5,518 research outputs found

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Multi-biometric templates using fingerprint and voice

    Get PDF
    As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system combines the two modalities at the template level, using multibiometric templates. The fusion of fingerprint and voice data successfully diminishes privacy concerns by hiding the minutiae points from the fingerprint, among the artificial points generated by the features obtained from the spoken utterance of the speaker. Equal error rates are observed to be under 2% for the system where 600 utterances from 30 people have been processed and fused with a database of 400 fingerprints from 200 individuals. Accuracy is increased compared to the previous results for voice verification over the same speaker database

    Designometry – Formalization of Artifacts and Methods

    Get PDF
    Two interconnected surveys are presented, one of artifacts and one of designometry. Artifacts are objects, which have an originator and do not exist in nature. Designometry is a new field of study, which aims to identify the originators of artifacts. The space of artifacts is described and also domains, which pursue designometry, yet currently doing so without collaboration or common methodologies. On this basis, synergies as well as a generic axiom and heuristics for the quest of the creators of artifacts are introduced. While designometry has various areas of applications, the research of methods to detect originators of artificial minds, which constitute a subgroup of artifacts, can be seen as particularly relevant and, in the case of malevolent artificial minds, as contribution to AI safety

    An investigation of genetic algorithm-based feature selection techniques applied to keystroke dynamics biometrics

    Get PDF
    Due to the continuous use of social networks, users can be vulnerable to online situations such as paedophilia treats. One of the ways to do the investigation of an alleged pedophile is to verify the legitimacy of the genre that it claims. One possible technique to adopt is keystroke dynamics analysis. However, this technique can extract many attributes, causing a negative impact on the accuracy of the classifier due to the presence of redundant and irrelevant attributes. Thus, this work using the wrapper approach in features selection using genetic algorithms and as KNN, SVM and Naive Bayes classifiers. Bringing as best result the SVM classifier with 90% accuracy, identifying what is most suitable for both bases

    In God we trust, all others we scan for malware: a study on the effect of trust in using AI empowered smartphones.

    Get PDF
    The acceptance of new technologies is an important subject in organizational research that has a long past of theorizing. Models such as C-TAM (Bruner & Kumar, 2005) have been proposed to explain the intention to use such technologies. However, such models were developed prior to the incorporation of Artificial Intelligence (AI), one of the latest and most exciting themes in today's society, whose applications increase from day to day. The introduction of this new technology has substantially changed the technology's status regarding its potential impact and subtle influence on free choice. The penetration that AI-powered technology has gained through smartphones is one of the phenomena that deserves attention, especially in the face of controversial opinions from personality leaders in science and technology like Stephen Hawking and Elon Musk on the topic of trust. This study sought to test the role of trust as a mediator between C-TAM and the intention to use AI-enhanced applications. With a sample of 211 smartphone users, the results showed several total mediations, highlighting the key role trust plays in the successful implementation of this technology.A aceitação de novas tecnologias é um assunto importante na investigação organizacional que tem um longo passado de teorização. Modelos tais como o C-TAM (Bruner & Kumar, 2005) têm sido propostos para explicar a intenção de usar tais tecnologias. Contudo, tais modelos foram desenvolvidos antes da incorporação da Inteligência Artificial (IA), um dos temas mais recentes e entusiasmantes da sociedade atual, cujas aplicações aumentam de dia para dia. A introdução desta nova tecnologia mudou substancialmente o estatuto da tecnologia no que concerne ao seu impacto potencial e á influência subtil na livre escolha. A penetração que a tecnologia potenciada pela IA tem ganho através dos smartphones é um dos fenómenos que merece atenção, especialmente face às opiniões controversas emitidas por personalidade líderes na ciência e tecnologia como Stephen Hawking e Elon Musk relativas ao tópico da confiança. Este estudo procurou testar o papel da confiança como mediadora entre o C-TAM e a intenção de utilizar aplicações potenciadas com IA. Com uma amostra de 211 utilizadores de smartphone, os resultados mostraram várias mediações totais, salientando o papel fundamental que a confiança desempenha na implementação bem-sucedida desta tecnologia
    corecore