5 research outputs found

    Unimodal and multimodal biometric sensing systems : a review

    Get PDF
    Biometric systems are used for the verification and identification of individuals using their physiological or behavioral features. These features can be categorized into unimodal and multimodal systems, in which the former have several deficiencies that reduce the accuracy of the system, such as noisy data, inter-class similarity, intra-class variation, spoofing, and non-universality. However, multimodal biometric sensing and processing systems, which make use of the detection and processing of two or more behavioral or physiological traits, have proved to improve the success rate of identification and verification significantly. This paper provides a detailed survey of the various unimodal and multimodal biometric sensing types providing their strengths and weaknesses. It discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems. It also touches on levels and methods of fusion involved in biometric systems and gives researchers in this area a better understanding of multimodal biometric sensing and processing systems and research trends in this area. It furthermore gives room for research on how to find solutions to issues on various unimodal biometric systems.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639am2017Electrical, Electronic and Computer Engineerin

    Biometrias para autenticação e deteção de variações de stress: caso de estudo com população infantil

    Get PDF
    Dissertação de mestrado integrado em Engenharia de Telecomunicações e InformáticaAtualmente o acesso à Internet sem fios através de Wi-Fi e 4G-LTE faz parte do quotidiano da sociedade. Esta tendência possibilitou o aparecimento de mais aplicações e a crescente utilização de dispositivos móveis. A evolução das redes de informação e comunicação ubíquas já é uma realidade, aumentando assim a necessidade de criação de sistemas com melhores garantias de segurança, nomeadamente, através da construção de métodos de autenticação mais robustos que possam ser aplicados de forma contínua. Os recentes avanços no desenvolvimento de redes de sensores sem fios têm vindo a permitir o aperfeiçoamento dos sensores, tornando-os cada vez mais pequenos, com menor consumo de energia e custo, potencializando a sua utilização nas mais diversas áreas de investigação. A recolha de dados biométricos utilizando redes de sensores sem fios surge então como uma das tecnologias mais promissoras para a realização de uma autenticação não repudiável capaz de oferecer melhores condições de privacidade. Esta dissertação apresenta um modelo de deteção de stress para crianças baseado na recolha e análise em tempo real de sinais fisiológicos monitorizados por sensores não invasivos e não intrusivos. A certificação de um estado de stress é realizada tendo em conta a validação de um determinado número de reações biométricas a situações específicas. Os dados biométricos recolhidos serão utilizados para a criação de um método capaz de garantir a autenticação do utilizador. Para validar este modelo, uma experiência foi realizada, demonstrando que é possível inferir que a criança se encontra numa situação de stress monitorizando alguns sinais fisiológicos específicos.Today's access to Wi-Fi and 4G-LTE wireless Internet is making part of society's life. This trend has enabled the emergence of more applications and increased the use of mobile devices. The evolution of ubiquitous information and communication networks is already evident, which leads to the raise of the need to create systems with better guarantees of safety, in particular, by building more robust authentication methods that can be applied continuously. Recent advances in the development of wireless sensor networks have been allowing the improvement of sensors, turning them into smaller devices with lower power consumption and lower cost, increasing their use in several areas of research. Biometric data collection using wireless sensor networks emerged as one of the most promising technologies for creating a non deplorable authentication able to offer better privacy conditions. This dissertation presents a stress detection model based on real time collection and analysis of physiological signals monitored by non-invasive and non-intrusive sensors. The assumption of a state of stress is made taking into account the validation of a certain number of biometric reactions to some specific situations. The biometric data collected will also be used to create a method capable of guaranteing user's authentication. To validate this model, an experiment was set, demonstrating that it is possible to infer stressful situations by monitoring some specific physiological signals

    Securing Cloud Storage by Transparent Biometric Cryptography

    Get PDF
    With the capability of storing huge volumes of data over the Internet, cloud storage has become a popular and desirable service for individuals and enterprises. The security issues, nevertheless, have been the intense debate within the cloud community. Significant attacks can be taken place, the most common being guessing the (poor) passwords. Given weaknesses with verification credentials, malicious attacks have happened across a variety of well-known storage services (i.e. Dropbox and Google Drive) – resulting in loss the privacy and confidentiality of files. Whilst today's use of third-party cryptographic applications can independently encrypt data, it arguably places a significant burden upon the user in terms of manually ciphering/deciphering each file and administering numerous keys in addition to the login password. The field of biometric cryptography applies biometric modalities within cryptography to produce robust bio-crypto keys without having to remember them. There are, nonetheless, still specific flaws associated with the security of the established bio-crypto key and its usability. Users currently should present their biometric modalities intrusively each time a file needs to be encrypted/decrypted – thus leading to cumbersomeness and inconvenience while throughout usage. Transparent biometrics seeks to eliminate the explicit interaction for verification and thereby remove the user inconvenience. However, the application of transparent biometric within bio-cryptography can increase the variability of the biometric sample leading to further challenges on reproducing the bio-crypto key. An innovative bio-cryptographic approach is developed to non-intrusively encrypt/decrypt data by a bio-crypto key established from transparent biometrics on the fly without storing it somewhere using a backpropagation neural network. This approach seeks to handle the shortcomings of the password login, and concurrently removes the usability issues of the third-party cryptographic applications – thus enabling a more secure and usable user-oriented level of encryption to reinforce the security controls within cloud-based storage. The challenge represents the ability of the innovative bio-cryptographic approach to generate a reproducible bio-crypto key by selective transparent biometric modalities including fingerprint, face and keystrokes which are inherently noisier than their traditional counterparts. Accordingly, sets of experiments using functional and practical datasets reflecting a transparent and unconstrained sample collection are conducted to determine the reliability of creating a non-intrusive and repeatable bio-crypto key of a 256-bit length. With numerous samples being acquired in a non-intrusive fashion, the system would be spontaneously able to capture 6 samples within minute window of time. There is a possibility then to trade-off the false rejection against the false acceptance to tackle the high error, as long as the correct key can be generated via at least one successful sample. As such, the experiments demonstrate that a correct key can be generated to the genuine user once a minute and the average FAR was 0.9%, 0.06%, and 0.06% for fingerprint, face, and keystrokes respectively. For further reinforcing the effectiveness of the key generation approach, other sets of experiments are also implemented to determine what impact the multibiometric approach would have upon the performance at the feature phase versus the matching phase. Holistically, the multibiometric key generation approach demonstrates the superiority in generating the bio-crypto key of a 256-bit in comparison with the single biometric approach. In particular, the feature-level fusion outperforms the matching-level fusion at producing the valid correct key with limited illegitimacy attempts in compromising it – 0.02% FAR rate overall. Accordingly, the thesis proposes an innovative bio-cryptosystem architecture by which cloud-independent encryption is provided to protect the users' personal data in a more reliable and usable fashion using non-intrusive multimodal biometrics.Higher Committee of Education Development in Iraq (HCED

    Face Recognition: A Comparative Approach from Traditional to Recent Trends

    Get PDF
    Face recognition, an important biometric method used extensively by researchers, has become more popular recently due to development of mobile applications and frequent usages of facial images in social media. A major development is attained in facial recognition methods due to the emergence of deep learning methods. As a result, the performance of face recognition systems reached a matured state. The objectives of this research are to improve the accuracy rate of both traditional and modern methods of face recognition system under illumination variation by applying various preprocessing techniques. In the proposed face recognition approach, various preprocessing methods like SQI, HE, LTISN, GIC and DoG are applied to the Local Binary Pattern (LBP) feature extraction method and by using the Weighted Entropy based method to fuse the output of classifiers on FERET database, we have shown improvement in recognition accuracy of as high as 88.2 % can be obtained after applying DoG . In a recently used approach, deep CNN model is suggested. The Experiments are conducted in Extended Yale B and FERET Database. The suggested model provides good accuracy rates. To improve the accuracy rates further, preprocessing methods like SQI, HE, LTISN, GIC and DoG are applied to both the models. As a result, higher accuracy rates are achieved in deep CNN model both in Extended Yale B Database and FERET Database. Extended Yale B Database provides the highest accuracy rate of 99.8% after the application of SQI and an accuracy rate of 99.7% is achieved by applying HE

    Security of multimodal biometric systems against spoof attacks

    Get PDF
    A biometric system is essentially a pattern recognition system being used in ad-versarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and de- sign methods of biometric systems do not take into account the vulnerability to such adversary attacks. Therefore, evaluation of classical design methods is an open problem to investigate whether they lead to design secure systems. In order to make biometric systems secure it is necessary to understand and evalu-ate the threats and to thus develop effective countermeasures and robust system designs, both technical and procedural, if necessary. Accordingly, the extension of theory and design methods of biometric systems is mandatory to safeguard the security and reliability of biometric systems in adversarial environments. In this thesis, we provide some contributions towards this direction. Among all the potential attacks discussed in the literature, spoof attacks are one of the main threats against the security of biometric systems for identity recognition. Multimodal biometric systems are commonly believed to be in-trinsically more robust to spoof attacks than systems based on a single biomet-ric trait, as they combine information coming from different biometric traits. However, recent works have question such belief and shown that multimodal systems can be misled by an attacker (impostor) even by spoofing only one of the biometric traits. Therefore, we first provide a detailed review of state-of-the-art works in multimodal biometric systems against spoof attacks. The scope ofstate-of-the-art results is very limited, since they were obtained under a very restrictive “worst-case” hypothesis, where the attacker is assumed to be able to fabricate a perfect replica of a biometric trait whose matching score distribu-tion is identical to the one of genuine traits. Thus, we argue and investigate the validity of “worst-case” hypothesis using large set of real spoof attacks and provide empirical evidence that “worst-case” scenario can not be representa- ixtive of real spoof attacks: its suitability may depend on the specific biometric trait, the matching algorithm, and the techniques used to counterfeit the spoofed traits. Then, we propose a security evaluation methodology of biometric systems against spoof attacks that can be used in real applications, as it does not require fabricating fake biometric traits, it allows the designer to take into account the different possible qualities of fake traits used by different attackers, and it exploits only information on genuine and impostor samples which is col- lected for the training of a biometric system. Our methodology evaluates the performances under a simulated spoof attack using model of the fake score distribution that takes into account explicitly different degrees of the quality of fake biometric traits. In particular, we propose two models of the match score distribution of fake traits that take into account all different factors which can affect the match score distribution of fake traits like the particular spoofed biometric, the sensor, the algorithm for matching score computation, the technique used to construct fake biometrics, and the skills of the attacker. All these factors are summarized in a single parameter, that we call “attack strength”. Further, we propose extension of our security evaluation method to rank several biometric score fusion rules according to their relative robustness against spoof attacks. This method allows the designer to choose the most robust rule according to the method prediction. We then present empirical analysis, using data sets of face and fingerprints including real spoofed traits, to show that our proposed models provide a good approximation of fake traits’ score distribution and our method thus providing an adequate estimation of the security1 of biometric systems against spoof attacks. We also use our method to show how to evaluate the security of different multimodal systems on publicly available benchmark data sets without spoof attacks. Our experimental results show that robustness of multimodal biometric systems to spoof attacks strongly depends on the particular matching algorithm, the score fusion rule, and the attack strength of fake traits. We eventually present evidence, considering a multimodal system based on face and fingerprint biometrics, that the proposed methodology to rank score fusion rules is capable of providing correct ranking of score fusion rules under spoof attacks
    corecore