272 research outputs found

    Biometrijske aplikacije u bezbednosti vazdušnog transporta

    Get PDF
    As the number of air passengers continues to increase worldwide, so do the security demands and challenges in the air transport industry, particularly in lieu of numerous recent terrorist attacks. One of the essential requirements in fulfilling these needs resides in the accurate and timely identification of passengers and other participants in the air transport flow. Biometrics represents identification of individuals based on their quantifiable biological characteristics in automatic pattern recognition systems and is considered one of the most reliable means for personal identification. It is, therefore, not surprising that biometric technologies have an increasing presence in the air transportation industry. The intent of this review is to familiarize readers with biometric tools aimed at establishing and maintaining high security at airports and during flight, as well as to point out promising emerging biometric applications in the field.Sve veći broj putnika u vazdušnom saobraćaju, kao i sve učestaliji teroristički napadi, povećavaju bezbednosne zahteve i rizike u avio-industriji na globalnom nivou. Jedan od osnovnih uslova za povećanje bezbednosti jeste mogućnost precizne i brze identifikacije kako putnika, tako i drugih učesnika u saobraćajnom toku. Biometrija je oblast koja se bavi identifikacijom pojedinaca na osnovu njihovih merljivih, bioloških (anatomskih, fizioloških i ponašajnih) karakteristika u automatskim informacionim sistemima i smatra se jednim od najpouzdanijih pristupa za utvrđivanje identiteta. Stoga ne čudi što su biometrijske tehnologije danas sve prisutnije u avio-industriji. Cilj ovog rada je da upozna čitaoce sa dostupnim biometrijskim alatima koji se koriste za postizanje i održavanje visokog nivoa bezbednosti u vazdušnom saobraćaju. Autorka najpre daje pregled biometrijskih identifikacija koje se vrše na vazdušnim graničnim prelazima - aerodromima. U ovom kontekstu su, pored biometrijskih pristupa koji se koriste kao pooštrene mere bezbednosti, takođe obrađene i tehnologije koje imaju za cilj da povećaju brzinu prelaska granice i udobnost putnika niskog rizika, poput putnika koji često putuju (frequent flyers). Autorka dalje predstavlja načine na koje se, pomoću biometrijskih identifikacija, obavlja kontrola pristupa autorizovanih zaposlenih određenim zonama aerodroma, kao i provera prisustva osoba za kojima se traga. Kako skrining sistemi na aerodromima mogu imati visoke stope lažnih uzbuna, a sam proces skrininga predstavlja izazov, budući da zahteva proveru miliona pojedinaca u potrazi za svega nekoliko njih sa zlim namerama, autorka diskutuje o profilisanju putnika (bihevioralni skrining), kao savremenom pristupu identifikaciji pojedinaca na aerodromima, koji je u povoju, i koji je zasnovan na automatskom, biometrijskom prepoznavanju sumnjivih individua. Konačno, autorka predstavlja biometrijske aplikacije za identifikaciju pojedinaca tokom leta, koje se razvijaju u cilju obezbeđivanja putnika, posade i letelice. PR Projekat Ministarstva nauke Republike Srbije, br. TR34019 and the EU Commission project AREA, Contract No. 316004

    Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

    Get PDF
    Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices

    Biometric fingerprint identification

    Get PDF
    Projekt sa zaoberá spracovaním a porovnaním otlačkov prstov. Preberá obecné princípy biometrie a rôzne metódy analýzy otlačkov prstov. Navrhuje vlastné riešenie problému formou adaptívnych maskových operátorov na detekciu markantov a štatistické spracovanie výsledkov.The aim of this project is an automatic analysis of fingerprint images. Basic principles of biometrics and commonly used methods of fingerprint analysis are studied. An algorithm is proposed, using adaptive mask operators for minutiae detection, followed by a statistical evaluation of the achieved results.

    Biometric Systems

    Get PDF
    Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study

    Trust and Voice Biometric Authentication: Understanding the Levels of User’s Trust on Authentication Methods

    Get PDF
    Due to the singularity of the distinct biometric traits, biometric authentication factors have become increasingly prevalent in daily life and are predicted to target future authentication methods. Previous studies established that the human voice is one of the most natural, non-intrusive, and convenient behavioral biometric factors compared to other biometric authentication methods. Despite the non-intrusive characteristics of voice biometric authentication, it has been brought under scrutiny for many reasons, including the accuracy of biometric data, a general societal trust and distrust with technology and the risk of theft and imitation. Although, when it comes to trusting technology, users’ perceptions change with time through continued use of technology, and thus allowing perceptions and opinions to change. However, there are fundamental factors that can contribute to how users develop trust with technologies over time. This study derived a realistic trust evaluation model that incorporates security, privacy, safety, usability, reliability, and availability factors into a trust vector for a flexible measurement of trust in the user accessing the technology. Based on the derived trust model, we experiment using quantitative method whether the users are willing to trust voice biometric authentication method over PIN, fingerprint, and token-based authentication and hence would be inclined to adopt and utilize it as a means of user authentication to access technology. We applied the Kruskal-Wallis H test and the post-hoc test to understand which authentication method the user trusts, based on statistical significance and which groups were found to have that statistical difference. The result of the study suggests that users have less trust with voice compared to other authentication methods especially traditional means of knowledge-based authentication such as PIN’s which consistently ranked much higher than voice in pairwise comparisons

    Biometrics & [and] Security:Combining Fingerprints, Smart Cards and Cryptography

    Get PDF
    Since the beginning of this brand new century, and especially since the 2001 Sept 11 events in the U.S, several biometric technologies are considered mature enough to be a new tool for security. Generally associated to a personal device for privacy protection, biometric references are stored in secured electronic devices such as smart cards, and systems are using cryptographic tools to communicate with the smart card and securely exchange biometric data. After a general introduction about biometrics, smart cards and cryptography, a second part will introduce our work with fake finger attacks on fingerprint sensors and tests done with different materials. The third part will present our approach for a lightweight fingerprint recognition algorithm for smart cards. The fourth part will detail security protocols used in different applications such as Personal Identity Verification cards. We will discuss our implementation such as the one we developed for the NIST to be used in PIV smart cards. Finally, a fifth part will address Cryptography-Biometrics interaction. We will highlight the antagonism between Cryptography – determinism, stable data – and Biometrics – statistical, error-prone –. Then we will present our application of challenge-response protocol to biometric data for easing the fingerprint recognition process

    Personality Assessment Using Biosignals and Human Computer Interaction applied to Medical Decision Making

    Get PDF
    Clinical decision-making for patients with multiple acute or chronic diseases (i.e. multimorbidity) is complex. There is often no ’right’ or optimal treatment due to the potentially harmful effects of multiple interactions between drugs and diseases. This makes it necessary to establish trade-offs between the benefits and risks of different treatment strategies. This means also that there may be high levels of risk and uncertainty when making decisions. One factor that can influence how decisions are made under conditions of risk and uncertainty is the decision maker’s personality. The studies of this dissertation used biosignals and eye-tracking methods and developed pointer tracking techniques to monitor human computer interaction to assess, using machine learning techniques, the individual personality of decision makers. Data acquisition systems were designed and prepared to collect and synchronize: 1) physiological data - electrocardiogram, blood volume pulse and electrodermal activity; 2) human-computer interaction data - pointer movements, eye tracking and pupil diameter; 3) decision-making task data; and 4) personality questionnaire’ results. A set of processing tools was developed to ensure the correct extraction of psychophysiologyrelated features that could manifest personality. These features were combined by several machine learning algorithms to predict the Big-Five personality traits: Openness, Conscientiousness, Extraversion, Agreeableness and Conscientiousness. The five personality traits were well modelled by, at least, one of the sets of features extracted. With a sample of 88 students, features from the pointer movements in online surveys predicted four personality traits with a mean squared error (MSE)<0.46. The blood volume pulse responses in a decision-making task trained in a distinct sample of 79 students predicted four personality traits with a MSE<0.49. The application of the personality models based on the pointer movements in the personality questionnaire in a sample of 12 medical doctors achieved a MSE<0.40 for three personality traits. These were the best results achieved in each context of this thesis. The outcomes of this work demonstrate the huge potential of broader models that predict personality through human behaviour, with possible application in a wide variety of fields, such as human resources, medical research studies or machine learning approaches

    Handbook of Digital Face Manipulation and Detection

    Get PDF
    This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area

    Handbook of Digital Face Manipulation and Detection

    Get PDF
    This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area

    Biometric and behavioural mass surveillance in EU member states: report for the Greens/EFA in the European Parliament

    Get PDF
    The aim of this report is to establish a problematised overview of what we know about what is currently being done in Europe when it comes to remote biometric identification (RBI), and to assess in which cases we could potentially fall into forms of biometric mass surveillance.Institutions, Decisions and Collective Behaviou
    • …
    corecore