5% in challenging noisy environments. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Soft biometrics for subject identification using clothing attributes

    Jaha, E.S. ; Nixon, M.S.
    Biometrics (IJCB), 2014 IEEE International Joint Conference on

    DOI: 10.1109/BTAS.2014.6996278
    Publication Year: 2014 , Page(s): 1 - 6

    IEEE Conference Publications

    Recently, soft biometrics has emerged as a novel attribute-based person description for identification. It is likely that soft biometrics can be deployed where other biometrics cannot, and have stronger invariance properties than vision-based biometrics, such as invariance to illumination and contrast. Previously, a variety of bodily soft biometrics has been used for identifying people. Describing a person by their clothing properties is a natural task performed by people. As yet, clothing descriptions have attracted little attention for identification purposes. There has been some usage of clothing attributes to augment biometric description, but a detailed description has yet to be used. We show here how clothing traits can be exploited for identification purposes. We explore the validity and usability of a set of proposed semantic attributes. Human identification is performed, evaluated and compared using different proposed forms of soft clothing traits in addition and in isolation. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Vitality detection from biometrics: State-of-the-art

    Singh, Y.N. ; Singh, S.K.
    Information and Communication Technologies (WICT), 2011 World Congress on

    DOI: 10.1109/WICT.2011.6141226
    Publication Year: 2011 , Page(s): 106 - 111
    Cited by:  Papers (4)

    IEEE Conference Publications

    Biometric authentication systems have become the basis of trust to human society from the beginning of last decade, but the security of the system can be breached by presenting a non-live or fake biometric sample which is the cloned of a legitimate user's identity. Different techniques have been proposed to address the problem of vitality detection from biometrics but these techniques are far away from the final solution. This paper proposes a classification of vitality detection techniques for fingerprint, face and iris biometrics for summarizing the current state-of-the-art and presents a critical review of them. We evaluate the potential of multimodal techniques of vitality detection from biometrics and analyze the performance of different vitality detection techniques on the datasets and the test conditions that have used. The use of physiological signals that have the inherited feature of vitality signs as a supplementary information with other conventional biometrics can offer a potential defense against spoofing attacks in the system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud Password Manager Using Privacy-Preserved Biometrics

    Bian Yang ; Huiguang Chu ; Guoqiang Li ; Petrovic, S. ; Busch, C.
    Cloud Engineering (IC2E), 2014 IEEE International Conference on

    DOI: 10.1109/IC2E.2014.91
    Publication Year: 2014 , Page(s): 505 - 509

    IEEE Conference Publications

    Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts, while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience dilemma by storing and retrieving multiple existing passwords using one master password. On the other hand, a password manager liberates human brain by enabling people to generate strong passwords without worry about memorizing them. While a password manager provides a convenient and secure way to managing multiple passwords, it centralizes the passwords storage and shifts the risk of passwords leakage from distributed service providers to a software or token authenticated by a single master password. Concerned about this one master password based security, biometrics could be used as a second factor for authentication by verifying the ownership of the master password. However, biometrics based authentication is more privacy concerned than a non-biometric password manager. In this paper we propose a cloud password manager scheme exploiting privacy enhanced biometrics, which achieves both security and convenience in a privacy-enhanced way. The proposed password manager scheme relies on a cloud service to synchronize all local password manager clients in an encrypted form, which is efficient to deploy the updates and secure against untrusted cloud service providers. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Multi-Modal Biometrics Pixel Level Fusion and KPCA-RBF Feature Classification for Single Sample Recognition Problem

    Wen-Ying Ma ; Sheng Li ; Yong-Fang Yao ; Chao Lan ; Shi-Qiang Gao ; Hui Tang ; Xiao-Yuan Jing
    Image and Signal Processing, 2009. CISP '09. 2nd International Congress on

    DOI: 10.1109/CISP.2009.5302280
    Publication Year: 2009 , Page(s): 1 - 5

    IEEE Conference Publications

    The single sample recognition problem is a difficult research topic in the field of biometrics, since very limited training samples and image discriminant information can be acquired. We propose a new multi-modal biometrics fusion approach to try to solve this problem, which uses face and palmprint biometrics. We combine the normalized Gaborface and Gaborpalm images in the pixel level, and present a Kernel PCA plus RBF classifier (KPRC) to classify the fused images. Testing on a large face database (Feret) and a large palmprint database, the experimental results demonstrate that the proposed pixel level fusion approach can significantly improve the recognition effects of single-modal biometrics. In addition, our approach is superior to a conventional decision level fusion method. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Hand-Based Feature Level Fusion for Single Sample Biometrics Recognition

    Yanqiang Zhang ; Dongmei Sun ; Zhengding Qiu
    Emerging Techniques and Challenges for Hand-Based Biometrics (ETCHB), 2010 International Workshop on

    DOI: 10.1109/ETCHB.2010.5559289
    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (3)

    IEEE Conference Publications

    Single sample biometrics recognition may lead to bad recognition result in real-world applications. To solve this problem, we present a novel feature level biometrics fusion approach by combining two kinds of biometrics: palmprint and middle finger image, both of which can be acquired from one hand image. We first utilize a manifold learning method to find the local embedding subspaces of palmprint and middle finger images, and then use principal component analysis (PCA) to extract the concatenated feature. To do so, a well performance could be obtained for the reason that the local structures of single model biometrics are preserved, while the redundancies between them are reduced. Comparing with single modal biometrics and score level fusion, the experimental results illustrated the average recognition rate of the proposed approach was significantly promoted to 98.71%. The performance comparisons in terms of cumulative match characteristic (CMC) curves for different recognition approaches were also presented to demonstrate the strength of the proposed fusion scheme. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Multimodal biometrics by integrating fingerprint and palmprint for security

    Mhaske, V.D. ; Patankar, A.J.
    Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on

    DOI: 10.1109/ICCIC.2013.6724125
    Publication Year: 2013 , Page(s): 1 - 5

    IEEE Conference Publications

    Multimodal Biometrics there is a combination of different biometric modalities. In most biometric systems from real world applications uses a single source of biometric modality for authentication that is only a single fingerprint, palm print, face, voice or iris which is known as unimodal biometrics. Some of the drawbacks from unimodal biometrics are eliminated by combining information from multiple biometrics systems for unique personal identity. This paper gives a multimodal biometrics system that combines features of fingerprint and palm print to overcome several limitations of unimodal biometrics. Preprocessing is a heart of image processing in which feature enhancement is prior step, in this system feature enhancement of input image that is fingerprint and palm print are performed by applying a series of preprocessing techniques. Modified Gabor filter is used to independently extract a fingerprint and palmprint feature which provides more accuracy as compared to traditional Gabor filter In addition to this Short Time Fourier transformation is applied for better quality of resultant images. In the later step the resultant images are combined in feature level fusion method and finally using Euclidean distance method the features are classified to match the resultant image with database template. We conclude that proposed methodology has better performance as compared to unimodal approaches using individually only a fingerprint or a palm print. The multiple biometrics helps to reduce the system error rate. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Multiple Biometrics System based on DavinCi Platform

    Yuefeng Huang ; Xinyu Ao ; Yongping Li ; Chengbo Wang
    Information Science and Engineering, 2008. ISISE '08. International Symposium on

    Volume: 2
    DOI: 10.1109/ISISE.2008.163
    Publication Year: 2008 , Page(s): 88 - 92
    Cited by:  Papers (1)

    IEEE Conference Publications

    At the post 911 era, biometrics is employed to deter possible future terrorist's attacks. Also, it has been used in the area of surveillance, access control, and remote monitoring intensively. However, to build a useful biometrics system is difficult, due to the complex nature of such system. Biometrics is an ever-changing variable, and the most challenging issue is the unpredictability of the working environment. At the same time, possible target recognition requires stable input to help to reach a reliable conclusion, thus to apply the biometrics system successfully, a highly portable, reconfigure system is a must. Also, with wide-spread surveillance system, some disguising attacks have been used to compromise the effect of safety, like markup vs. camera and rubber finger vs fingerprint sensors. Therefore, it should be natural for the systems to have good response to such challenge. In this paper, a flexible system capable of active responsiveness, based on TI's DavinCi DSP platform is presented. The system aims to achieve the following goals: (1) be deployed friendly with environment, (2) be flexible to networking environment, and (3) be configurable with changing on scheme of biometrics matching. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.