16,109 research outputs found

    MobiBits: Multimodal Mobile Biometric Database

    Full text link
    This paper presents a novel database comprising representations of five different biometric characteristics, collected in a mobile, unconstrained or semi-constrained setting with three different mobile devices, including characteristics previously unavailable in existing datasets, namely hand images, thermal hand images, and thermal face images, all acquired with a mobile, off-the-shelf device. In addition to this collection of data we perform an extensive set of experiments providing insight on benchmark recognition performance that can be achieved with these data, carried out with existing commercial and academic biometric solutions. This is the first known to us mobile biometric database introducing samples of biometric traits such as thermal hand images and thermal face images. We hope that this contribution will make a valuable addition to the already existing databases and enable new experiments and studies in the field of mobile authentication. The MobiBits database is made publicly available to the research community at no cost for non-commercial purposes.Comment: Submitted for the BIOSIG2018 conference on June 18, 2018. Accepted for publication on July 20, 201

    Exploiting low-cost 3D imagery for the purposes of detecting and analyzing pavement distresses

    Get PDF
    Road pavement conditions have significant impacts on safety, travel times, costs, and environmental effects. It is the responsibility of road agencies to ensure these conditions are kept in an acceptable state. To this end, agencies are tasked with implementing pavement management systems (PMSs) which effectively allocate resources towards maintenance and rehabilitation. These systems, however, require accurate data. Currently, most agencies rely on manual distress surveys and as a result, there is significant research into quick and low-cost pavement distress identification methods. Recent proposals have included the use of structure-from-motion techniques based on datasets from unmanned aerial vehicles (UAVs) and cameras, producing accurate 3D models and associated point clouds. The challenge with these datasets is then identifying and describing distresses. This paper focuses on utilizing images of pavement distresses in the city of Palermo, Italy produced by mobile phone cameras. The work aims at assessing the accuracy of using mobile phones for these surveys and also identifying strategies to segment generated 3D imagery by considering the use of algorithms for 3D Image segmentation to detect shapes from point clouds to enable measurement of physical parameters and severity assessment. Case studies are considered for pavement distresses defined by the measurement of the area affected such as different types of cracking and depressions. The use of mobile phones and the identification of these patterns on the 3D models provide further steps towards low-cost data acquisition and analysis for a PMS

    PhoneGuide: Museum Guidance Supported by On-Device Object Recognition on Mobile Phones

    Get PDF
    We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple and light-weight object recognition approach that is realized with single-layer perceptron neuronal networks. In contrast to related systems which perform computational intensive image processing tasks on remote servers, our intention is to carry out all computations directly on the phone. This ensures little or even no network traffic and consequently decreases cost for online times. Our laboratory experiments and field surveys have shown that photographed museum exhibits can be recognized with a probability of over 90%. We have evaluated different feature sets to optimize the recognition rate and performance. Our experiments revealed that normalized color features are most effective for our method. Choosing such a feature set allows recognizing an object below one second on up-to-date phones. The amount of data that is required for differentiating 50 objects from multiple perspectives is less than 6KBytes

    A comparison of forensic evidence recovery techniques for a windows mobile smart phone

    Get PDF
    <p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.</p> <p>A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.</p> <p>This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.</p&gt

    Ubic: Bridging the gap between digital cryptography and the physical world

    Full text link
    Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework that allows users to bridge the gap between digital cryptography and the physical world. Ubic relies on head-mounted displays, like Google Glass, resource-friendly computer vision techniques as well as mathematically sound cryptographic primitives to provide users with better security and privacy guarantees. The framework covers key cryptographic primitives, such as secure identification, document verification using a novel secure physical document format, as well as content hiding. To make a contribution of practical value, we focused on making Ubic as simple, easily deployable, and user friendly as possible.Comment: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, German

    Considering the Smartphone Learner: developing innovation to investigate the opportunities for students and their interest

    Get PDF
    Ownership of mobile smartphones amongst the general consumer, professionals and students is growing exponentially. The potential for smartphones in education builds upon experience described in the extensive literature on mobile learning from the previous decade which suggests that the ubiquity, multi-functionality and connectivity of mobile devices offers a new and potentially powerful networked learning environment. This paper reports on a collaborative study conducted by an undergraduate student with the support of two members of academic staff. The research sought to establish the extent to which students are autonomously harnessing smartphone technology to support their learning and the nature of this use. Initial findings were explored through student interviews. The study found that students who own smartphones are largely unaware of their potential to support learning and, in general, do not install smartphone applications for that purpose. They are, however, interested in and open to the potential as they become familiar with the possibilities for a range of purposes. The paper proposes that more consideration needs to be given to smartphones as platforms to support formal, informal and autonomous learner engagement. The study also reflects on its collaborative methodology and the challenges associated with academic innovation

    2D-barcode for mobile devices

    Get PDF
    2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink establishment. The 2D symbol captured by a camera phone is decoded by the software installed in the phone. Then the web site indicated by the data encoded in a symbol is automatically accessed and shown in the display of the camera phone. Nonetheless, this new mobile applications area is still at its infancy. Each proposed mobile 2D-barcode application has its own choice of code, but no standard exists nor is there any study done on what are the criteria for setting a standard 2D-barcode for mobile phones. This study intends to address this void. The first phase of the study is qualitative examination. In order to select a best standard 2D-barcode, firstly, features desirable for a standard 2D-barcode that is optimized for the mobile phone platform are identified. The second step is to establish the criteria based on the features identified. These features are based on the operating limitations and attributes of camera phones in general use today. All published and accessible 2D-barcodes are thoroughly examined in terms of criteria set for the selection of a best 2D-barcode for camera phone applications. In the second phase, the 2D-barcodes that have higher potential to be chosen as a standard code are experimentally examined against the three criteria: light condition, distance, whether or not a 2D-barcode supports VGA resolution. Each sample 2D-barcode is captured by a camera phone with VGA resolution and the outcome is tested using an image analysis tool written in the scientific language called MATLAB. The outcome of this study is the selection of the most suitable 2D-barcode for applications where mobile devices such as camera phones are utilized

    CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping

    Get PDF
    With the increasing prevalence of mobile and IoT devices (e.g., smartphones, tablets, smart-home appliances), massive private and sensitive information are stored on these devices. To prevent unauthorized access on these devices, existing user verification solutions either rely on the complexity of user-defined secrets (e.g., password) or resort to specialized biometric sensors (e.g., fingerprint reader), but the users may still suffer from various attacks, such as password theft, shoulder surfing, smudge, and forged biometrics attacks. In this paper, we propose, CardioCam, a low-cost, general, hard-to-forge user verification system leveraging the unique cardiac biometrics extracted from the readily available built-in cameras in mobile and IoT devices. We demonstrate that the unique cardiac features can be extracted from the cardiac motion patterns in fingertips, by pressing on the built-in camera. To mitigate the impacts of various ambient lighting conditions and human movements under practical scenarios, CardioCam develops a gradient-based technique to optimize the camera configuration, and dynamically selects the most sensitive pixels in a camera frame to extract reliable cardiac motion patterns. Furthermore, the morphological characteristic analysis is deployed to derive user-specific cardiac features, and a feature transformation scheme grounded on Principle Component Analysis (PCA) is developed to enhance the robustness of cardiac biometrics for effective user verification. With the prototyped system, extensive experiments involving 25 subjects are conducted to demonstrate that CardioCam can achieve effective and reliable user verification with over 99% average true positive rate (TPR) while maintaining the false positive rate (FPR) as low as 4%
    • …
    corecore