2014 International Conference of the Biometrics Special Interest Group (BIOSIG)

10-12 Sept. 2014

Filter Results

Displaying Results 1 - 25 of 31
  • [Title page]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Chairs' message

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Chairs

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • BIOSIG 2014 — Biometrics special interest group

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Social acceptance of epassports

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (749 KB) | HTML iconHTML

    Using large-scale web survey in six countries we study the societal readiness and acceptance of specific technology options in relation to the potential next generation of ePassports. We find that the public has only limited knowledge of the electronic data and functions ePassports include, and often have no clear opinion on various potential uses for ePassports and related personal data. Still, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smartphone authentication system using periocular biometrics

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2698 KB) | HTML iconHTML

    The increasing usage of smartphones has raised security concerns regarding these devices due to presence of high amount of personal and sensitive data. The risk is higher without a proper mechanism to handle the authentication to access the smartphone device. In this work, we present a standalone modular biometric system based on periocular information to authenticate towards device. The proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bimodal palm biometric feature extraction using a single RGB image

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (774 KB) | HTML iconHTML

    This paper proposes a method for palm bimodal biometric feature (vein and crease pattern) acquisition from a single RGB image. Typical bimodal biometric systems require combining infrared and visible images for this task. We use a single CMOS color sensor and a specific illumination comprising of two wavelengths to acquire the image. As a result each biometric modality is more pronounced in its ow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speedup for European epassport authentication

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (333 KB) | HTML iconHTML

    The overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on verification of biometrics. We demonstrate that our proposed solution allows to repla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shattering the Glass Maze

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (434 KB) | HTML iconHTML

    Template protection plays a crucial role in protecting the privacy of biometric data, by providing irreversibility and unlinkability. The Glass Maze, as presented by Trugenberger at BIOSIG 2011, is a fingerprint key binding mechanism that is claimed to provide template protection. With the correct fingerprint, the key that is entangled with the fingerprint data can be retrieved. The template prote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When a Bloom filter is a Doom filter: Security assessment of a novel iris biometric template protection system

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (396 KB) | HTML iconHTML

    Biometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symmetry assessment by finite expansion: Application to forensic fingerprints

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1373 KB) | HTML iconHTML

    Common image features have too poor information for identification of forensic images of fingerprints, where only a small area of the finger is imaged and hence a small amount of key points are available. Noise, nonlinear deformation, and unknown rotation are additional issues that complicate identification of forensic fingerprints. We propose a feature extraction method which describes image info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pre-processing cascades and fusion in finger vein recognition

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (413 KB) | HTML iconHTML

    Preprocessing and fusion techniques for finger vein recognition are investigated. An experimental study involving a set of preprocessing approaches shows the importance of selecting the appropriate single technique and the usefulness of cascading several different preprocessing methods for subsequent feature extraction of various types. Score level fusion is able to significantly improve recogniti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the vulnerability of finger vein recognition to spoofing

    Publication Year: 2014, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB) | HTML iconHTML

    The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating and analyzing synthetic finger vein images

    Publication Year: 2014, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2007 KB) | HTML iconHTML

    The finger-vein biometric offers a higher degree of security, personal privacy and strong anti-spoofing capabilities than most other biometric modalities employed today. Emerging privacy concerns with the database acquisition and lack of availability of large scale finger-vein databases have posed challenges in exploring this technology for large scale applications. This paper details the first at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (259 KB) | HTML iconHTML

    Computing the Hamming weight between binary biometric feature vectors in a homomorphic encryption domain can be rather inefficient due to the required bit-wise encryption. A biometric matching technique more efficient than the Goldwasser-Mlcali approach is proposed based on exploiting Paillier's capability of encrypting messages larger than one bit at a time. The efficiency is documented in an iri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient two-stage speaker identification based on universal background models

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (299 KB) | HTML iconHTML

    Conventional speaker identification systems are already field-proven with respect to recognition accuracy. Since any biometric identification requires exhaustive 1 : N comparisons for identifying a biometric probe, comparison time frequently dominates the overall computational workload, preventing the system from being executed in real-time. In this paper we propose a computational efficient two-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-assessing the threat of replay spoofing attacks against automatic speaker verification

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB) | HTML iconHTML

    This paper re-examines the threat of spoofing or presentation attacks in the context of automatic speaker verification (ASV). While voice conversion and speech synthesis attacks present a serious threat, and have accordingly received a great deal of attention in the recent literature, they can only be implemented with a high level of technical know-how. In contrast, the implementation of replay at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-factor protection scheme for MCC fingerprint templates

    Publication Year: 2014, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB) | HTML iconHTML

    Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint matching. To avoid that MCC templates can disclose sensitive information about position and angle of minutiae, a protected MCC representation was recently introduced (called P-MCC). In spite of a satisfactory level of accuracy and irreversibility, P-MCC templates cannot be revoked. In this paper we propose a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved age prediction from biometric data using multimodal configurations

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (440 KB) | HTML iconHTML

    The prediction of individual characteristics from biometric data which falls short of full identity prediction is nevertheless a valuable capability in many practical applications. This paper considers age prediction in two biometric modalities (iris and handwritten signature) and explores how different feature types and classification strategies can be used to overcome possible constraints in dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fixed FAR vote fusion of regional facial classifiers

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (401 KB) | HTML iconHTML

    Holistic face recognition methods like PCA and LDA have the disadvantage that they are very sensitive to expression, hair and illumination variations. This is one of the main reasons they are no longer competitive in the major benchmarks like FRGC and FRVT. In this paper we present an LDA based approach that combines many overlapping regional classifiers (experts) using what we call a Fixed FAR Vo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D face recognition on low-cost depth sensors

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (657 KB) | HTML iconHTML

    This paper deals with the biometric recognition of 3D faces with the emphasis on the low-cost depth sensors; such are Microsoft Kinect and SoftKinetic DS325. The presented approach is based on the score-level fusion of individual recognition units. Each unit processes the input face mesh and produces a curvature, depth, or texture representation. This image representation is further processed by s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion of gait and ECG for biometric user authentication

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    A new multi-modal biometric authentication approach using gait and electrocardiogram (ECG) signals as biometric traits is proposed. The individual comparison scores derived from the gait and ECG are normalized using several methods (min-max, z-score, median absolute deviation, tangent hyperbolic) and then four fusion approaches (simple sum, user-weighting, maximum score and minimum core) are appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A biometric key-binding scheme using lattice masking

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (222 KB) | HTML iconHTML

    Template protection technology can protect the confidentiality of a biometric template by certain conversion. We focus on the key-binding approach for template protection. This approach generates a secure template (or a conversion template) from joint data of a user's specific key with a user's template, and the key can be correctly extracted from the secure template only when a queried biometric ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.