3,094 research outputs found

    Strategies for intelligent interaction management and usability of biometric systems

    Get PDF
    Fingerprint biometric systems are one of the most popular biometric systems in current use, which takes a standard measure of a person's fingerprint to compare against the measure from an original stored template, which they have pre-acquired and associated with the known personal identification claimed by the user. Generally, the fingerprint biometric system consists of three stages including a data acquisition stage, a feature extraction stage and a matching extraction. This study will explore some essential limitations of an automatic fingerprint biometric system relating to the effects of capturing poor quality fingerprint images in a fingerprint biometric system and will investigate the interrelationship between the quality of a fingerprint image and other primary components of a fingerprint biometric system, such as the feature extraction operation and the matching process. In order to improve the overall performance of an automatic fingerprint biometric system, the study will investigate some possible ways to overcome these limitations. With the purpose of acquisition of an acceptable quality of fingerprint images, three components/enhancements are added into the traditional fingerprint recognition system in our proposed system. These are a fingerprint image enhancement algorithm, a fingerprint image quality evaluation algorithm and a feedback unit, the purpose of which is to provide analytical information collected at the image capture stage to the system user. In this thesis, all relevant information will be introduced, and we will also show some experimental results obtained with the proposed algorithms, and comparative studies with other existed algorithms will also be presented

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl

    A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants

    Get PDF
    Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners accessing the applicatio

    A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants

    Get PDF
    Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners accessing the applicatio

    BioSecure: white paper for research in biometrics beyond BioSecure

    Get PDF
    This report is the output of a consultation process of various major stakeholders in the biometric community to identify the future biometrical research issues, an activity which employed not only researchers but representatives from the entire biometrical community, consisting of governments, industry, citizens and academia. It is one of the main efforts of the BioSecure Network of Excellence to define the agenda for future biometrical research, including systems and applications scenarios

    Multi-Factor Authentication: A Survey

    Get PDF
    Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe

    Big data analytics:Computational intelligence techniques and application areas

    Get PDF
    Big Data has significant impact in developing functional smart cities and supporting modern societies. In this paper, we investigate the importance of Big Data in modern life and economy, and discuss challenges arising from Big Data utilization. Different computational intelligence techniques have been considered as tools for Big Data analytics. We also explore the powerful combination of Big Data and Computational Intelligence (CI) and identify a number of areas, where novel applications in real world smart city problems can be developed by utilizing these powerful tools and techniques. We present a case study for intelligent transportation in the context of a smart city, and a novel data modelling methodology based on a biologically inspired universal generative modelling approach called Hierarchical Spatial-Temporal State Machine (HSTSM). We further discuss various implications of policy, protection, valuation and commercialization related to Big Data, its applications and deployment

    Evaluation of ECA Gesture strategies for robust Human-Computer Interaction

    Full text link
    Embodied Conversational Agents (ECAs) offer us the possibility to design pleasant and efficient human-machine interaction. In this paper we present an evaluation scheme to compare dialogue-based speaker authentication and information retrieval systems with and without ECAs on the interface. We used gestures and other visual cues to improve fluency and robustness of interaction with these systems. Our tests results suggest that when an ECA is present users perceive fewer system errors, their frustration levels are lower, turn-changing goes more smoothly, the interaction experience is more enjoyable, and system capabilities are generally perceived more positively than when no ECA is present. However, the ECA seems to intensify the users' privacy concerns

    Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies

    Get PDF
    An inevitable factor that makes the concept of electronic voting irresistible is the fact that it offers the possibility of exceeding the manual voting process in terms of convenience, widespread participation, and consideration for People Living with Disabilities. The underlying voting technology and ballot design can determine the credibility of election results, influence how voters felt about their ability to exercise their right to vote, and their willingness to accept the legitimacy of electoral results. However, the adoption of e-voting systems has unveiled a new set of problems such as security threats, trust, and reliability of voting systems and the electoral process itself. This paper presents a critical literature review on concepts, architectures, and existing authentication strategies in voice recognition systems for the e-voting system for the disabled electorate. Consequently, in this paper, an intelligent yet secure scheme for electronic voting systems specifically for people living with disabilities is presented
    corecore