86,920 research outputs found
Recommended from our members
Privacy-Preserving iVector-Based Speaker Verification
This paper introduces an efficient algorithm to develop a privacy-preserving voice verification based on iVector and linear discriminant analysis techniques. This research considers a scenario in which users enrol their voice biometric to access different services (i.e., banking). Once enrolment is completed, users can verify themselves using their voice print instead of alphanumeric passwords. Since a voice print is unique for everyone, storing it with a third-party server raises several privacy concerns. To address this challenge, this paper proposes a novel technique based on randomization to carry out voice authentication, which allows the user to enrol and verify their voice in the randomized domain. To achieve this, the iVector-based voice verification technique has been redesigned to work on the randomized domain. The proposed algorithm is validated using a well-known speech dataset. The proposed algorithm neither compromises the authentication accuracy nor adds additional complexity due to the randomization operations
Security Check-In Station
The major qualifying project is the culmination of lab and courses over four years. The Security Check-In Station is a device which communicates with a central server to give access to guards based on RFID badge verification and voice authentication. The device is designed to have guards check in with the central server showing the patrolled area. By using RFID tags and scanners, and using signal analysis techniques like frequency comparing and signal covariance, the device is able to distinguish guards from imposters
Platform independent web-based telecardiology for connected heart care
Most of the commercial telecardiology systems are platform-dependent and operating system (OS)-dependent. This causes inconvenience to medical officer for retrieving data from database and hence reduce the work efficiency. In this paper, a platformindependent and OS-independent web-based telecardiology system, named VirtualDave System, is proposed based on client-server model and developed in Hypertext Markup Language 5 (HTML5), Active Server Pages (ASP) scripting and C# languages. This system allows users to log on and access the patient medical data from any technology devices that equipped with web browser and internet access. Besides, it also allows targeted users to communicate and get remote medical consultation without long distance traveling and long-time queuing. Verification result shows that this proposed system could be executed in any platform regardless the OS. This web-based telecardiology could significantly help to improve the health care services especially in rural area
AMS-AC (Authorization Management System) and databases for access control
The concept for AMS-AC (Authorization Management System for Access Control) was developed in 1996/1997 with the participation of the Divisions AS, DSU, PE, PPE, ST and TIS. It covers the entrance rules to CERN, the types of CERN cards, and the access authorizations to controlled areas. The former paper-based procedure to obtain an access authorization has been transferred to a database driven system with electronic signatures. All necessary information are stored in the human resource database (HR). From there, the data is distributed to all card readers at CERN. A UNIX server controls the updating of the authorization data and performs automatic data transfers. Additionally, several procedures have been developed: 1) HTML-based on-line database checks for immediate data control; 2) Database verification procedures; 3) Automatic information distribution
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. Researchers have identified a number of potential applications, such as constructing timed cryptography, fighting junk emails, and protecting critical infrastructure from DoS attacks. In this paper, we first revisit this concept and formally define two properties, namely deterministic computation and parallel computation resistance. Our analysis show that both properties are crucial for the effectiveness of client puzzle schemes in most application scenarios. We prove that the RSW client puzzle scheme, which is based on the repeated squaring technique, achieves both properties. Secondly, we introduce two batch verification modes for the RSW client puzzle scheme in order to improve the verification efficiency of the server, and investigate three methods for handling errors in batch verifications. Lastly, we show that client puzzle schemes can be integrated with reputation systems to further improve the effectiveness in practice
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Nowadays, mobile banking becomes a popular tool which consumers can conduct
financial transactions such as shopping, monitoring accounts balance,
transferring funds and other payments. Consumers dependency on mobile needs,
make people take a little bit more interest in mobile banking. The use of the
one-time password which is sent to the user mobile phone by short message
service (SMS) is a vulnerability which we want to solve with proposing a new
scheme called S-Mbank. We replace the authentication using the one-time
password with the contactless smart card to prevent attackers to use the
unencrypted message which is sent to the user's mobile phone. Moreover, it
deals vulnerability of spoofer to send an SMS pretending as a bank's server.
The contactless smart card is proposed because of its flexibility and security
which easier to bring in our wallet than the common passcode generators. The
replacement of SMS-based authentication with contactless smart card removes the
vulnerability of unauthorized users to act as a legitimate user to exploit the
mobile banking user's account. Besides that, we use public-private key pair and
PIN to provide two factors authentication and mutual authentication. We use
signcryption scheme to provide the efficiency of the computation. Pair based
text authentication is also proposed for the login process as a solution to
shoulder-surfing attack. We use Scyther tool to analyze the security of
authentication protocol in S-Mbank scheme. From the proposed scheme, we are
able to provide more security protection for mobile banking service.Comment: 6 page
- …