1,786 research outputs found

    PIN generation using EEG : a stability study

    Get PDF
    In a previous study, it has been shown that brain activity, i.e. electroencephalogram (EEG) signals, can be used to generate personal identification number (PIN). The method was based on brain–computer interface (BCI) technology using a P300-based BCI approach and showed that a single-channel EEG was sufficient to generate PIN without any error for three subjects. The advantage of this method is obviously its better fraud resistance compared to conventional methods of PIN generation such as entering the numbers using a keypad. Here, we investigate the stability of these EEG signals when used with a neural network classifier, i.e. to investigate the changes in the performance of the method over time. Our results, based on recording conducted over a period of three months, indicate that a single channel is no longer sufficient and a multiple electrode configuration is necessary to maintain acceptable performances. Alternatively, a recording session to retrain the neural network classifier can be conducted on shorter intervals, though practically this might not be viable

    Palmprint Gender Classification Using Deep Learning Methods

    Get PDF
    Gender identification is an important technique that can improve the performance of authentication systems by reducing searching space and speeding up the matching process. Several biometric traits have been used to ascertain human gender. Among them, the human palmprint possesses several discriminating features such as principal-lines, wrinkles, ridges, and minutiae features and that offer cues for gender identification. The goal of this work is to develop novel deep-learning techniques to determine gender from palmprint images. PolyU and CASIA palmprint databases with 90,000 and 5502 images respectively were used for training and testing purposes in this research. After ROI extraction and data augmentation were performed, various convolutional and deep learning-based classification approaches were empirically designed, optimized, and tested. Results of gender classification as high as 94.87% were achieved on the PolyU palmprint database and 90.70% accuracy on the CASIA palmprint database. Optimal performance was achieved by combining two different pre-trained and fine-tuned deep CNNs (VGGNet and DenseNet) through score level average fusion. In addition, Gradient-weighted Class Activation Mapping (Grad-CAM) was also implemented to ascertain which specific regions of the palmprint are most discriminative for gender classification

    Multi-Factor Authentication: A Survey

    Get PDF
    Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe

    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

    Get PDF
    Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent introduction of wideband mobile networks has enabled the deployment of new services with access to traditionally well protected personal data, such as banking details or medical records. Secure user access to this data has however remained a function of the mobile device's authentication system, which is only protected from masquerade abuse by the traditional PIN, originally designed to protect against telephony abuse. This thesis presents novel research in relation to advanced subscriber authentication for mobile devices. The research began by assessing the threat of masquerade attacks on such devices by way of a survey of end users. This revealed that the current methods of mobile authentication remain extensively unused, leaving terminals highly vulnerable to masquerade attack. Further investigation revealed that, in the context of the more advanced wideband enabled services, users are receptive to many advanced authentication techniques and principles, including the discipline of biometrics which naturally lends itself to the area of advanced subscriber based authentication. To address the requirement for a more personal authentication capable of being applied in a continuous context, a novel non-intrusive biometric authentication technique was conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked Responses. The technique forms a hybrid multi-modal biometric where variations in the behavioural stimulus of the human voice (due to the propagation effects of acoustic waves within the human head), are used to verify the identity o f a user. The resulting approach is known as the Head Authentication Technique (HAT). Evaluation of the HAT authentication process is realised in two stages. Firstly, the generic authentication procedures of registration and verification are automated within a prototype implementation. Secondly, a HAT demonstrator is used to evaluate the authentication process through a series of experimental trials involving a representative user community. The results from the trials confirm that multiple HAT samples from the same user exhibit a high degree of correlation, yet samples between users exhibit a high degree of discrepancy. Statistical analysis of the prototypes performance realised early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly demonstrate the authentication capabilities of this novel biometric approach and the contribution this new work can make to the protection of subscriber data in next generation mobile networks.Orange Personal Communication Services Lt

    Facial Recognition and Face Mask Detection Using Machine Learning Techniques

    Get PDF
    Facial recognition, as a biometric system, is a crucial tool for the identification procedures. When using facial recognition, an individual\u27s identity is identified using their unique facial features. Biometric authentication system helps in identifying individuals using their physiological and behavioral features. Physiological biometrics utilize human features such as faces, irises, and fingerprints. In contrast, behavioral biometric rely on features that humans do, such as voice and handwritings. Facial recognition has been widely used for security and other law enforcement purposes. However, since COVID-19 pandemic, many people around the world had to wear face masks. This thesis introduces a neural network system, which can be trained to identify people’s facial features while half of their faces are covered by face masks. The Convolutional Neural Network (CNN) model using transfer learning technique has achieved remarkable accuracy even the original dataset is very limited. One large Face mask detection dataset was first used to train the model, while the original much smaller Face mask detector dataset was used to adapt and finetune this model that was previously generated. During the training and testing phases, network structures, and various parameters were adjusted to achieve the best accuracy results for the actual small dataset. Our adapted model was able to achieve a 97.1% accuracy

    An Efficient Dorsal Hand Vein Recognition Based on Firefly Algorithm

    Get PDF
    Biometric technology is an efficient personal authentication andidentification technique. As one of the main-stream branches, dorsal handvein recognition has been recently attracted the attention of researchers. It is more preferable than the other types of biometrics becuse it’s impossible to steal or counterfeit the patterns and the pattern of the vessels of back of the hand is fixed and unique with repeatable biometric features. Also, the recent researches have been obtained no certain recognition rate yet becuse of the noises in the imaging patterns, and impossibility of Dimension reducing because of the non-complexity of the models, and proof of correctness of identification is required. Therefore, in this paper, first, the images of blood vessels on back of the hands of people is analysed, and after pre-processing of images and feature extraction (in the intersection between the vessels) we began to identify people using firefly clustering algorithms. This identification is done based on the distance patterns between crossing vessels and their matching place. The identification will be done based on the classification of each part of NCUT data set and it consisting of 2040 dorsal hand vein images. High speed in patterns recognition and less computation are the advantages of this method. The recognition rate of this method ismore accurate and the error is less than one percent. At the end thecorrectness percentage of this method (CLU-D-F-A) for identification iscompared with other various algorithms, and the superiority of the proposed method is proved.DOI:http://dx.doi.org/10.11591/ijece.v3i1.176
    • 

    corecore