471 research outputs found

    DCT Watermarking Approach for Security Enhancement of Multimodal System

    Get PDF

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    TOWARDS AN OPEN BIOMETRIC ONTOLOGY

    Get PDF
    Over the last decade we faced a great number of publications in the field of biometrics. Many new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology. What some authors call a biometric method, others call model, system or even characteristic. There wasn\u27t enough effort in creating a unique systematization and categorization which would approach the stated issues and open new areas of research. We argue that it is possible to approach biometrics in a narrower and in a broader perspective. We observed biometrics in the narrower perspecive and created a unique framework for the systematization and categorization of biometric methods, models, characteristics and patterns based on a general biometric system. This systematization is a fundamental step forward towards the creation of an open biometrics ontology

    Face Liveness Detection under Processed Image Attacks

    Get PDF
    Face recognition is a mature and reliable technology for identifying people. Due to high-deïŹnition cameras and supporting devices, it is considered the fastest and the least intrusive biometric recognition modality. Nevertheless, eïŹ€ective spooïŹng attempts on face recognition systems were found to be possible. As a result, various anti-spooïŹng algorithms were developed to counteract these attacks. They are commonly referred in the literature a liveness detection tests. In this research we highlight the eïŹ€ectiveness of some simple, direct spooïŹng attacks, and test one of the current robust liveness detection algorithms, i.e. the logistic regression based face liveness detection from a single image, proposed by the Tan et al. in 2010, against malicious attacks using processed imposter images. In particular, we study experimentally the eïŹ€ect of common image processing operations such as sharpening and smoothing, as well as corruption with salt and pepper noise, on the face liveness detection algorithm, and we ïŹnd that it is especially vulnerable against spooïŹng attempts using processed imposter images. We design and present a new facial database, the Durham Face Database, which is the ïŹrst, to the best of our knowledge, to have client, imposter as well as processed imposter images. Finally, we evaluate our claim on the eïŹ€ectiveness of proposed imposter image attacks using transfer learning on Convolutional Neural Networks. We verify that such attacks are more diïŹƒcult to detect even when using high-end, expensive machine learning techniques

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Multimodal biometric authentication using ECG and fingerprint

    Get PDF
    Biometric system is a very important recognition system which is used for individual verification and identification. Various types of biometric traits are used in today's world, in which some are used for commercial purpose and few used for verification purpose. Existing authentication techniques are suffer from different errors like mismatch image, spoofing, falsification in the data, to solve this errors the combination of Electrocardiography(ECG) and fingerprint multimodal is introduced. This proposed modal produces effective recognition system when compared to individual recognition system. The proposed multimodal recognition system provides optimum results compared to the individual recognition system which yields better results for authentication compared to the Existing system
    • 

    corecore