2013 International Conference of the BIOSIG Special Interest Group (BIOSIG)

5-6 Sept. 2013

Filter Results

Displaying Results 1 - 25 of 42
  • [Front cover]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Chairs' message

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Chairs

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Biometrics special interest group

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Further conference contributions

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Security considerations on extending PACE to a biometric-based connection establishment

    Publication Year: 2013, Page(s):1 - 13
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (693 KB) | HTML iconHTML

    The regulations of the European Union (EU) Council in 2004 are the basis of the deployment of electronic passports within the EU. Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) like national electronic ID cards and electronic residence permits, respectively. The security protocols to communicate with an eMRTD ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination of facial landmarks for robust eye localization using the Discriminative Generalized Hough Transform

    Publication Year: 2013, Page(s):1 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3241 KB) | HTML iconHTML

    The Discriminative Generalized Hough Transform (DGHT) is a general and robust automated object localization method, which has been shown to achieve state-of-the-art success rates in different application areas like medical image analysis and person localization. In this contribution the framework is enhanced by a novel fa-ciallandmark combination technique which is theoretically introduced and eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evidence of ageing in hand biometrics

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1540 KB) | HTML iconHTML

    Biometric systems build upon the critical property of measuring behavioral, physiological or chemical human properties remaining stable over time. But both, the age of users and ageing of the user's template may affect performance due to the accumulation of personal changes and indirect behavioral effects like less accurate ability to present the biometric to the sensor. This paper compares short-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Volumetric fingerprint data analysis using Optical Coherence Tomography

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3584 KB) | HTML iconHTML

    The increasing usage of fingerprint biometrics as a security technology requires the biometric systems to be resistant against moderate or even high attack potential. To date, state-of-the-art fingerprint sensors can be deceived by using an accurate imitation of the ridge/valley pattern of an enrolled fingerprint that can be produced utilizing low-cost, commonly available materials and techniques.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulated annealing attack on certain fingerprint authentication systems

    Publication Year: 2013, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (130 KB) | HTML iconHTML

    This paper describes a simple and generic attack against minutiae-based fingerprint authentication systems. The aim of the attack is to construct a fingerprint minutiae template, compliant to ISO/IEC standards, that matches a fixed but unknown target fingerprint. Our attack is expected to be most effective against systems that employ vicinity-based matching algorithms, i.e. systems that divide fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Absolute fingerprint pre-alignment in minutiae-based cryptosystems

    Publication Year: 2013, Page(s):1 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4514 KB) | HTML iconHTML

    Most biometric cryptosystems that have been proposed to protect fingerprint minutiae make use of public alignment helper data. This, however, has the inadvertent effect of information leakage about the protected templates. A countermeasure to avoid auxiliary alignment data is to protect absolutely pre-aligned fingerprints. As a proof of concept, we run performance evaluations of a minutiae fuzzy v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality driven iris recognition improvement

    Publication Year: 2013, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (713 KB) | HTML iconHTML

    The purpose of the work presented in this paper is to adapt the feature extraction and matching steps of iris recognition to the quality of the input images. To this end we define a GMM-based global quality metric associated to a pair of normalized iris images. It quantifies the amount of artifact in these images as well as the amount of texture in artifact-free regions. First we use this metric t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assignment of the evidential value of a fingermark general pattern using a Bayesian network

    Publication Year: 2013, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1619 KB) | HTML iconHTML

    When visible on a fingermark, the general pattern maintains its importance in the fingerprint examination procedure, since the difference between the general pattern of a fingermark and a fingerprint is sufficient for exclusion. In the current work, the importance of the general pattern is extended by evaluating the strength of evidence of a match given corresponding general pattern. In current pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video-based fingerphoto recognition with anti-spoofing techniques with smartphone cameras

    Publication Year: 2013, Page(s):1 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1300 KB) | HTML iconHTML

    This work is concerned with the acquisition of fingerprints samples on smartphones with the built-in smartphone camera. A novel approach to capture multiple fingerphotos in a videostream with a smartphone camera and the processing of the photos for the finger recognition is discussed in this paper. The proposed technique offers a convenient and efficient way to capture multiple samples of a biomet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous authentication using mouse dynamics

    Publication Year: 2013, Page(s):1 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (891 KB) | HTML iconHTML

    In this paper, we demonstrate a new way to perform continuous authentication using Mouse Dynamics as the behavioural biometric modality. In the proposed scheme, the user will be authenticated per mouse event performed on his/her system. We have used a publicly available mouse dynamics dataset and extracted per event features suitable for the proposed scheme. In this research, we have used the mous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spoofing attempt detection using gaze colocation

    Publication Year: 2013, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (474 KB) | HTML iconHTML

    Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper presents a novel method for face liveness detection by tracking the gaze of the user with an ordinary webcam. In the proposed system, an object appears randomly on the display screen which the user is required to look at while their gaze is measured. The visual stimulu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple and effective method for online signature verification

    Publication Year: 2013, Page(s):1 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (380 KB) | HTML iconHTML

    This paper presents a simple and efficient method for online signature verification. The technique is based on a feature set comprising of several histograms that can be computed efficiently given a raw data sequence of an online signature. The features which are represented by a fixed-length vector can not be used to reconstruct the original signature, thereby providing privacy to the user's biom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EEG based user recognition using BUMP modelling

    Publication Year: 2013, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (689 KB) | HTML iconHTML

    In this paper the use of electroencephalogram (EEG) as biometric identifier is investigated. The use of EEG within the biometric framework has already been introduced in the recent past although it has not been extensively analyzed. In this contribution we apply the “bump” modelling analysis for the feature extraction stage within an identification framework, in order to reduce the h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New security definitions for biometric authentication with template protection: Toward covering more threats against authentication systems

    Publication Year: 2013, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (130 KB) | HTML iconHTML

    Existing studies on the security of biometric authentication with template protection have considered the adversaries who obtain only protected templates. Since biometric authentication systems transmit data other than the protected templates, we need to consider how to secure biometric authentication systems against adversaries with those data. In this paper, we propose a classification of advers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A template privacy protection scheme for fingerprint minutiae descriptors

    Publication Year: 2013, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (316 KB) | HTML iconHTML

    It is important in biometric person recognition systems to protect personal data and privacy of users. This paper introduces a new mechanism to revoke and protect fingerprint minutiae information, which can be used in today's security-aware society. The recently developed minutiae cylinder code (MCC), which provides rotation and translation invariant descriptors for accurate fingerprint recognitio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social acceptance of biometric technologies in Germany: A survey

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (138 KB) | HTML iconHTML

    Since the past decade biometric technologies are field-proven, facilitating reliable and secure access control. Numerous successful deployments on large-scale systems, e.g. airports, confirm the feasibility of biometric recognition. However, applications of biometric systems involve privacy concerns, i.e. debates on social and ethical acceptance of biometrics reached levels never previously witnes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spoofing 2D face recognition systems with 3D masks

    Publication Year: 2013, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1370 KB) | HTML iconHTML

    Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A significan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The influence of dataset quality on the results of behavioral biometric experiments

    Publication Year: 2013, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (149 KB) | HTML iconHTML

    This paper explores some aspects that are involved during the construction of reliable benchmark sample databases for novel behavioral biometric identification methods, such as the data quality, the recording patterns and the post processing procedures that may be applied on the data. A large collection of eye movement samples was employed as a test case. It was recorded under a variety of setting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.