3,680 research outputs found

    Multimodal person recognition for human-vehicle interaction

    Get PDF
    Next-generation vehicles will undoubtedly feature biometric person recognition as part of an effort to improve the driving experience. Today's technology prevents such systems from operating satisfactorily under adverse conditions. A proposed framework for achieving person recognition successfully combines different biometric modalities, borne out in two case studies

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Multi-Factor Authentication: A Survey

    Get PDF
    Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe

    London Creative and Digital Fusion

    Get PDF
    date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 +0000date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 +0000The London Creative and Digital Fusion programme of interactive, tailored and in-depth support was designed to support the UK capital’s creative and digital companies to collaborate, innovate and grow. London is a globally recognised hub for technology, design and creative genius. While many cities around the world can claim to be hubs for technology entrepreneurship, London’s distinctive potential lies in the successful fusion of world-leading technology with world-leading design and creativity. As innovation thrives at the edge, where better to innovate than across the boundaries of these two clusters and cultures? This booklet tells the story of Fusion’s innovation journey, its partners and its unique business support. Most importantly of all it tells stories of companies that, having worked with London Fusion, have innovated and grown. We hope that it will inspire others to follow and build on our beginnings.European Regional Development Fund 2007-13

    A Review of Voice-Base Person Identification: State-of-the-Art

    Get PDF
    Automated person identification and authentication systems are useful for national security, integrity of electoral processes, prevention of cybercrimes and many access control applications. This is a critical component of information and communication technology which is central to national development. The use of biometrics systems in identification is fast replacing traditional methods such as use of names, personal identification numbers codes, password, etc., since nature bestow individuals with distinct personal imprints and signatures. Different measures have been put in place for person identification, ranging from face, to fingerprint and so on. This paper highlights the key approaches and schemes developed in the last five decades for voice-based person identification systems. Voice-base recognition system has gained interest due to its non-intrusive technique of data acquisition and its increasing method of continually studying and adapting to the person’s changes. Information on the benefits and challenges of various biometric systems are also presented in this paper. The present and prominent voice-based recognition methods are discussed. It was observed that these systems application areas have covered intelligent monitoring, surveillance, population management, election forensics, immigration and border control

    THE ETHICAL USE OF FACIAL RECOGNITION TECHNOLOGY: A CASE STUDY OF U.S. CUSTOMS AND BORDER PROTECTION

    Get PDF
    After the events of 9/11, facial recognition technology (FRT) emerged as a security solution for identifying and verifying individuals in a homeland security setting. Although FRT demonstrates security benefits, the public has not widely accepted the government’s use of the technology. FRT critics raise ethical and societal concerns regarding the negative impact of the technology on the public, including privacy concerns, constitutional rights violations, biased and inaccurate technology, and data management. How can FRT be implemented in a way that is both efficient and ethical? This thesis analyzes FRT through a three-pronged approach. First, the thesis applies the “How to Do It Right” ethical framework to a government agency’s decision-making process. The second step identifies ethical operating principles through a crosswalk of the varied and often inconsistent operating principles published by the security industry, government audit agencies, and watchdog groups. Finally, the thesis utilizes a real-world case study to explore an operational FRT program and illustrate best practices. It recommends that following an ethical framework during decision-making and incorporating ethical principles and best practices into FRT programs during development and implementation mitigates the public’s ethical and societal concerns.Civilian, Department of Homeland SecurityApproved for public release. Distribution is unlimited
    • 

    corecore