14 research outputs found

    Priority Watermarking-Based Face-Fingerprint Authentication System

    Get PDF

    Remote Multimodal Biometric Authentication Using Bit Priority-Based Fragile Watermarking

    Get PDF

    A Review of Voice-Base Person Identification: State-of-the-Art

    Get PDF
    Automated person identification and authentication systems are useful for national security, integrity of electoral processes, prevention of cybercrimes and many access control applications. This is a critical component of information and communication technology which is central to national development. The use of biometrics systems in identification is fast replacing traditional methods such as use of names, personal identification numbers codes, password, etc., since nature bestow individuals with distinct personal imprints and signatures. Different measures have been put in place for person identification, ranging from face, to fingerprint and so on. This paper highlights the key approaches and schemes developed in the last five decades for voice-based person identification systems. Voice-base recognition system has gained interest due to its non-intrusive technique of data acquisition and its increasing method of continually studying and adapting to the person’s changes. Information on the benefits and challenges of various biometric systems are also presented in this paper. The present and prominent voice-based recognition methods are discussed. It was observed that these systems application areas have covered intelligent monitoring, surveillance, population management, election forensics, immigration and border control

    Biometric watermarking for medical images – example of iris code

    Get PDF
    This paper presents a preliminary investigation on medical image watermarking using biometric watermarks. The goal is to elaborate simple watermarking system based on discrete wavelet transform (DWT) decomposition and binary iris code insertion. The performance of proposed algorithm is evaluated by Hamming distance between embedded and extracted iris code

    Detection of presentation attacks on facial authentication systems using special devices

    Get PDF
    В статье предлагается система признаков, предназначенная для обнаружения атак на биометрическое предъявление на системы аутентификации, использующие лицевую биометрию. При таком типе атаки злоумышленник маскируется под авторизованного пользователя, используя его изображение. Предложенная система признаков предполагает возможность использования одного или нескольких изображающих сенсоров в дополнение к базовой RGB-камере (тепловизоры, дальномеры, инфракрасные камеры). Использование предложенной системы признаков в сочетании с одной из классических моделей бинарной классификации составляет предлагаемый в работе метод обнаружения атак на биометрическое предъявление. Данный метод продемонстрировал низкий уровень ошибок на наборе данных WMCA, при этом эксперименты показали его способность оставаться эффективным в условиях нехватки обучающих данных. Проведённые сравнительные эксперименты показали, что предложенный метод превзошёл алгоритм RDWT-Haralick-SVM и приблизился к результатам алгоритма MC-CNN, основанного на глубоком обучении и требующего значительно больший объём обучающих данных.Работа выполнена при поддержке РФФИ (проект 19-29-09045 в части параграфа 2.1, 3, проект 19-07-00357 в части параграфа 2.2) и Министерства науки и высшего образования РФ в рамках выполнения работ по Государственному заданию ФНИЦ «Кристаллография и фотоника» РАН (соглашение 007-ГЗ/Ч3363/26) в части параграфа 1

    SECURING BIOMETRIC DATA

    Get PDF

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses
    corecore