45 research outputs found

    Privacy-Preserving Biometric Authentication

    Full text link
    Biometric-based authentication provides a highly accurate means of authentication without requiring the user to memorize or possess anything. However, there are three disadvantages to the use of biometrics in authentication; any compromise is permanent as it is impossible to revoke biometrics; there are significant privacy concerns with the loss of biometric data; and humans possess only a limited number of biometrics, which limits how many services can use or reuse the same form of authentication. As such, enhancing biometric template security is of significant research interest. One of the methodologies is called cancellable biometric template which applies an irreversible transformation on the features of the biometric sample and performs the matching in the transformed domain. Yet, this is itself susceptible to specific classes of attacks, including hill-climb, pre-image, and attacks via records multiplicity. This work has several outcomes and contributions to the knowledge of privacy-preserving biometric authentication. The first of these is a taxonomy structuring the current state-of-the-art and provisions for future research. The next of these is a multi-filter framework for developing a robust and secure cancellable biometric template, designed specifically for fingerprint biometrics. This framework is comprised of two modules, each of which is a separate cancellable fingerprint template that has its own matching and measures. The matching for this is based on multiple thresholds. Importantly, these methods show strong resistance to the above-mentioned attacks. Another of these outcomes is a method that achieves a stable performance and can be used to be embedded into a Zero-Knowledge-Proof protocol. In this novel method, a new strategy was proposed to improve the recognition error rates which is privacy-preserving in the untrusted environment. The results show promising performance when evaluated on current datasets

    A study of the effects of ageing on the characteristics of handwriting and signatures

    Get PDF
    The work presented in this thesis is focused on the understanding of factors that are unique to the elderly and their use of biometric systems. In particular, an investigation is carried out with a focus on the handwritten signature as the biometric modality of choice. This followed on from an in-depth analysis of various biometric modalities such as voice, fingerprint and face. This analysis aimed at investigating the inclusivity of and the policy guiding the use of biometrics by the elderly. Knowledge gained from extracted features of the handwritten signatures of the elderly shed more light on and exposed the uniqueness of some of these features in their ability to separate the elderly from the young. Consideration is also given to a comparative analysis of another handwriting task, that of copying text both in cursive and block capitals. It was discovered that there are features that are unique to each task. Insight into the human perceptual capability in inspecting signatures, in assessing complexity and in judging imitations was gained by analysing responses to practical scenarios that applied human perceptual judgement. Features extracted from a newly created database containing handwritten signatures donated by elderly subjects allowed the possibility of analysing the intra-class variations that exist within the elderly population

    Contributions to non-conventional biometric systems : improvements on the fingerprint, facial and handwriting recognition approach

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Mecânica, 2021.Os sistemas biométricos são amplamente utilizados pela sociedade. A maioria das aplicações desses sistemas está associada à identificação civil e à investigação criminal. No entanto, com o tempo, o desempenho dos métodos tradicionais de biometria está chegando ao limite. Neste contexto, sistemas biométricos emergentes ou não convencionais estão ganhando importância. Embora promissores, novos sistemas, assim como qualquer nova tecnologia, trazem consigo não apenas potencialidades, mas também fragilidades. Este trabalho apresenta contribuições para três importantes sistemas biométricos não convencionais (SBNC): impressão digital, reconhecimento facial e reconhecimento de escrita. No que diz respeito às impressões digitais, este trabalho apresenta um novo método para detectar a vida em dispositivos de impressão digital multivista sem toque, utilizando descritores de textura e redes neurais artificiais. Com relação ao reconhecimento facial, um método de reconhecimento de faces baseado em algoritmos de característica invariante à escala (SIFT e SURF) que opera sem a necessidade de treinamento prévio do classificador e que realiza o rastreamento de indivíduos em ambientes não controlados é apresentado. Finalmente, um método de baixo custo que usa sinais de acelerômetro e giroscópio obtidos a partir de um sensor acoplado a canetas convencionais para realizar o reconhecimento em tempo real de assinaturas é apresentado. Resultados mostram que os métodos propostos são promissores e que juntos podem contribuir para o aprimoramento dos SBNCCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES).Biometric systems are widely used by society. Most applications are associated with civil identification and criminal investigation. However, over time, traditional methods of performing biometrics have been reaching their limits. In this context, emerging or nonconventional biometric systems (NCBS) are gaining ground. Although promising, new systems, as well as any new technology, bring not only potentialities but also weaknesses. This work presents contributions to three important non-conventional biometric systems: fingerprint, facial, and handwriting recognition. With regard to fingerprints, this work presents a novel method for detecting life on Touchless Multi-view Fingerprint Devices, using Texture Descriptors and Artificial Neural Networks. With regard to face recognition, a facial recognition method is presented, based on Scale Invariant Feature Algorithms (SIFT and SURF), that operates without the need of previous training of a classifier and can be used to track individuals in an unconstrained environment. Finally, a low-cost on-line handwriting signature recognition method that uses accelerometer and gyroscope signals obtained from a sensor coupled to conventional pens to identify individuals in real time is presented. Results show that the proposed methods are promising and that together may contribute to the improvement of the NCB

    Pattern mining approaches used in sensor-based biometric recognition: a review

    Get PDF
    Sensing technologies place significant interest in the use of biometrics for the recognition and assessment of individuals. Pattern mining techniques have established a critical step in the progress of sensor-based biometric systems that are capable of perceiving, recognizing and computing sensor data, being a technology that searches for the high-level information about pattern recognition from low-level sensor readings in order to construct an artificial substitute for human recognition. The design of a successful sensor-based biometric recognition system needs to pay attention to the different issues involved in processing variable data being - acquisition of biometric data from a sensor, data pre-processing, feature extraction, recognition and/or classification, clustering and validation. A significant number of approaches from image processing, pattern identification and machine learning have been used to process sensor data. This paper aims to deliver a state-of-the-art summary and present strategies for utilizing the broadly utilized pattern mining methods in order to identify the challenges as well as future research directions of sensor-based biometric systems

    Face Liveness Detection under Processed Image Attacks

    Get PDF
    Face recognition is a mature and reliable technology for identifying people. Due to high-definition cameras and supporting devices, it is considered the fastest and the least intrusive biometric recognition modality. Nevertheless, effective spoofing attempts on face recognition systems were found to be possible. As a result, various anti-spoofing algorithms were developed to counteract these attacks. They are commonly referred in the literature a liveness detection tests. In this research we highlight the effectiveness of some simple, direct spoofing attacks, and test one of the current robust liveness detection algorithms, i.e. the logistic regression based face liveness detection from a single image, proposed by the Tan et al. in 2010, against malicious attacks using processed imposter images. In particular, we study experimentally the effect of common image processing operations such as sharpening and smoothing, as well as corruption with salt and pepper noise, on the face liveness detection algorithm, and we find that it is especially vulnerable against spoofing attempts using processed imposter images. We design and present a new facial database, the Durham Face Database, which is the first, to the best of our knowledge, to have client, imposter as well as processed imposter images. Finally, we evaluate our claim on the effectiveness of proposed imposter image attacks using transfer learning on Convolutional Neural Networks. We verify that such attacks are more difficult to detect even when using high-end, expensive machine learning techniques

    From cyber-utopia to cyber-war: normative change in cyberspace

    Get PDF
    This dissertation analyzes a normative change in state perception and political action towards the Internet. This change is currently reflected in certain measures aimed at the exercise of control and state sovereignty in and over cyberspace. These include phenomena such as the total surveillance of data streams and the extensive collection of connection data by secret services, the control (political censorship) and manipulation of information (information war) as well as the arms spiral around offensive cyber capabilities to disrupt and destroy information infrastructures. States face a loss of control that they want to compensate for. The phenomenon of the perceived loss of control and the establishment of a norm of control (filter and monitoring technology) is equally evident in various democratic and non-democratic states, as various studies show. This militarized perception of the Internet is remarkable in so far as Western politicians used to perceive the same Internet technology in the 1980s and 1990s in a completely different way. Back then the lack of state control was seen as desirable. Instead of controlling and monitoring all aspects of the Internet, a "hands-off" and laissez-faire idea dominated political behavior at the time: the possibilities of democratization through information technologies, the liberalization of authoritarian societies through technology and the free availability of global knowledge. The idea of national control over communications technology was considered innovation-inhibiting, undemocratic and even technically impossible. The topic of this work is the interaction between state power and sovereignty (e.g. political control through information sovereignty) and digital technologies. The research question is: Which process led to the establishment of norms of control and rule (surveillance, censorship, cyber-war) with regard to the medium Internet? Furthermore, the question arises: What are the implications of this change in standards for the fundamental functioning of the Internet? The aim is to examine in detail the thesis of the militarization of cyberspace empirically on the basis of a longitudinal case study using the example of Internet development in the USA since the 1960s. An interdisciplinary and multi-theoretical approach is chosen from constructivist norms research and the Social Construction of Technology approach

    De-identification for privacy protection in multimedia content : A survey

    Get PDF
    This document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.Peer reviewe
    corecore