42 research outputs found

    Neural network method of dynamic biometrics for detecting the substitution of computer

    Get PDF
    © 2018, Institute of Advanced Scientific Research, Inc.. All rights reserved. In this paper, we research the dynamic neural network method for biometric identification of computer users. We analyze the task of detecting the substitution of computer systems users basing the methods of password authentication or authentication using technical devices. To solve this problem, the need to apply biometric authentication methods is actualized. Various methods of users biometric features isolating based on discrete orthogonal transformations are considered. The requirements for choosing biometric identification and authentication methods are formulated: there is no need for additional hardware equipment, the possibility of imperceptible user identification and the analyzed features readability during the workstation use. According on these requirements necessity of users’ recognition based on the mouse moves dynamics is justified. The technique of initial data collecting and their preparation for analysis on the basis of neural network training is described. The neural network model construction use “Deductor” environment. The method of informative features optimal system and neural network architecture searching is developed. We suggested the most efficiency neural network model by the obtained analysis results for computer user’s biometric identification. As the criterion of neural network model optimality the minimal error in user substitution detecting was chosen. The best was a neural network with 6 neurons in the hidden layer, a binary output and 10 input neurons

    An examination of quantitative methods for Forensic Signature Analysis and the admissibility of signature verification system as legal evidence.

    Get PDF
    The experiments described in this thesis deal with handwriting characteristics which are involved in the production of forged and genuine signatures and complexity of signatures. The objectives of this study were (1) to provide su?cient details on which of the signature characteristics are easier to forge, (2) to investigate the capabilities of the signature complexity formula given by Found et al. based on a different signature database provided by University of Kent. This database includes the writing movements of 10 writers producing their genuine signature and of 140 writers forging these sample signatures. Using the 150 genuine signatures without constrictions of the Kent’s database an evaluation of the complexity formula suggested in Found et al took place divided the signature in three categories low, medium and high graphical complexity. The results of the formula implementation were compared with the opinions of three leading professional forensic document examiners employed by Key Forensics in the UK. The analysis of data for Study I reveals that there is not ample evidence that high quality forgeries are possible after training. In addition, a closer view of the kinematics of the forging writers is responsible for our main conclusion, that forged signatures are widely different from genuine especially in the kinematic domain. From all the parameters used in this study 11 out of 15 experienced significant changes when the comparison of the two groups (genuine versus forged signature) took place and gave a clear picture of which parameters can assist forensic document examiners and can be used by them to examine the signatures forgeries. The movements of the majority of forgers are signi?cantly slower than those of authentic writers. It is also clearly recognizable that the majority of forgers perform higher levels of pressure when trying to forge the genuine signature. The results of Study II although limited and not entirely consistent with the study of Found that proposed this model, indicate that the model can provide valuable objective evidence (regarding complex signatures) in the forensic environment and justify its further investigation but more work is need to be done in order to use this type of models in the court of law. The model was able to predict correctly only 53% of the FDEs opinion regarding the complexity of the signatures. Apart from the above investigations in this study there will be also a reference at the debate which has started in recent years that is challenging the validity of forensic handwriting experts’ skills and at the effort which has begun by interested parties of this sector to validate and standardise the field of forensic handwriting examination and a discussion started. This effort reveals that forensic document analysis field meets all factors which were set by Daubert ruling in terms of theory proven, education, training, certification, falsifiability, error rate, peer review and publication, general acceptance. However innovative methods are needed for the development of forensic document analysis discipline. Most modern and effective solution in order to prevent observational and emotional bias would be the development of an automated handwriting or signature analysis system. This system will have many advantages in real cases scenario. In addition the significant role of computer-assisted handwriting analysis in the daily work of forensic document examiners (FDE) or the judicial system is in agreement with the assessment of the National Research Council of United States that “the scientific basis for handwriting comparison needs to be strengthened”, however it seems that further research is required in order to be able these systems to reach the accomplishment point of this objective and overcome legal obstacles presented in this study

    Classification and Verification of Online Handwritten Signatures with Time Causal Information Theory Quantifiers

    Get PDF
    We present a new approach for online handwritten signature classification and verification based on descriptors stemming from Information Theory. The proposal uses the Shannon Entropy, the Statistical Complexity, and the Fisher Information evaluated over the Bandt and Pompe symbolization of the horizontal and vertical coordinates of signatures. These six features are easy and fast to compute, and they are the input to an One-Class Support Vector Machine classifier. The results produced surpass state-of-the-art techniques that employ higher-dimensional feature spaces which often require specialized software and hardware. We assess the consistency of our proposal with respect to the size of the training sample, and we also use it to classify the signatures into meaningful groups.Comment: Submitted to PLOS On

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    Get PDF
    During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity

    Vulnerability assessment in the use of biometrics in unsupervised environments

    Get PDF
    MenciĂłn Internacional en el tĂ­tulo de doctorIn the last few decades, we have witnessed a large-scale deployment of biometric systems in different life applications replacing the traditional recognition methods such as passwords and tokens. We approached a time where we use biometric systems in our daily life. On a personal scale, the authentication to our electronic devices (smartphones, tablets, laptops, etc.) utilizes biometric characteristics to provide access permission. Moreover, we access our bank accounts, perform various types of payments and transactions using the biometric sensors integrated into our devices. On the other hand, different organizations, companies, and institutions use biometric-based solutions for access control. On the national scale, police authorities and border control measures use biometric recognition devices for individual identification and verification purposes. Therefore, biometric systems are relied upon to provide a secured recognition where only the genuine user can be recognized as being himself. Moreover, the biometric system should ensure that an individual cannot be identified as someone else. In the literature, there are a surprising number of experiments that show the possibility of stealing someone’s biometric characteristics and use it to create an artificial biometric trait that can be used by an attacker to claim the identity of the genuine user. There were also real cases of people who successfully fooled the biometric recognition system in airports and smartphones [1]–[3]. That urges the necessity to investigate the potential threats and propose countermeasures that ensure high levels of security and user convenience. Consequently, performing security evaluations is vital to identify: (1) the security flaws in biometric systems, (2) the possible threats that may target the defined flaws, and (3) measurements that describe the technical competence of the biometric system security. Identifying the system vulnerabilities leads to proposing adequate security solutions that assist in achieving higher integrity. This thesis aims to investigate the vulnerability of fingerprint modality to presentation attacks in unsupervised environments, then implement mechanisms to detect those attacks and avoid the misuse of the system. To achieve these objectives, the thesis is carried out in the following three phases. In the first phase, the generic biometric system scheme is studied by analyzing the vulnerable points with special attention to the vulnerability to presentation attacks. The study reviews the literature in presentation attack and the corresponding solutions, i.e. presentation attack detection mechanisms, for six biometric modalities: fingerprint, face, iris, vascular, handwritten signature, and voice. Moreover, it provides a new taxonomy for presentation attack detection mechanisms. The proposed taxonomy helps to comprehend the issue of presentation attacks and how the literature tried to address it. The taxonomy represents a starting point to initialize new investigations that propose novel presentation attack detection mechanisms. In the second phase, an evaluation methodology is developed from two sources: (1) the ISO/IEC 30107 standard, and (2) the Common Evaluation Methodology by the Common Criteria. The developed methodology characterizes two main aspects of the presentation attack detection mechanism: (1) the resistance of the mechanism to presentation attacks, and (2) the corresponding threat of the studied attack. The first part is conducted by showing the mechanism's technical capabilities and how it influences the security and ease-of-use of the biometric system. The second part is done by performing a vulnerability assessment considering all the factors that affect the attack potential. Finally, a data collection is carried out, including 7128 fingerprint videos of bona fide and attack presentation. The data is collected using two sensing technologies, two presentation scenarios, and considering seven attack species. The database is used to develop dynamic presentation attack detection mechanisms that exploit the fingerprint spatio-temporal features. In the final phase, a set of novel presentation attack detection mechanisms is developed exploiting the dynamic features caused by the natural fingerprint phenomena such as perspiration and elasticity. The evaluation results show an efficient capability to detect attacks where, in some configurations, the mechanisms are capable of eliminating some attack species and mitigating the rest of the species while keeping the user convenience at a high level.En las Ășltimas dĂ©cadas, hemos asistido a un despliegue a gran escala de los sistemas biomĂ©tricos en diferentes aplicaciones de la vida cotidiana, sustituyendo a los mĂ©todos de reconocimiento tradicionales, como las contraseñas y los tokens. Actualmente los sistemas biomĂ©tricos ya forman parte de nuestra vida cotidiana: es habitual emplear estos sistemas para que nos proporcionen acceso a nuestros dispositivos electrĂłnicos (telĂ©fonos inteligentes, tabletas, ordenadores portĂĄtiles, etc.) usando nuestras caracterĂ­sticas biomĂ©tricas. AdemĂĄs, accedemos a nuestras cuentas bancarias, realizamos diversos tipos de pagos y transacciones utilizando los sensores biomĂ©tricos integrados en nuestros dispositivos. Por otra parte, diferentes organizaciones, empresas e instituciones utilizan soluciones basadas en la biometrĂ­a para el control de acceso. A escala nacional, las autoridades policiales y de control fronterizo utilizan dispositivos de reconocimiento biomĂ©trico con fines de identificaciĂłn y verificaciĂłn individual. Por lo tanto, en todas estas aplicaciones se confĂ­a en que los sistemas biomĂ©tricos proporcionen un reconocimiento seguro en el que solo el usuario genuino pueda ser reconocido como tal. AdemĂĄs, el sistema biomĂ©trico debe garantizar que un individuo no pueda ser identificado como otra persona. En el estado del arte, hay un nĂșmero sorprendente de experimentos que muestran la posibilidad de robar las caracterĂ­sticas biomĂ©tricas de alguien, y utilizarlas para crear un rasgo biomĂ©trico artificial que puede ser utilizado por un atacante con el fin de reclamar la identidad del usuario genuino. TambiĂ©n se han dado casos reales de personas que lograron engañar al sistema de reconocimiento biomĂ©trico en aeropuertos y telĂ©fonos inteligentes [1]–[3]. Esto hace que sea necesario investigar estas posibles amenazas y proponer contramedidas que garanticen altos niveles de seguridad y comodidad para el usuario. En consecuencia, es vital la realizaciĂłn de evaluaciones de seguridad para identificar (1) los fallos de seguridad de los sistemas biomĂ©tricos, (2) las posibles amenazas que pueden explotar estos fallos, y (3) las medidas que aumentan la seguridad del sistema biomĂ©trico reduciendo estas amenazas. La identificaciĂłn de las vulnerabilidades del sistema lleva a proponer soluciones de seguridad adecuadas que ayuden a conseguir una mayor integridad. Esta tesis tiene como objetivo investigar la vulnerabilidad en los sistemas de modalidad de huella dactilar a los ataques de presentaciĂłn en entornos no supervisados, para luego implementar mecanismos que permitan detectar dichos ataques y evitar el mal uso del sistema. Para lograr estos objetivos, la tesis se desarrolla en las siguientes tres fases. En la primera fase, se estudia el esquema del sistema biomĂ©trico genĂ©rico analizando sus puntos vulnerables con especial atenciĂłn a los ataques de presentaciĂłn. El estudio revisa la literatura sobre ataques de presentaciĂłn y las soluciones correspondientes, es decir, los mecanismos de detecciĂłn de ataques de presentaciĂłn, para seis modalidades biomĂ©tricas: huella dactilar, rostro, iris, vascular, firma manuscrita y voz. AdemĂĄs, se proporciona una nueva taxonomĂ­a para los mecanismos de detecciĂłn de ataques de presentaciĂłn. La taxonomĂ­a propuesta ayuda a comprender el problema de los ataques de presentaciĂłn y la forma en que la literatura ha tratado de abordarlo. Esta taxonomĂ­a presenta un punto de partida para iniciar nuevas investigaciones que propongan novedosos mecanismos de detecciĂłn de ataques de presentaciĂłn. En la segunda fase, se desarrolla una metodologĂ­a de evaluaciĂłn a partir de dos fuentes: (1) la norma ISO/IEC 30107, y (2) Common Evaluation Methodology por el Common Criteria. La metodologĂ­a desarrollada considera dos aspectos importantes del mecanismo de detecciĂłn de ataques de presentaciĂłn (1) la resistencia del mecanismo a los ataques de presentaciĂłn, y (2) la correspondiente amenaza del ataque estudiado. Para el primer punto, se han de señalar las capacidades tĂ©cnicas del mecanismo y cĂłmo influyen en la seguridad y la facilidad de uso del sistema biomĂ©trico. Para el segundo aspecto se debe llevar a cabo una evaluaciĂłn de la vulnerabilidad, teniendo en cuenta todos los factores que afectan al potencial de ataque. Por Ășltimo, siguiendo esta metodologĂ­a, se lleva a cabo una recogida de datos que incluye 7128 vĂ­deos de huellas dactilares genuinas y de presentaciĂłn de ataques. Los datos se recogen utilizando dos tecnologĂ­as de sensor, dos escenarios de presentaciĂłn y considerando siete tipos de instrumentos de ataque. La base de datos se utiliza para desarrollar y evaluar mecanismos dinĂĄmicos de detecciĂłn de ataques de presentaciĂłn que explotan las caracterĂ­sticas espacio-temporales de las huellas dactilares. En la fase final, se desarrolla un conjunto de mecanismos novedosos de detecciĂłn de ataques de presentaciĂłn que explotan las caracterĂ­sticas dinĂĄmicas causadas por los fenĂłmenos naturales de las huellas dactilares, como la transpiraciĂłn y la elasticidad. Los resultados de la evaluaciĂłn muestran una capacidad eficiente de detecciĂłn de ataques en la que, en algunas configuraciones, los mecanismos son capaces de eliminar completamente algunos tipos de instrumentos de ataque y mitigar el resto de los tipos manteniendo la comodidad del usuario en un nivel alto.Programa de Doctorado en IngenierĂ­a ElĂ©ctrica, ElectrĂłnica y AutomĂĄtica por la Universidad Carlos III de MadridPresidente: Cristina Conde Vila.- Secretario: Mariano LĂłpez GarcĂ­a.- Vocal: Farzin Derav

    Electronic Evidence and Electronic Signatures

    Get PDF
    In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions. Stephen Mason (of the Middle Temple, Barrister) is a leading authority on electronic evidence and electronic signatures, having advised global corporations and governments on these topics. He is also the editor of International Electronic Evidence (British Institute of International and Comparative Law 2008), and he founded the innovative international open access journal Digital Evidence and Electronic Signatures Law Review in 2004. Daniel Seng (Associate Professor, National University of Singapore) is the Director of the Centre for Technology, Robotics, AI and the Law (TRAIL). He teaches and researches information technology law and evidence law. Daniel was previously a partner and head of the technology practice at Messrs Rajah & Tann. He is also an active consultant to the World Intellectual Property Organization, where he has researched, delivered papers and published monographs on copyright exceptions for academic institutions, music copyright in the Asia Pacific and the liability of Internet intermediaries
    corecore