3,094 research outputs found
Strategies for intelligent interaction management and usability of biometric systems
Fingerprint biometric systems are one of the most popular biometric systems in current use, which takes a standard measure of a person's fingerprint to compare against the measure from an original stored template, which they have pre-acquired and associated with the known personal identification claimed by the user. Generally, the fingerprint biometric system consists of three stages including a data acquisition stage, a feature extraction stage and a matching extraction. This study will explore some essential limitations of an automatic fingerprint biometric system relating to the effects of capturing poor quality fingerprint images in a fingerprint biometric system and will investigate the interrelationship between the quality of a fingerprint image and other primary components of a fingerprint biometric system, such as the feature extraction operation and the matching process. In order to improve the overall performance of an automatic fingerprint biometric system, the study will investigate some possible ways to overcome these limitations. With the purpose of acquisition of an acceptable quality of fingerprint images, three components/enhancements are added into the traditional fingerprint recognition system in our proposed system. These are a fingerprint image enhancement algorithm, a fingerprint image quality evaluation algorithm and a feedback unit, the purpose of which is to provide analytical information collected at the image capture stage to the system user. In this thesis, all relevant information will be introduced, and we will also show some experimental results obtained with the proposed algorithms, and comparative studies with other existed algorithms will also be presented
Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications
The unprecedented proliferation of smart devices together with novel
communication, computing, and control technologies have paved the way for the
Advanced Internet of Things~(A-IoT). This development involves new categories
of capable devices, such as high-end wearables, smart vehicles, and consumer
drones aiming to enable efficient and collaborative utilization within the
Smart City paradigm. While massive deployments of these objects may enrich
people's lives, unauthorized access to the said equipment is potentially
dangerous. Hence, highly-secure human authentication mechanisms have to be
designed. At the same time, human beings desire comfortable interaction with
their owned devices on a daily basis, thus demanding the authentication
procedures to be seamless and user-friendly, mindful of the contemporary urban
dynamics. In response to these unique challenges, this work advocates for the
adoption of multi-factor authentication for A-IoT, such that multiple
heterogeneous methods - both well-established and emerging - are combined
intelligently to grant or deny access reliably. We thus discuss the pros and
cons of various solutions as well as introduce tools to combine the
authentication factors, with an emphasis on challenging Smart City
environments. We finally outline the open questions to shape future research
efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for
publication in IEEE Network, 2019. Copyright may be transferred without
notice, after which this version may no longer be accessibl
A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants
Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to
government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise
to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop
capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning
platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide
graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in
learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on
accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype
application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was
designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the
proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and
consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative
training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners
accessing the applicatio
A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants
Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to
government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise
to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop
capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning
platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide
graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in
learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on
accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype
application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was
designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the
proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and
consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative
training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners
accessing the applicatio
BioSecure: white paper for research in biometrics beyond BioSecure
This report is the output of a consultation process of various major stakeholders in the biometric community to identify the future biometrical research issues, an activity which employed not only researchers but representatives from the entire biometrical community, consisting of governments, industry, citizens and academia. It is one of the main efforts of the BioSecure Network of Excellence to define the agenda for future biometrical research, including systems and applications scenarios
Multi-Factor Authentication: A Survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe
Big data analytics:Computational intelligence techniques and application areas
Big Data has significant impact in developing functional smart cities and supporting modern societies. In this paper, we investigate the importance of Big Data in modern life and economy, and discuss challenges arising from Big Data utilization. Different computational intelligence techniques have been considered as tools for Big Data analytics. We also explore the powerful combination of Big Data and Computational Intelligence (CI) and identify a number of areas, where novel applications in real world smart city problems can be developed by utilizing these powerful tools and techniques. We present a case study for intelligent transportation in the context of a smart city, and a novel data modelling methodology based on a biologically inspired universal generative modelling approach called Hierarchical Spatial-Temporal State Machine (HSTSM). We further discuss various implications of policy, protection, valuation and commercialization related to Big Data, its applications and deployment
Evaluation of ECA Gesture strategies for robust Human-Computer Interaction
Embodied Conversational Agents (ECAs) offer us the possibility to design pleasant and efficient human-machine interaction. In this paper we present an evaluation scheme to compare dialogue-based speaker authentication and information retrieval systems with and without ECAs on the interface. We used gestures and other visual cues to improve fluency and robustness of interaction with these systems. Our tests results suggest that when an ECA is present users perceive fewer system errors, their frustration levels are lower, turn-changing goes more smoothly, the interaction experience is more enjoyable, and system capabilities are generally perceived more positively than when no ECA is present. However, the ECA seems to intensify the users' privacy concerns
Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies
An inevitable factor that makes the concept of electronic voting irresistible is the fact that it offers the possibility of exceeding the manual voting process in terms of convenience, widespread participation, and consideration for People Living with Disabilities. The underlying voting technology and ballot design can determine the credibility of election results, influence how voters felt about their ability to exercise their right to vote, and their willingness to accept the legitimacy of electoral results. However, the adoption of e-voting systems has unveiled a new set of problems such as security threats, trust, and reliability of voting systems and the electoral process itself. This paper presents a critical literature review on concepts, architectures, and existing authentication strategies in voice recognition systems for the e-voting system for the disabled electorate. Consequently, in this paper, an intelligent yet secure scheme for electronic voting systems specifically for people living with disabilities is presented
- …