179 research outputs found

    Biometrics based privacy-preserving authentication and mobile template protection

    Get PDF
    Smart mobile devices are playing a more and more important role in our daily life. Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data. However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. Moreover, the attacks via record multiplicity (ARM) present a threat to the existing cancelable biometrics, which is still a challenging open issue. To address these problems, in this paper, we propose a new cancelable fingerprint template which can not only mitigate the negative effect of nonlinear distortion by combining multiple feature sets, but also defeat the ARM attack through a proposed feature decorrelation algorithm. Our work is a new contribution to the design of cancelable biometrics with a concrete method against the ARM attack. Experimental results on public databases and security analysis show the validity of the proposed cancelable template

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Multimedia security and privacy protection in the internet of things: research developments and challenges

    Get PDF
    With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are being generated from and/or exchanged through various IoT devices, systems and applications. The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. First, we classify multimedia data into different types and security levels according to application areas. Then, we analyse and discuss the existing multimedia data protection schemes in the IoT, including traditional techniques (e.g., cryptography and watermarking) and emerging technologies (e.g., blockchain and federated learning). Based on the detailed analysis on the research development of IoT-related multimedia security and privacy protection, we point out some open challenges and provide future research directions, aiming to advance the study in the relevant fields and assist researchers in gaining a deeper understanding of the state of the art on multimedia data protection in the IoT

    A Review on Security Issues and Solutions of the Internet of Drones

    Get PDF
    The Internet of Drones (IoD) has attracted increasing attention in recent years because of its portability and automation, and is being deployed in a wide range of fields (e.g., military, rescue and entertainment). Nevertheless, as a result of the inherently open nature of radio transmission paths in the IoD, data collected, generated or handled by drones is plagued by many security concerns. Since security and privacy are among the foremost challenges for the IoD, in this paper we conduct a comprehensive review on security issues and solutions for IoD security, discussing IoD-related security requirements and identifying the latest advancement in IoD security research. This review analyzes a host of important security technologies with emphases on authentication techniques and blockchain-powered schemes. Based on a detailed analysis, we present the challenges faced by current methodologies and recommend future IoD security research directions. This review shows that appropriate security measures are needed to address IoD security issues, and that newly designed security solutions should particularly consider the balance between the level of security and cost efficiency

    A cancelable iris- and steganography-based user authentication system for the Internet of Things

    Get PDF
    Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques

    Mesenchymal stem cells as carriers and amplifiers in CRAd delivery to tumors

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Mesenchymal stem cells (MSCs) have been considered to be the attractive vehicles for delivering therapeutic agents toward various tumor diseases. This study was to explore the distribution pattern, kinetic delivery of adenovirus, and therapeutic efficacy of the MSC loading of E1A mutant conditionally replicative adenovirus Adv-Stat3(-) which selectively replicated and expressed high levels of anti-sense Stat3 complementary DNA in breast cancer and melanoma cells.</p> <p>Methods</p> <p>We assessed the release ability of conditionally replicative adenovirus (CRAd) from MSC using crystal violet staining, TCID<sub>50 </sub>assay, and quantitative PCR. In vitro killing competence of MSCs carrying Adv-Stat3(-) toward breast cancer and melanoma was performed using co-culture system of transwell plates. We examined tumor tropism of MSC by Prussian blue staining and immunofluorescence. In vivo killing competence of MSCs carrying Adv-Stat3(-) toward breast tumor was analyzed by comparison of tumor volumes and survival periods.</p> <p>Results</p> <p>Adv-Stat3(-) amplified in MSCs and were released 4 days after infection. MSCs carrying Adv-Stat3(-) caused viral amplification, depletion of Stat3 and its downstream proteins, and led to significant apoptosis in breast cancer and melanoma cell lines. In vivo experiments confirmed the preferential localization of MSCs in the tumor periphery 24 hours after tail vein injection, and this localization was mainly detected in the tumor parenchyma after 72 hours. Intravenous injection of MSCs carrying Adv-Stat3(-) suppressed the Stat3 pathway, down-regulated Ki67 expression, and recruited CD11b-positive cells in the local tumor, inhibiting tumor growth and increasing the survival of tumor-bearing mice.</p> <p>Conclusions</p> <p>These results indicate that MSCs migrate to the tumor site in a time-dependent manner and could be an effective platform for the targeted delivery of CRAd and the amplification of tumor killing effects.</p

    Tirofiban for Stroke without Large or Medium-Sized Vessel Occlusion

    Get PDF
    The effects of the glycoprotein IIb/IIIa receptor inhibitor tirofiban in patients with acute ischemic stroke but who have no evidence of complete occlusion of large or medium-sized vessels have not been extensively studied. In a multicenter trial in China, we enrolled patients with ischemic stroke without occlusion of large or medium-sized vessels and with a National Institutes of Health Stroke Scale score of 5 or more and at least one moderately to severely weak limb. Eligible patients had any of four clinical presentations: ineligible for thrombolysis or thrombectomy and within 24 hours after the patient was last known to be well; progression of stroke symptoms 24 to 96 hours after onset; early neurologic deterioration after thrombolysis; or thrombolysis with no improvement at 4 to 24 hours. Patients were assigned to receive intravenous tirofiban (plus oral placebo) or oral aspirin (100 mg per day, plus intravenous placebo) for 2 days; all patients then received oral aspirin until day 90. The primary efficacy end point was an excellent outcome, defined as a score of 0 or 1 on the modified Rankin scale (range, 0 [no symptoms] to 6 [death]) at 90 days. Secondary end points included functional independence at 90 days and a quality-of-life score. The primary safety end points were death and symptomatic intracranial hemorrhage. A total of 606 patients were assigned to the tirofiban group and 571 to the aspirin group. Most patients had small infarctions that were presumed to be atherosclerotic. The percentage of patients with a score of 0 or 1 on the modified Rankin scale at 90 days was 29.1% with tirofiban and 22.2% with aspirin (adjusted risk ratio, 1.26; 95% confidence interval, 1.04 to 1.53, P = 0.02). Results for secondary end points were generally not consistent with the results of the primary analysis. Mortality was similar in the two groups. The incidence of symptomatic intracranial hemorrhage was 1.0% in the tirofiban group and 0% in the aspirin group. In this trial involving heterogeneous groups of patients with stroke of recent onset or progression of stroke symptoms and nonoccluded large and medium-sized cerebral vessels, intravenous tirofiban was associated with a greater likelihood of an excellent outcome than low-dose aspirin. Incidences of intracranial hemorrhages were low but slightly higher with tirofiban

    Methylprednisolone as Adjunct to Endovascular Thrombectomy for Large-Vessel Occlusion Stroke

    Get PDF
    Importance It is uncertain whether intravenous methylprednisolone improves outcomes for patients with acute ischemic stroke due to large-vessel occlusion (LVO) undergoing endovascular thrombectomy. Objective To assess the efficacy and adverse events of adjunctive intravenous low-dose methylprednisolone to endovascular thrombectomy for acute ischemic stroke secondary to LVO. Design, Setting, and Participants This investigator-initiated, randomized, double-blind, placebo-controlled trial was implemented at 82 hospitals in China, enrolling 1680 patients with stroke and proximal intracranial LVO presenting within 24 hours of time last known to be well. Recruitment took place between February 9, 2022, and June 30, 2023, with a final follow-up on September 30, 2023.InterventionsEligible patients were randomly assigned to intravenous methylprednisolone (n = 839) at 2 mg/kg/d or placebo (n = 841) for 3 days adjunctive to endovascular thrombectomy. Main Outcomes and Measures The primary efficacy outcome was disability level at 90 days as measured by the overall distribution of the modified Rankin Scale scores (range, 0 [no symptoms] to 6 [death]). The primary safety outcomes included mortality at 90 days and the incidence of symptomatic intracranial hemorrhage within 48 hours. Results Among 1680 patients randomized (median age, 69 years; 727 female [43.3%]), 1673 (99.6%) completed the trial. The median 90-day modified Rankin Scale score was 3 (IQR, 1-5) in the methylprednisolone group vs 3 (IQR, 1-6) in the placebo group (adjusted generalized odds ratio for a lower level of disability, 1.10 [95% CI, 0.96-1.25]; P = .17). In the methylprednisolone group, there was a lower mortality rate (23.2% vs 28.5%; adjusted risk ratio, 0.84 [95% CI, 0.71-0.98]; P = .03) and a lower rate of symptomatic intracranial hemorrhage (8.6% vs 11.7%; adjusted risk ratio, 0.74 [95% CI, 0.55-0.99]; P = .04) compared with placebo. Conclusions and Relevance Among patients with acute ischemic stroke due to LVO undergoing endovascular thrombectomy, adjunctive methylprednisolone added to endovascular thrombectomy did not significantly improve the degree of overall disability.Trial RegistrationChiCTR.org.cn Identifier: ChiCTR210005172
    corecore