1,949 research outputs found

    On the Feasibility of Interoperable Schemes in Hand Biometrics

    Get PDF
    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors

    When mobility is not a choice Problematising asylum seekers’ secondary movements and their criminalisation in the EU. CEPS Paper in Liberty and Security in Europe No. 2019-11, December 2019

    Get PDF
    The notion of ‘secondary movements’ is commonly used to describe the mobility of third country nationals for the purpose of seeking international protection in an EU member state other than the one of first irregular entry according to the EU Dublin Regulation. Secondary movements are often identified as a major insecurity factor undermining the sustainability of the Schengen regime and the functioning of the EU Dublin system. Consequently, EU policies have focused on their ‘criminalisation’, as testified by the range of sanctions included in the 2016 CEAS reform package, and on a ‘policing’ approach, which has materialised in the expanded access to data stored in the EURODAC database by police authorities, and its future interconnection with other EU databases under the 2019 EU Interoperability Regulations. This Paper shows that the EU notion of secondary movements is flawed and must be reconsidered in any upcoming reform of the CEAS. The concept overlooks the fact that asylum seekers’ mobility may be non-voluntary and thus cannot be understood as a matter of ‘free choice’ or in terms of ‘preferences’ about the member state of destination. Such an understanding is based on the wrong assumption that asylum seekers’ decisions to move to a different EU country are illegitimate, as all EU member states are assumed to be ‘safe’ for people in need of international protectio

    The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)

    Get PDF
    A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008Comment: Published at IEEE Transactions on Pattern Analysis and Machine Intelligence journa

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Full text link
    This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements

    Investigating the Impact of Demographic Factors on Contactless Fingerprint Interoperability

    Get PDF
    Improvements in contactless fingerprinting have resulted in contactless fingerprints becoming a faster and more convenient alternative to contact fingerprints. The interoperability between contactless fingerprints and contact fingerprints and how demographic factors can change interoperability has been challenging since COVID-19; the need for hygienic alternatives has only grown because of the sudden focus during the pandemic. Past work has shown issues with the interoperability of contactless prints from kiosk devices and phone fingerprint collection apps. Demographic bias in photography for facial recognition could affect photographed fingerprints. The paper focuses on evaluating match performance between contact and contactless fingerprints and evaluating match score bias based on five skin demographics; melanin, erythema, and the three measurements of the CIELab color space. The interoperability of three fingerprint matchers was tested. The best and worst Area Under the Curve (AUC) and Equal Error Rate (EER) values for the best-performing matcher were an AUC of 0.99398 and 0.97873 and an EER of 0.03016 and 0.07555, respectively, while the best contactless AUC and EER were 0.99337 and 0.03387 indicating that contactless match performance can be as good as contact fingerprints depending on the device. In contrast, the best and worst AUC and EER for the cellphone contactless fingerprints were an AUC of 0.96812 and 0.85772 and an EER of 0.08699 and 0.22130, falling short of the lowest performing contact fingerprints. Demographic analysis was on the top two of the three matchers based on the top one percent of non-match scores. Resulting efforts found matcher-specific bias for melanin showing specific ranges affected by low and high melanin values. While higher levels of erythema and general redness of the skin improved performance. Higher lightness values showed a decreased performance in the top-performing matcher

    What matters to older people with assisted living needs? A phenomenological analysis of the use and non-use of telehealth and telecare

    Get PDF
    Telehealth and telecare research has been dominated by efficacy trials. The field lacks a sophisticated theorisation of [a] what matters to older people with assisted living needs; [b] how illness affects people's capacity to use technologies; and [c] the materiality of assistive technologies. We sought to develop a phenomenologically and socio-materially informed theoretical model of assistive technology use. Forty people aged 60–98 (recruited via NHS, social care and third sector) were visited at home several times in 2011–13. Using ethnographic methods, we built a detailed picture of participants' lives, illness experiences and use (or non-use) of technologies. Data were analysed phenomenologically, drawing on the work of Heidegger, and contextualised using a structuration approach with reference to Bourdieu's notions of habitus and field. We found that participants' needs were diverse and unique. Each had multiple, mutually reinforcing impairments (e.g. tremor and visual loss and stiff hands) that were steadily worsening, culturally framed and bound up with the prospect of decline and death. They managed these conditions subjectively and experientially, appropriating or adapting technologies so as to enhance their capacity to sense and act on their world. Installed assistive technologies met few participants' needs; some devices had been abandoned and a few deliberately disabled. Successful technology arrangements were often characterised by ‘bricolage’ (pragmatic customisation, combining new with legacy devices) by the participant or someone who knew and cared about them. With few exceptions, the current generation of so-called ‘assisted living technologies’ does not assist people to live with illness. To overcome this irony, technology providers need to move beyond the goal of representing technology users informationally (e.g. as biometric data) to providing flexible components from which individuals and their carers can ‘think with things’ to improve the situated, lived experience of multi-morbidity. A radical revision of assistive technology design policy may be needed

    Improving Iris Recognition through Quality and Interoperability Metrics

    Get PDF
    The ability to identify individuals based on their iris is known as iris recognition. Over the past decade iris recognition has garnered much attention because of its strong performance in comparison with other mainstream biometrics such as fingerprint and face recognition. Performance of iris recognition systems is driven by application scenario requirements. Standoff distance, subject cooperation, underlying optics, and illumination are a few examples of these requirements which dictate the nature of images an iris recognition system has to process. Traditional iris recognition systems, dubbed stop and stare , operate under highly constrained conditions. This ensures that the captured image is of sufficient quality so that the success of subsequent processing stages, segmentation, encoding, and matching are not compromised. When acquisition constraints are relaxed, such as for surveillance or iris on the move, the fidelity of subsequent processing steps lessens.;In this dissertation we propose a multi-faceted framework for mitigating the difficulties associated with non-ideal iris. We develop and investigate a comprehensive iris image quality metric that is predictive of iris matching performance. The metric is composed of photometric measures such as defocus, motion blur, and illumination, but also contains domain specific measures such as occlusion, and gaze angle. These measures are then combined through a fusion rule based on Dempster-Shafer theory. Related to iris segmentation, which is arguably one of the most important tasks in iris recognition, we develop metrics which are used to evaluate the precision of the pupil and iris boundaries. Furthermore, we illustrate three methods which take advantage of the proposed segmentation metrics for rectifying incorrect segmentation boundaries. Finally, we look at the issue of iris image interoperability and demonstrate that techniques from the field of hardware fingerprinting can be utilized to improve iris matching performance when images captured from distinct sensors are involved

    SuperIdentity: fusion of identity across real and cyber domains

    No full text
    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single ‘SuperIdentity’. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the ‘distribution of identity’ across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threa

    Finding blind spots:Investigating identity data matching in transnational commercialized security infrastructures and beyond

    Get PDF
    This dissertation analyzes the interconnections between data matching technologies, identification practices, and transnational commercialized security infrastructures, particularly in relation to migration management and border control. The research was motivated by a curiosity about the intersection between identity data matching and the challenges authorities encounter when identifying individuals, especially the “blind spots” caused by incomplete data, aliases, and uncertainties. The dissertation addresses the following main research question: “How are practices and technologies for matching identity data in migration management and border control shaping and shaped by transnational commercialized security infrastructures?”The dissertation begins by presenting an overview of the literature regarding the connections between data matching technology, which is used across various sectors, and its interrelationships with the internationalization, commercialization, securitization, and infrastructuring of identification infrastructure. This overview highlights a noticeable gap in the understanding of how data matching influences the meaning of the interconnected data and shapes relationships between organizations that use it. To address this gap, Chapter 3 proposes a methodological framework for using data matching as both a research topic and a resource for answering specific sub-questions related to specific aspects of data matching.Chapter 4 emphasizes the significance of data models in information systems for categorizing individuals and establishing connections between different data models for accurate matching. The analysis of this aspect of data matching is made possible by introducing the “Ontology Explorer”, which serves as a novel method for examining the knowledge and assumptions embedded within data models. By applying this method to analyze national and transnational data infrastructures for population management, this method is shown to reveal authorities’ imaginaries on people-on-the-move. In this way, the method demonstrates the importance of data categories in data models, as they are crucial for data matching while also offering valuable insights into how authorities enact people in different ways.Following that, the dissertation investigates how identity data matching is employed to re-identify applicants within a government migration and asylum agency in The Netherlands. Chapter 5 introduces the concept of re-identification, which involves the ongoing utilization and integration of data from various sources to establish whether multiple sets of identity data pertain to a single individual. This chapter uses insights gathered from interviews with personnel from the agency to investigate the integration of data matching tools for re-identification. The chapter shows that striving to minimize data friction in re-identification through data matching can have unintended consequences and additional burdens for the agency’s personnel.Lastly, this dissertation examines the evolution of a commercial data matching system employed for identification and security, adopting a sociotechnical approach. Chapter 6 introduces heuristics that are then used to identify moments that emphasize the design contingencies of the data matching system. Through the examination of fieldwork data collected from the company that created the system, the chapter highlights the reciprocal influences between the system’s design and the actors and entities involved. The system experienced adaptive and contingent changes from a generic data matching system to a specialized tool for identification and security because of such influences. In a broader sense, the chapter brings attention to the interrelationships among software suppliers, integrators, and customers, and the circulation and use of knowledge and technology for matching identity data across organizations
    • 

    corecore