84 research outputs found
I Know It\u27s You: Touch Behavioral Characteristics Recognition on Smartphone Based on Pattern Password
In recent years, pattern password has been widely used for user authentication on smartphones and other mobile devices in addition to the traditional password protection approach. However, pattern password authentication mechanism is incapable of protecting users from losses when a user\u27s login credential information is stolen. We propose an identity verification scheme based on user’s touching behaviors when inputting a pattern password on the smartphone screen. By exploiting the biometrical features, such as position, pressure, size, and time when a user inputs a pattern password to a smartphone, the proposed user verification mechanism can validate whether the user is the true owner of the smartphone. We adopted fuzzy logic, artificial neural network, and support vector machine, to build classifiers, using the behavioral data collected from 10 users. The experimental results show that all the three algorithms have significant recognition capacity, and the fuzzy logic algorithm is the best one with its false acceptance rate and false rejection rate as 4.7% and 4.468% respectively
Invisible design: exploring insights and ideas through ambiguous film scenarios
Invisible Design is a technique for generating insights and ideas with workshop participants in the early stages of concept development. It involves the creation of ambiguous films in which characters discuss a technology that is not directly shown. The technique builds on previous work in HCI on scenarios, persona, theatre, film and ambiguity. The Invisible Design approach is illustrated with three examples from unrelated projects; Biometric Daemon, Panini and Smart Money. The paper presents a qualitative analysis of data from a series of workshops where these Invisible Designs were discussed. The analysis outlines responses to the films in terms of; existing problems, concerns with imagined technologies and design speculation. It is argued that Invisible Design can help to create a space for critical and creative dialogue during participatory concept development
Securing Cloud Storage by Transparent Biometric Cryptography
With the capability of storing huge volumes of data over the Internet, cloud storage has become a popular and desirable service for individuals and enterprises. The security issues, nevertheless, have been the intense debate within the cloud community. Significant attacks can be taken place, the most common being guessing the (poor) passwords. Given weaknesses with verification credentials, malicious attacks have happened across a variety of well-known storage services (i.e. Dropbox and Google Drive) – resulting in loss the privacy and confidentiality of files. Whilst today's use of third-party cryptographic applications can independently encrypt data, it arguably places a significant burden upon the user in terms of manually ciphering/deciphering each file and administering numerous keys in addition to the login password.
The field of biometric cryptography applies biometric modalities within cryptography to produce robust bio-crypto keys without having to remember them. There are, nonetheless, still specific flaws associated with the security of the established bio-crypto key and its usability. Users currently should present their biometric modalities intrusively each time a file needs to be encrypted/decrypted – thus leading to cumbersomeness and inconvenience while throughout usage. Transparent biometrics seeks to eliminate the explicit interaction for verification and thereby remove the user inconvenience. However, the application of transparent biometric within bio-cryptography can increase the variability of the biometric sample leading to further challenges on reproducing the bio-crypto key.
An innovative bio-cryptographic approach is developed to non-intrusively encrypt/decrypt data by a bio-crypto key established from transparent biometrics on the fly without storing it somewhere using a backpropagation neural network. This approach seeks to handle the shortcomings of the password login, and concurrently removes the usability issues of the third-party cryptographic applications – thus enabling a more secure and usable user-oriented level of encryption to reinforce the security controls within cloud-based storage. The challenge represents the ability of the innovative bio-cryptographic approach to generate a reproducible bio-crypto key by selective transparent biometric modalities including fingerprint, face and keystrokes which are inherently noisier than their traditional counterparts. Accordingly, sets of experiments using functional and practical datasets reflecting a transparent and unconstrained sample collection are conducted to determine the reliability of creating a non-intrusive and repeatable bio-crypto key of a 256-bit length. With numerous samples being acquired in a non-intrusive fashion, the system would be spontaneously able to capture 6 samples within minute window of time. There is a possibility then to trade-off the false rejection against the false acceptance to tackle the high error, as long as the correct key can be generated via at least one successful sample. As such, the experiments demonstrate that a correct key can be generated to the genuine user once a minute and the average FAR was 0.9%, 0.06%, and 0.06% for fingerprint, face, and keystrokes respectively.
For further reinforcing the effectiveness of the key generation approach, other sets of experiments are also implemented to determine what impact the multibiometric approach would have upon the performance at the feature phase versus the matching phase. Holistically, the multibiometric key generation approach demonstrates the superiority in generating the bio-crypto key of a 256-bit in comparison with the single biometric approach. In particular, the feature-level fusion outperforms the matching-level fusion at producing the valid correct key with limited illegitimacy attempts in compromising it – 0.02% FAR rate overall. Accordingly, the thesis proposes an innovative bio-cryptosystem architecture by which cloud-independent encryption is provided to protect the users' personal data in a more reliable and usable fashion using non-intrusive multimodal biometrics.Higher Committee of Education Development in Iraq (HCED
Support Vector Machine for Behavior-Based Driver Identification System
We present an intelligent driver
identification system to handle vehicle theft based on modeling
dynamic human behaviors. We propose to recognize illegitimate
drivers through their driving behaviors. Since human driving
behaviors belong to a dynamic biometrical feature which is
complex and difficult to imitate compared with static features
such as passwords and fingerprints, we find that this novel
idea of utilizing human dynamic features for enhanced security
application is more effective. In this paper, we first describe
our experimental platform for collecting and modeling human
driving behaviors. Then we compare fast Fourier transform
(FFT), principal component analysis (PCA), and independent
component analysis (ICA) for data preprocessing. Using machine
learning method of support vector machine (SVM), we derive the individual
driving behavior model and we then demonstrate
the procedure for recognizing different drivers by analyzing
the corresponding models. The experimental results of learning
algorithms and evaluation are described
Utilizing Analytical Hierarchy Process for Pauper House Programme in Malaysia
In Malaysia, the selection and evaluation of candidates for
Pauper House Programme (PHP) are done manually. In
this paper, a technique based on Analytical Hierarchy
Technique (AHP) is designed and developed in order to
make an evaluation and selection of PHP application. The
aim is to ensure the selection process is more precise,
accurate and can avoid any biasness issue. This technique
is studied and designed based on the Pauper assessment
technique from one of district offices in Malaysia. A
hierarchical indexes are designed based on the criteria that
been used in the official form of PHP application. A
number of 23 samples of data which had been endorsed
by Exco of State in Malaysia are used to test this
technique. Furthermore the comparison of those two
methods are given in this paper. All the calculations of
this technique are done in a software namely Expert
Choice version 11.5. By comparing the manual and AHP
shows that there are three (3) samples that are not
qualified. The developed technique also satisfies in term
of ease of accuracy and preciseness but need a further
study due to some limitation as explained in the
recommendation of this paper
Biometric fingerprint identification
Projekt sa zaoberá spracovaním a porovnaním otlačkov prstov. Preberá obecné princípy biometrie a rôzne metódy analýzy otlačkov prstov. Navrhuje vlastné riešenie problému formou adaptívnych maskových operátorov na detekciu markantov a štatistické spracovanie výsledkov.The aim of this project is an automatic analysis of fingerprint images. Basic principles of biometrics and commonly used methods of fingerprint analysis are studied. An algorithm is proposed, using adaptive mask operators for minutiae detection, followed by a statistical evaluation of the achieved results.
- …