P196 - BIOSIG 2012 - Proceedings of the 11th International Conference of the Biometrics Special Interest Group
Auflistung P196 - BIOSIG 2012 - Proceedings of the 11th International Conference of the Biometrics Special Interest Group nach Titel
1 - 10 von 37
Treffer pro Seite
Sortieroptionen
- Konferenzbeitrag2D Face Liveness Detection: an Overview(BIOSIG 2012, 2012) Kähm, Olga; Damer, NaserFace recognition based on 2D images is a widely used biometric approach. This is mainly due to the simplicity and high usability of this approach. Nonetheless, those solutions are vulnerable to spoof attacks made by non-real faces. In order to identify malicious attacks on such biometric systems, 2D face liveness detection approaches are developed. In this work, face liveness detection approaches are categorized based on the type of liveness indicator used. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works dealing with face liveness detection works is presented. A discussion is made to link the state of the art solutions with the presented categorization along with the available and possible future datasets. All that aim to provide a clear path for the future development of innovative face liveness detection solutions.
- KonferenzbeitragAddressing biometrics security and privacy related challenges in China(BIOSIG 2012, 2012) Mok, Sum Yu; Kumar, AjayThere has been significant advancement improvement in the capabilities of biometrics and data protection technologies in last decade. The significant reduction in cost, improvements in speed and accuracy has resulted in increased deployment of such technologies in day-to-day business and public utilities. The increasing use of biometrics and data protection technologies has also raised concern on the unethical use of personal information. There are increasing number of incidents and concerns in the public over the infringement of personal privacy in China. This paper has investigated such emerging privacy related concerns in the deployment of biometrics and data protection technologies in China. This paper also includes a study on public attitudes toward such technologies and attempts to make comparison with the same in the difference with such emerging concerns in other developed countries. This paper has developed an online survey to ascertain people's understanding on the various aspects of privacy and thus willingness to tradeoff with the benefits of increased security. The online survey was conducted in February – March 2012 and revealed great deal of information from the 305 Hong Kong people. We have attempted to analyze the survey results which illustrate interesting findings on the use of CCTV, biometrics technologies, social networking, disclosure of personal information and recent (2012) privacy policy adjustments in popular websites.
- KonferenzbeitragAnalysis of the acquisition process for keystroke dynamics(BIOSIG 2012, 2012) Giot, Romain; Ninassi, Alexandre; El-Abed, Mohamad; Rosenberger, ChristopheIn order to evaluate authentication methods for keystroke dynamics, it is necessary to create new datasets. We present in this paper an analysis study of the factors, involved during the acquisition process, which affect the performance of keystroke-based authentication systems. More generally speaking, we are looking for the optimal keystroke data acquisition scenario which may deeply affect the performance of such systems. Results show that (1) it is better to choose passwords based on short, simple and known words; and (2) during the acquisition process of a new keystroke dynamics dataset, there is no significant preference for displaying or telling to a user the text to type.
- KonferenzbeitragApplying fusion in thermal face recognition(BIOSIG 2012, 2012) Váňa, Jan; Mráček, Stepán; Poursaberi, Ahmad; Yanushkevich, Svetlana; Drahanský, MartinFace recognition based on thermal images has minor importance in comparison to visible light spectrum recognition. Nevertheless, in applications such as livelyness detection or fever scan, thermal face recognition is used as a stand-alone module, or as part of a multi-modal biometric system. This paper investigates combinations of many methods, used for thermal face recognition, and introduces some new and modified algorithms, which have not been used in the area as of yet. Moreover, we show that the best method is always limited to a certain database (input data). In order to address this problem, the multi-algorithmic biometric fusion, based on the logistic regression, is deployed.
- KonferenzbeitragBiometrics for an ageing society – societal and ethical factors in biometrics and ageing(BIOSIG 2012, 2012) Rebera, Andrew P.; Guihen, BarryBy the middle of the twenty-first century around one third of the European population will be aged 65 or over. This poses two main challenges to biometrics. First, the quality of an image capturable from an older person is likely to be inferior to that of a younger person, leading to increased failure to capture or failure to enroll rates. Second, since biometric features alter over time, `within-person variation' and `template ageing' lead to significant system performance degradation. As society ages the need for solutions becomes increasingly urgent. This paper addresses a major societal and ethical issue this need provokes.
- Editiertes BuchBIOSIG 2012(2012)
- KonferenzbeitragChallenge-based speaker recognition for mobile authentication(BIOSIG 2012, 2012) Baloul, Mossah; Cherrier, Estelle; Rosenberger, ChristopheUser authentication is a major trend to guarantee the security of electronic transactions when using mobile devices such as tablets or mobile phones. Biometrics is for us the only real user authentication method. In this article, we propose to realize a speaker recognition approach to achieve this goal. We use a challenge-based method to avoid the replay attack (especially if the impostor has recorded the user's voice). In this case, free text recognition is realized. Experimental results on the CMU database show very good results, while providing low computation times.
- KonferenzbeitragCommon mistakes on face recognition based on video(BIOSIG 2012, 2012) Despiegel, Vincent; Gentric, StéphaneAutomatic border control e gates relies on face recognition in video streams. Two family of methods could be imagined to define a common workflow: encode all that is possible or select the best image of the stream according to a quality assessment. In gates, giving an answer as soon as possible by encoding each and every possible image seems to lead to faster gates. Is it really the case?
- KonferenzbeitragContactless finger knuckle identification using smartphones(BIOSIG 2012, 2012) Cheng, Kam Yuen; Kumar, AjayThis paper details the development of a smartphone based online system to automatically identify a person by using their finger knuckle image. The key objective is to exploit user-friendly biometric, with least privacy concern, to enhance security of the data in smartphone. The final product from this research is a finger knuckle authentication smartphone application, which is developed under Android operating system with environment version 2.3.3. This paper has developed some specialized algorithms for the finger knuckle detection, image preprocessing and region segmentation. Automatically detected and segmented finger knuckle images are used to encode finger knuckle pattern phase information using a pair of log-Gabor filters. Efficient implementation of various modules is achieved in C/C++ programming language, with OpenCV library, for online application. We also developed a user-friendly graphical user interface for the users to enroll and authenticate themselves. The developed system can therefore acquire finger knuckle image from the smartphone camera and automatically authenticate the genuine users. This paper has also developed a new smartphone based finger knuckle image database of 561 finger knuckle images of 187 different fingers from 109 users, in real imaging environment. In the best of our knowledge, this is the first attempt to develop a mobile phone based finger knuckle identification which has shown highly promising results in automatically identifying the users from their finger knuckle images.
- KonferenzbeitragCurvelet transform-based features extraction for fingerprint identification(BIOSIG 2012, 2012) Guesmi, Hanene; Trichili, Hanene; Alimi, Adel M.; Solaiman, BaselThe performance of the fingerprint identification process highly depends on its extractor of fingerprint features. So, to reduce the dimensionality of the fingerprint image and improve the identification rate, a fingerprint features extraction method based on Curvelet transform is proposed and presented in this paper. Thus, our paper focuses on presenting of our Curvelet-based fingerprint features extraction method. This method consists of two steps: decompose the fingerprint into set of sub-bands by the Curvelet transform and automatic extraction of the most discriminative statistical features of these sub-bands. An extensive experimental evaluation shows that the proposed method is effective and encouraging.