29,062 research outputs found

    Visual Cryptography with Chaotic Encryption for Biometric Templates

    Get PDF
    Preserving the privacy of digital biometric data (e.g., fingerprint) stored in a central database has become of paramount importance. It demands high speed decryption/encryption process with restricted computational powers. This work explores the possibility of using visual cryptography with chaotic encryption suitable for imparting security to biometric data such as fingerprint images. By using visual cryptography, the original image is decomposed into two images (called shares or sheets) in such a way that the original image can be revealed only when both images are simultaneously available. The security of the stored image can be further enhanced by doing chaotic encryption to the decomposed images. Typically, a private biometric image is dithered into two host images; these images are then independently encrypted using chaotic systems and are then transmitted and stored in two different database servers such that the identity of the private data is not revealed to either server. During the authentication process, Sheets are overlaid (i.e. super imposed) in order to reconstruct the private image. This work proposes a method for ensuring higher level of security for the images using visual cryptography with chaotic encryption. In the first phase of the project, the use of visual cryptography is explored to preserve the privacy of biometric data. This work is being done using Matlab 200

    An exploration of the utility of GSR in locating events from personal lifelogs for reflection

    Get PDF
    Digital personal lifelogs (PLs) enable many artifacts from a person’s life to be automatically stored in a digital archive. These data sets can contain a wealth of potentially valuable information describing events from an individual’s life. A key challenge for lifelog technologies is how to develop scenarios and applications which enable people to interact with these vast heterogeneous data sources in a meaningful way. One of the areas where individuals can gain from interacting with lifelog records of their life is in the process of self reflection. To date little attention has been given to applications which automatically extract content from lifelogs to support self reflection using lifelog content. One of the significant issues with reflection from lifelogs is discerning material which may be of interest in reflection from among the huge amount of available data. One way of determining the user’s engagement with their situation is measuring their biometric response associated with their arousal level. Specifically it is known that an individual’s galvanic skin response (GSR) can vary with their level of arousal. We hypothesize that situations of marked GSR variation are likely to be more significant for self reflection than other moments. We present an initial investigation, using 3 subjects’ lifelogs, of the utility of lifelog items with marked GSR for self reflection. Our results indicate that GSR records may serve as a good enabling technology for applications supporting self reflection and awareness

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

    Full text link
    Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point of compromise. The protocol relies on decentralized identifiers (DIDs) under development by the W3C Verifiable Claims Community Group and the concept of self-sovereign identity. To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open Protocol Standard (BOPS)

    AUTHENTICATION OF DIGITAL DOCUMENTS USING SECRET KEY BIOMETRIC WATERMARKING

    Get PDF
    Abstract -Digital documents play a major role in modern era. They are easy to generate, modify and manage. The easy modifiable property of digital document makes it more vulnerable to forgery. It can be easily tampered or forged. So the challenge is to produce digital documents that are highly resistant to forgery and reliably confirms the real owner of the document. This can be resolved by biometric watermarking which make a direct relation between the document and its owner. A new biometric watermarking technique with secret key is proposed to digitize the authoritative documents issued by government / other organizations as a part of UID / Aadhar card project of India using biometric watermarking. Biometric code is generated from the biometric data collected from the owner of the document. The biometric code is watermarked in the document with a secret key to generate a biometric watermarked document that authenticates the real owner. Dewatermarking the document with the same key yields the biometric code that can be used for authentication of the document. If the document is tampered in any way it will be indicated in the extracted watermark. Experimental results show that 100% accuracy is obtained in authenticating the genuine documents

    Examining the utility of affective response in search of personal lifelogs

    Get PDF
    Personal lifelog archives contain digital records captured from an individual’s daily life, for example emails, documents edited, webpages downloaded and photographs taken. While capturing this information is becoming increasingly easy, subsequently locating interesting items from within these archives is a significant challenge. One potential source of information to identify items of importance to an individual is their affective state during the capture of the information. The strength of an individual’s affective response to their current situation can often be gauged from their physiological response. For this study we explored the utility of the following biometric features to indicate significant items: galvanic skin response (GSR), heart rate (HR) and skin temperature (ST). Significant or important events tend to raise an individual’s arousal level, causing a measurable biometric response. We examined the utility of using biometric response to identify significant items and for re-ranking traditional information retrieval (IR) result sets. Results obtained indicate that skin temperature is most useful for extracting interesting items from personal archives containing passively captured images, computer activity and SMS messages

    Iris Codes Classification Using Discriminant and Witness Directions

    Full text link
    The main topic discussed in this paper is how to use intelligence for biometric decision defuzzification. A neural training model is proposed and tested here as a possible solution for dealing with natural fuzzification that appears between the intra- and inter-class distribution of scores computed during iris recognition tests. It is shown here that the use of proposed neural network support leads to an improvement in the artificial perception of the separation between the intra- and inter-class score distributions by moving them away from each other.Comment: 6 pages, 5 figures, Proc. 5th IEEE Int. Symp. on Computational Intelligence and Intelligent Informatics (Floriana, Malta, September 15-17), ISBN: 978-1-4577-1861-8 (electronic), 978-1-4577-1860-1 (print
    • 

    corecore