By Topic

2012 International Symposium on Biometrics and Security Technologies

26-29 March 2012

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (338 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the General Chair - ISBAST 2012

    Publication Year: 2012, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (199 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • A Spelling Based CAPTCHA System by Using Click

    Publication Year: 2012, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    CAPTCHA has been widely used for preventing malicious programs to access web resources automatically. In this paper, a new type CAPTCHA system will be proposed. The proposed scheme, named Click spell, combined the features of text-based and image-based CAPTCHAs. Click spell asks users to spell a randomly chosen word by clicking distorted letters for passing the test. Users can learn the definition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics

    Publication Year: 2012, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Mouse-dynamics-related schemes have been shown to be feasible for user authentication systems, however, the existing approaches are either intrusive or not prompt response. Preventing unauthorized accesses to critical digital assets, namely, data stored in the file management system, is one of the major objectives of user authentication. We therefore propose a non-intrusive approach capable of ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Fault Tolerance through Crash Recovery

    Publication Year: 2012, Page(s):15 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Computers are indispensable to modern human society. In spite of the tremendous amount of efforts spent on improving the computer software quality, however, software bugs are inevitable. The problems of software bugs could range from minor (such as fonts) to catastrophic (such as mission-critical control programs). There have been different methods proposed by researchers to deal with the software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Many Samples Does Convincible Performance Evaluation of a Biometric System Need?

    Publication Year: 2012, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Before a biometrics system is implied, we evaluated its performance by testing data. While a test dataset, instead of the universal dataset, is used, the performance indices cannot be exactly accurate. Previous researchers have attempted, based on the estimation of the standard deviation, to determine the size of test dataset. Apparently, the larger test sample size is, the more convincible perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimodal Biometrics -- Sources, Architecture and Fusion Techniques: An Overview

    Publication Year: 2012, Page(s):27 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. The increasing demand of enhanced security systems has led to an unprecedented interest in biometric based person authentication system. Biometric systems based on single source of inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Multiple Minutiae Partitions for Fingerprint Authentication

    Publication Year: 2012, Page(s):35 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    Nonlinear distortion of fingerprint images still degrades system performance especially the fingerprint images generated by 1-line swipe sensors. In this paper, a robust fingerprint-matching algorithm based on multiple minutiae partitions (MMP) is presented to match general distorted fingerprints. Minutiae in an input and a template fingerprint are globally partitioned into pairs of multiple neigh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Architecture for Dual Basis GF(2m) Multiplications

    Publication Year: 2012, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    A novel low-complexity scalable architecture for dual basis multiplications over GF(2m) is proposed in this paper. This multiplier architecture is derived from the Hankel matrix-vector representation of dual basis multiplication, and is feasible for the finite fields generated by irreducible trinomials. By appropriately selecting its digit size, the proposed scalable architecture can achieve a sat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Local Binary Pattern and Local Phase Quantization for Face Recognition

    Publication Year: 2012, Page(s):51 - 53
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Combining information contained in image Spatial and frequency domains can provide rich important clues not seen in either individual of these domains. This paper presents a method of face recognition based on local binary pattern(LBP) and local phase quantization(LPQ). The face image is divided into several regions, LBP operator is used to extract LBP feature in the spatial domain and LPQ operato... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications

    Publication Year: 2012, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    In 2008, a convertible multi-authenticated encryption (CMAE) scheme for group communications is proposed by Ting-Yi Chang. Chang's mechanism enables multiple signers to generate a multi-authenticated cipher text associated with the targeted message or document. After receiving this multi-authenticated cipher text, multiple verifiers can recover and verify the message from it. If those signers deny... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Resource Manager for Reconfiguration System

    Publication Year: 2012, Page(s):59 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    This paper is mainly to propose a hardware resource manager for the reconfiguration system. In order to make the system replace the module accurately, the hardware resource manager must thoroughly possess resource indices to present current status of hardware, also to offer the system reference to examine whether the module is configurable or reconfigurable. For that reason, we evaluate the hardwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Forecasting Model Based on Adaptive Fuzzy Time Series and Particle Swarm Optimization

    Publication Year: 2012, Page(s):66 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Limited historical data and large fluctuations are two important issues for forecasting time series. In this paper, a hybrid forecasting model based on adaptive fuzzy time series and particle swarm optimization is proposed to address these issues. In the training phase, the heuristic rules automatically adapt the forecasted values based on trend values and the particle swarm optimization is applie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of Generalized Ring Signatures with Convertibility

    Publication Year: 2012, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2155 KB) | HTML iconHTML

    Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing her/his identity. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, the verifier is unable to tell which member actually produced the signature. A convertible ring signature allows the real signer to c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes

    Publication Year: 2012, Page(s):77 - 81
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    In document authentication, the context refers to the ability to trace the origins of a document to a given person, the device that produced it, or the time and/or place it was produced. Forgeries pose significant dangers in terms of authentication and trust. Therefore, it is essential to maintain the integrity of important documents to prevent document content modification by an intruder. Here, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography

    Publication Year: 2012, Page(s):82 - 89
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1197 KB) | HTML iconHTML

    Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak anti-forensics. Moreover, it is unfortunate because other previous steganography works have seldom considered both large embedding capacity and high image quality. Ther... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Algorithm of Liu's Generalized Lambda-Measure Based Choquet Integral and Hurst Exponent

    Publication Year: 2012, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    In this paper, a novel integrated algorithm of Choquet integral with respect to Liu's generalized Lambda-measure and Hurst exponent was proposed, it can be used for predicting the temperature of thermos table proteins on some useful physicochemical quantities of each amino symbolic sequence with different lengths. A real data set of the temperature of thermos table proteins with 5-fold cross-valid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Evolving Finger Vein Template

    Publication Year: 2012, Page(s):96 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    In a finger vein verification system, when running for a long time, the captured templates could be different from the registered ones because of the user habits changing, the devices ageing, and some other factors. The unsteady discrepancy between templates of the same finger affects the verification results seriously. Therefore, we design a templates evolution method to get evolving templates, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.