165 research outputs found

    Application of 3D delaunay triangulation in fingerprint authentication system

    Get PDF
    Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based fingerprint authentication system as an improvement to improve the authentication performance without adding extra sensor data. Each unit in a 3D Delaunay triangulation is a Delaunay tetrahedron, which can provide higher discrimination than a Delaunay triangle. From the experimental results it is observed that the 3D Delaunay triangulation based fingerprint authentication system outperforms the 2D based system in terms of matching performance by using same feature representation, e.g., edge. Furthermore, some issues in applying 3D Delaunay triangulation in fingerprint authentication, have been discussed and solved. To the best of our knowledge, this is the first work in literature that deploys 3D Delaunay triangulation in fingerprint authentication research

    A comparison of 2D and 3D Delaunay triangulations for fingerprint authentication

    Get PDF
    The two-dimensional (2D) Delaunay triangulation-based structure, i.e., Delaunay triangle, has been widely used in fingerprint authentication. However, we also notice the existence of three-dimensional (3D) Delaunay triangulation, which has not been extensively explored. Inspired by this, in this paper, the features of both 2D and 3D Delaunay triangulation-based structures are investigated and the findings show that a 3D Delaunay structure, e.g., Delaunay tetrahedron, can provide more feature types and a larger number of elements than a 2D Delaunay structure, which was expected to provide a higher discriminative capability. However, higher discrimination does not necessarily lead to better performance, especially in biometric applications, when biometric uncertainty is unavoidable. Experimental results show that the biometric uncertainty such as missing or spurious minutiae causes more negative influence on the 3D Delaunay triangulation than that on the 2D Delaunay triangulation in three out of four experimental data sets

    ROLAX: LOCATION DETERMINATION TECHNIQUES IN 4G NETWORKS

    Get PDF
    In this dissertation, ROLAX location determination system in 4G networks is presented. ROLAX provides two primary solutions for the location determination in the 4G networks. First, it provides techniques to detect the error-prone wireless conditions in geometric approaches of Time of Arrival (ToA) and Time Difference of Arrival (TDoA). ROLAX provides techniques for a Mobile Station (MS) to determine the Dominant Line-of-Sight Path (DLP) condition given the measurements of the downlink signals from the Base Station (BS). Second, robust RF fingerprinting techniques for the 4G networks are designed. The causes for the signal measurement variation are identified, and the system is designed taking those into account, leading to a significant improvement in accuracy. ROLAX is organized in two phases: offline and online phases. During the offline phase, the radiomap is constructed by wardriving. In order to provide the portability of the techniques, standard radio measurements such as Received Signal Strength Indication (RSSI) and Carrier to Interference Noise Ratio(CINR) are used in constructing the radiomap. During the online phase, a MS performs the DLP condition test for each BS it can observe. If the number of the BSs under DLP is small, the MS attempts to determine its location by using the RF fingerprinting. In ROLAX, the DLP condition is determined from the RSSI, CINR, and RTD (Round Trip Delay) measurements. Features generated from the RSSI difference between two antennas of the MS were also used. The features, including the variance, the level crossing rate, the correlation between the RSSI and RTD, and Kullback-Leibler Divergence, were successfully used in detecting the DLP condition. We note that, compared to using a single feature, appropriately combined multiple features lead to a very accurate DLP condition detection. A number of pattern matching techniques are evaluated for the purpose of the DLP condition detection. Artificial neural networks, instance-based learning, and Rotation Forest are particularly used in the DLP detection. When the Rotation Forest is used, a detection accuracy of 94.8\% was achieved in the live 4G networks. It has been noted that features designed in the DLP detection can be useful in the RF fingerprinting. In ROLAX, in addition to the DLP detection features, mean of RSSI and mean of CINR are used to create unique RF fingerprints. ROLAX RF fingerprinting techniques include: (1) a number of gridding techniques, including overlapped gridding; (2) an automatic radiomap generation technique by the Delaunay triangulation-based interpolation; (3) the filtering of measurements based upon the power-capture relationship between BSs; and (4) algorithms dealing with the missing data. In this work, software was developed using the interfaces provided by Beceem/Broadcom chip-set based software. Signals were collected from both the home network (MAXWell 4G network) and the foreign network (Clear 4G network). By combining the techniques in ROLAX, a distance error in the order of 4 meters was achieved in the live 4G networks

    Biometrics & [and] Security:Combining Fingerprints, Smart Cards and Cryptography

    Get PDF
    Since the beginning of this brand new century, and especially since the 2001 Sept 11 events in the U.S, several biometric technologies are considered mature enough to be a new tool for security. Generally associated to a personal device for privacy protection, biometric references are stored in secured electronic devices such as smart cards, and systems are using cryptographic tools to communicate with the smart card and securely exchange biometric data. After a general introduction about biometrics, smart cards and cryptography, a second part will introduce our work with fake finger attacks on fingerprint sensors and tests done with different materials. The third part will present our approach for a lightweight fingerprint recognition algorithm for smart cards. The fourth part will detail security protocols used in different applications such as Personal Identity Verification cards. We will discuss our implementation such as the one we developed for the NIST to be used in PIV smart cards. Finally, a fifth part will address Cryptography-Biometrics interaction. We will highlight the antagonism between Cryptography – determinism, stable data – and Biometrics – statistical, error-prone –. Then we will present our application of challenge-response protocol to biometric data for easing the fingerprint recognition process

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Multi-Modal Biometrics: Applications, Strategies and Operations

    Get PDF
    The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest and most appropriate strategy for handling these challenges is the use of naturally endowed biometrics, which are the human physiological and behavioural characteristics. This paper presents an overview of the use of biometrics for human verification and identification. The applications, methodologies, operations, integration, fusion and strategies for multi-modal biometric systems that give more secured and reliable human identity management is also presented

    Age invariant face recognition system using automated voronoi diagram segmentation

    Get PDF
    One of the challenges in automatic face recognition is to achieve sequential face invariant. This is a challenging task because the human face undergoes many changes as a person grows older. In this study we will be focusing on age invariant features of a human face. The goal of this study is to investigate the face age invariant features that can be used for face matching, secondly is to come out with a prototype of matching scheme that is robust to the changes of facial aging and finally to evaluate the proposed prototype with the other similar prototype. The proposed approach is based on automated image segmentation using Voronoi Diagram (VD) and Delaunay Triangulations (DT). Later from the detected face region, the eyes will be detected using template matching together with DT. The outcomes, which are list of five coordinates, will be used to calculate interest distance in human faces. Later ratios between those distances are formulated. Difference vector will be use in the proposed method in order to perform face recognition steps. Datasets used for this research is selected images from FG-NET Aging Database and BioID Face Database, which is widely being used for image based face aging analysis; consist of 15 sample images taken from 5 different person. The selection is based on the project scopes and difference ages. The result shows that 11 images are successfully recognized. It shows an increase to 73.34% compared to other recent methods

    Level 3 Feature Based Fingerprint Identification

    Get PDF
    In this thesis, two novel schemes have been proposed: one scheme on dots and incipient ridges extraction and another scheme on matching using level 2 and level 3 features. Dots and incipient ridges are extracted by tracing valley. Starting points are found on the valley by analyzing the frequencies present in the fingerprint. Valleys are traced from the starting point using Fast Marching Method (FMM). An intensity based checking method is used for finding these feature points. Delaunay triangle has been constructed using level 2 feature. A novel algorithm of selecting compatible triangle pair from Delaunay triangle is proposed. A novel set of feature parameters are constructed by establishing spatial relation between minutiae and dots-and-incipient. Pore based matching has been performed using Robust Affine Iterative Closest Point algorithm. These extended features (dots, incipient ridges, and pores) are helpful for forensic experts. However, forensic experts deal with full-to-partial print matching of latent fingerprint. Hence, Full-to-partial fingerprint matching has been carried out. Partial print is constructed by cropping a window from a full fingerprint in two ways such as, non-overlapped cropping and random cropping. Form the experiment, it has been observed that random cropping based fingerprint has better accuracy than non-overlapped cropping. For performance evaluation of the proposed algorithm, two public databases have been used: NIST SD30 database and IIIT Delhi rural database. All images in SD30 are taken in constrained environment and images in IIIT database are taken in unconstrained environment. Feature level and score level fusion have been carried out for fusing different levels of feature. It has been observed that score level fusion shows better accuracy than feature level fusion

    Indoor localization using place and motion signatures

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2013.This electronic version was submitted and approved by the author's academic department as part of an electronic thesis pilot project. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from department-submitted PDF version of thesis.Includes bibliographical references (p. 141-153).Most current methods for 802.11-based indoor localization depend on either simple radio propagation models or exhaustive, costly surveys conducted by skilled technicians. These methods are not satisfactory for long-term, large-scale positioning of mobile devices in practice. This thesis describes two approaches to the indoor localization problem, which we formulate as discovering user locations using place and motion signatures. The first approach, organic indoor localization, combines the idea of crowd-sourcing, encouraging end-users to contribute place signatures (location RF fingerprints) in an organic fashion. Based on prior work on organic localization systems, we study algorithmic challenges associated with structuring such organic location systems: the design of localization algorithms suitable for organic localization systems, qualitative and quantitative control of user inputs to "grow" an organic system from the very beginning, and handling the device heterogeneity problem, in which different devices have different RF characteristics. In the second approach, motion compatibility-based indoor localization, we formulate the localization problem as trajectory matching of a user motion sequence onto a prior map. Our method estimates indoor location with respect to a prior map consisting of a set of 2D floor plans linked through horizontal and vertical adjacencies. To enable the localization system, we present a motion classification algorithm that estimates user motions from the sensors available in commodity mobile devices. We also present a route network generation method, which constructs a graph representation of all user routes from legacy floor plans. Given these inputs, our HMM-based trajectory matching algorithm recovers user trajectories. The main contribution is the notion of path compatibility, in which the sequential output of a classifier of inertial data producing low-level motion estimates (standing still, walking straight, going upstairs, turning left etc.) is examined for metric/topological/semantic agreement with the prior map. We show that, using only proprioceptive data of the quality typically available on a modern smartphone, our method can recover the user's location to within several meters in one to two minutes after a "cold start."by Jun-geun Park.Ph.D
    corecore