29,062 research outputs found
Recommended from our members
Efficient 3D data representation for biometric applications
YesAn important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification
Visual Cryptography with Chaotic Encryption for Biometric Templates
Preserving the privacy of digital biometric data (e.g., fingerprint) stored in a central database has become of paramount importance. It demands high speed decryption/encryption process with restricted computational powers. This work explores the possibility of using visual cryptography with chaotic encryption suitable for imparting security to biometric data such as fingerprint images. By using visual cryptography, the original image is decomposed into two images (called shares or sheets) in such a way that the original image can be revealed only when both images are simultaneously available. The security of the stored image can be further enhanced by doing chaotic encryption to the decomposed images. Typically, a private biometric image is dithered into two host images; these images are then independently encrypted using chaotic systems and are then transmitted and stored in two different database servers such that the identity of the private data is not revealed to either server. During the authentication process, Sheets are overlaid (i.e. super imposed) in order to reconstruct the private image. This work proposes a method for ensuring higher level of security for the images using visual cryptography with chaotic encryption. In the first phase of the project, the use of visual cryptography is explored to preserve the privacy of biometric data. This work is being done using Matlab 200
An exploration of the utility of GSR in locating events from personal lifelogs for reflection
Digital personal lifelogs (PLs) enable many artifacts from a personâs life to be automatically stored in a digital archive. These data sets can contain a wealth of potentially valuable information describing events from an individualâs life. A key challenge for lifelog technologies is how to develop scenarios and applications which enable people to interact with these vast heterogeneous data sources in a meaningful way. One of the areas where individuals can gain from interacting with lifelog records of their life is in the process of self reflection. To date little attention has been given to applications which automatically extract content from lifelogs to support self reflection using lifelog content. One of the significant issues with reflection from lifelogs is discerning material which may be of interest in reflection from among the huge amount of available data. One way of determining the userâs engagement with their situation is measuring their biometric response associated with their arousal level. Specifically it is known that an individualâs galvanic skin response (GSR) can vary with their level of arousal. We hypothesize that situations of marked GSR variation are likely to be more significant for self reflection than other moments. We present an initial investigation, using 3 subjectsâ lifelogs, of the utility of lifelog items with marked GSR for self reflection. Our results indicate that GSR records may serve as a good enabling technology for applications supporting self reflection and awareness
Body language, security and e-commerce
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBMâs Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity
Most user authentication methods and identity proving systems rely on a
centralized database. Such information storage presents a single point of
compromise from a security perspective. If this system is compromised it poses
a direct threat to users' digital identities. This paper proposes a
decentralized authentication method, called the Horcrux protocol, in which
there is no such single point of compromise. The protocol relies on
decentralized identifiers (DIDs) under development by the W3C Verifiable Claims
Community Group and the concept of self-sovereign identity. To accomplish this,
we propose specification and implementation of a decentralized biometric
credential storage option via blockchains using DIDs and DID documents within
the IEEE 2410-2017 Biometric Open Protocol Standard (BOPS)
AUTHENTICATION OF DIGITAL DOCUMENTS USING SECRET KEY BIOMETRIC WATERMARKING
Abstract -Digital documents play a major role in modern era. They are easy to generate, modify and manage. The easy modifiable property of digital document makes it more vulnerable to forgery. It can be easily tampered or forged. So the challenge is to produce digital documents that are highly resistant to forgery and reliably confirms the real owner of the document. This can be resolved by biometric watermarking which make a direct relation between the document and its owner. A new biometric watermarking technique with secret key is proposed to digitize the authoritative documents issued by government / other organizations as a part of UID / Aadhar card project of India using biometric watermarking. Biometric code is generated from the biometric data collected from the owner of the document. The biometric code is watermarked in the document with a secret key to generate a biometric watermarked document that authenticates the real owner. Dewatermarking the document with the same key yields the biometric code that can be used for authentication of the document. If the document is tampered in any way it will be indicated in the extracted watermark. Experimental results show that 100% accuracy is obtained in authenticating the genuine documents
Examining the utility of affective response in search of personal lifelogs
Personal lifelog archives contain digital records captured from an individualâs daily life, for example emails, documents edited, webpages downloaded and photographs taken. While capturing this information is becoming increasingly easy, subsequently locating interesting items from within these archives is a significant challenge. One potential source of information to identify items of importance to an individual is their affective state during the capture of the information. The strength of an individualâs affective response to their current situation can often be gauged from their physiological response. For this study we explored the utility of the following biometric features to indicate significant items:
galvanic skin response (GSR), heart rate (HR) and skin temperature (ST). Significant or important events tend to raise an individualâs arousal level, causing a measurable biometric response. We examined the utility of using biometric response to identify significant items and for re-ranking traditional information retrieval (IR) result sets. Results obtained indicate that skin temperature is most useful for extracting interesting items from personal archives containing passively captured images, computer activity and SMS messages
Iris Codes Classification Using Discriminant and Witness Directions
The main topic discussed in this paper is how to use intelligence for
biometric decision defuzzification. A neural training model is proposed and
tested here as a possible solution for dealing with natural fuzzification that
appears between the intra- and inter-class distribution of scores computed
during iris recognition tests. It is shown here that the use of proposed neural
network support leads to an improvement in the artificial perception of the
separation between the intra- and inter-class score distributions by moving
them away from each other.Comment: 6 pages, 5 figures, Proc. 5th IEEE Int. Symp. on Computational
Intelligence and Intelligent Informatics (Floriana, Malta, September 15-17),
ISBN: 978-1-4577-1861-8 (electronic), 978-1-4577-1860-1 (print
- âŠ