27 research outputs found
Recent Application in Biometrics
In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers
Poetry's Afterlife: Verse in the Digital Age
At a time when most commentators fixate on American poetry's supposed ""death,"" Kevin Stein's Poetry's Afterlife instead proposes the vitality of its aesthetic hereafter. The essays of Poetry's Afterlife blend memoir, scholarship, and personal essay to survey the current poetry scene, trace how we arrived here, and suggest where poetry is headed in our increasingly digital culture. The result is a book both fetchingly insightful and accessible. Poetry's spirited afterlife has come despite, or perhaps because of, two decades of commentary diagnosing American poetry as moribund if not already deceased. With his 2003 appointment as Illinois Poet Laureate and his forays into public libraries and schools, Stein has discovered that poetry has not given up its literary ghost. For a fated art supposedly pushing up aesthetic daisies, poetry these days is up and about in the streets, schools, and universities, and online in new and compelling digital forms. It flourishes among the people in a lively if curious underground existence largely overlooked by national media. It's this second life, or better, Poetry's Afterlife, that his book examines and celebrates
Poisoning Attacks on Learning-Based Keystroke Authentication and a Residue Feature Based Defense
Behavioral biometrics, such as keystroke dynamics, are characterized by relatively large variation in the input samples as compared to physiological biometrics such as fingerprints and iris. Recent advances in machine learning have resulted in behaviorbased pattern learning methods that obviate the effects of variation by mapping the variable behavior patterns to a unique identity with high accuracy. However, it has also exposed the learning systems to attacks that use updating mechanisms in learning by injecting imposter samples to deliberately drift the data to impostors’ patterns. Using the principles of adversarial drift, we develop a class of poisoning attacks, named Frog-Boiling attacks. The update samples are crafted with slow changes and random perturbations so that they can bypass the classifiers detection. Taking the case of keystroke dynamics which includes motoric and neurological learning, we demonstrate the success of our attack mechanism. We also present a detection mechanism for the frog-boiling attack that uses correlation between successive training samples to detect spurious input patterns. To measure the effect of adversarial drift in frog-boiling attack and the effectiveness of the proposed defense mechanism, we use traditional error rates such as FAR, FRR, and EER and the metric in terms of shifts in biometric menagerie
Malmsbury bluestone and quarries : Finding holes in history and heritage
Malmsbury bluestone was used widely from 1856 in buildings in Victoria, throughout Australia, and in New Zealand. It features in many structures listed on heritage registers, yet its presence is barely recognised. This largely results from the stone quarries, buildings and the men who laboured with it being absent from modern Australian historiography. The fame previously associated with the stone was lost when stone use for structural purposes, and the associated stone skills, declined; a situation exacerbated by poor recognition of the stone industry’s role in building our nation through heritage citations of structures. Inspired by E. P. Thompson, this thesis uses Critical Inquiry though microhistory and landscape analysis to regain the stone’s fame and rescue stoneworkers from the condescension of history. A detailed analysis of quarries, structures, the bluestone industry, and a rarely-attempted total reconstitution of the lives of 194 vital stoneworkers, reveals a valuable cultural heritage currently undervalued and at risk. Malmsbury stoneworkers came from diverse backgrounds but worked co-operatively to promote and sustain a local industry which supplied a nationally-vital building material, despite the absence of a regulatory framework to protect their lives and rights. Scientific methods document the geological properties of the stone and demonstrate how, in the absence of science, skilled stoneworkers nevertheless identified and worked a valuable resource. Modern science could however be used to test building stones in a non-destructive manner to determine the sources of currently unidentified building stones. This thesis significantly contributes to the limited discourse on the history and heritage of Australian stone use through the perspectives of cultural landscapes, labour history and built and cultural heritage. Malmsbury bluestone truly was the standard of excellence and, along with stoneworkers, warrants more extensive recognition in Australia’s Heritage registers.Doctor of Philosoph
Biometric layering: template security and privacy through multi-biometric template fusion
As biometric applications are gaining popularity, there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. Biometric template protection mechanisms suggested in recent years aim to address these issues by securing the biometric data in a template or other structure such that it is suitable for authentication purposes, while being protected against unauthorized access or crosslinking attacks. We propose a biometric authentication framework for enhancing privacy and template security, by layering multiple biometric modalities to construct a multi-biometric template such that it is difficult to extract or separate the individual layers. Thus, the framework uses the subject's own biometric to conceal her biometric data, while it also enjoys the performance benefits because of the use of multiple modalities. The resulting biometric template is also cancelable if the system is implemented with cancelable biometrics such as voice. We present two different realizations of this idea: one combining two different fingerprints and another one combining a fingerprint and a spoken passphrase. In either case, both biometric samples are required for successful authentication, leading to increased security, in addition to privacy gains. The performance of the proposed framework is evaluated using the FVC 2000-2002 and NIST fingerprint databases, and the TUBITAK MTRD speaker database. Results show only a small degradation in EER compared to a state-of-the-art ngerprint verification system and high identification rates, while cross-link rates are low even with very small databases
Secure key agreement using pure biometrics
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered set of features. Our protocol enables the user and the server to agree on a symmetric key, which is generated by utilizing only the feature points of the user's biometrics. It means that our protocol does not generate the key randomly or it does not use any random data in the key itself. As a proof of concept, we instantiate our protocol model using ngerprints. In our protocol, we employ a threshold-based quantization mechanism, in order to group the minutiae in a prede ned neighborhood. In this way, we increase the chance of user-server agreement on the same set of minutiae. Our protocol works in rounds. In each round, depending on the calculated similarity score on the common set of minutiae, the acceptance/rejection decision is made. Besides, we employ multi-criteria security analyses for our proposed protocol. These security analyses show that the generated keys possess acceptable randomness according to Shannon's entropy. In addition, the keys, which are generated after each protocol run, are indistinguishable from each other, as measured by the Hamming distance metric. Our protocol is also robust against brute-force, replay and impersonation attacks, proven by high attack complexity and low equal error rates. At the end, the complexity analysis and the memory requirements of the protocol are discussed and it is showed that they are in acceptable limits. As shown by comparative analyses, this work outperforms the existing fuzzy vault method in terms of veri cation performance and the attack complexity
Information Theoretic-Based Privacy Protection on Data Publishing and Biometric Authentication
Ph.DDOCTOR OF PHILOSOPH