1,094 research outputs found

    Pay to Play

    Get PDF

    Biometric presentation attack detection: beyond the visible spectrum

    Full text link
    The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years. This has in turn led to the disclosure of security concerns specifically related to biometric systems. Among them, presentation attacks (PAs, i.e., attempts to log into the system with a fake biometric characteristic or presentation attack instrument) pose a severe threat to the security of the system: any person could eventually fabricate or order a gummy finger or face mask to impersonate someone else. In this context, we present a novel fingerprint presentation attack detection (PAD) scheme based on i) a new capture device able to acquire images within the short wave infrared (SWIR) spectrum, and i i) an in-depth analysis of several state-of-theart techniques based on both handcrafted and deep learning features. The approach is evaluated on a database comprising over 4700 samples, stemming from 562 different subjects and 35 different presentation attack instrument (PAI) species. The results show the soundness of the proposed approach with a detection equal error rate (D-EER) as low as 1.35% even in a realistic scenario where five different PAI species are considered only for testing purposes (i.e., unknown attacks

    Analyzing eyebrow region for morphed image detection

    Full text link
    Facial images in passports are designated as primary identifiers for the verification of travelers according to the International Civil Aviation Organization (ICAO). Hence, it is important to ascertain the sanctity of the facial images stored in the electronic Machine-Readable Travel Document (eMRTD). With the introduction of automated border control (ABC) systems that rely on face recognition for the verification of travelers, it is even more crucial to have a system to ensure that the image stored in the eMRTD is free from any alteration that can hinder or abuse the normal working of a facial recognition system. One such attack against these systems is the face-morphing attack. Even though many techniques exist to detect morphed images, morphing algorithms are also improving to evade these detections. In this work, we analyze the eyebrow region for morphed image detection. The proposed method is based on analyzing the frequency content of the eyebrow region. The method was evaluated on two datasets that each consisted of morphed images created using two algorithms. The findings suggest that the proposed method can serve as a valuable tool in morphed image detection, and can be used in various applications where image authenticity is critical

    Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

    Full text link
    Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application. Ensuring unlinkability across biometric service operators, irreversibility of leaked encrypted templates, and renewability of e.g., voice models following the i-vector paradigm, biometric voice-based systems are prepared for the latest EU data privacy legislation. Employing Paillier cryptosystems, Euclidean and cosine comparators are known to ensure data privacy demands, without loss of discrimination nor calibration performance. Bridging gaps from template protection to speaker recognition, two architectures are proposed for the two-covariance comparator, serving as a generative model in this study. The first architecture preserves privacy of biometric data capture subjects. In the second architecture, model parameters of the comparator are encrypted as well, such that biometric service providers can supply the same comparison modules employing different key pairs to multiple biometric service operators. An experimental proof-of-concept and complexity analysis is carried out on the data from the 2013-2014 NIST i-vector machine learning challenge

    ¿Se pueden alcanzar los objetivos de la escuela de Frankfurt mediante la teoría del reconocimiento? Reflexiones a propósito de la controversia en el campo de la filosofía política de Nancy Fraser y Axel Honneth

    Get PDF
    De los estudios en ciencias sociales de mayor impacto se deduce que la política de mercantilización y desestructuración de las instituciones del Estado social practicada en los últimos treinta años, pri mero en Gran Bretaña, los Estados Unidos y Nueva Zelanda y después en el continente europeo, generará formas de empleo que, cada vez más, serían experimentadas por las personas como pro blemáticas o amenazantes (cf ., p. ej ., Bourdieu et al., 1997, Castel, 2000 y 2005, así como Sennet 1998 y 2005). Parecen responsables de este hecho, ante todo, las exigencias de movilidad que aumentan con la flexibilización de las estructuras de empleo, así como también un fuerte incremento de las ocupaciones inestables y mal pagadas (como, por ejemplo, los trabajos tempora les o a tiempo parcial). Según la apreciación de destacados sociólogos, aquellas estructuras de ocupación resultan problemáticas para muchas personas no únicamente en sentido material, sino también en sentido normativo: no sólo acarrean una situación de conflict o en el mantenimiento de la propia vida, sino que también dificultan la formación del autoaprecio y de la autoestima de una parte de la ciudadanía. A la vista de esta circunstancias , no resulta sorprendente que las cuesti ones del mundo del trabajo hayan sido discutidas ampliamente por personas que se dedican tanto a las ciencias sociales y a la ética de la economía, como también a la filosofía política o social. Para la Teoría Crítica en la tradición de la Escuela de Frankfurt , la discusión sobre los modernos mundos del trabajo resulta tradicionalmente un tema central. La peculiaridad de su planteamiento (interdis ciplinar) consiste , según la convicción de dos de sus más prominentes representantes, en : fusionar aquellos planos que provienen de la filosofía moral, de la teoría de la sociedad y del análisis político, en una teoría crítica del capitalismo (Fraser & Honnet h, 2003: 10). Lo que se plantea en esta perspectiva es un análisis y una crítica

    Compaction and cementation control on bleaching in Triassic fluvial red beds, S-Germany

    Get PDF
    This study focusses on bleaching phenomena on the pore scale in an Olenekian (Upper Buntsandstein) sandstone quarry. The study area exposes a 10 m thick red sandstone body with up to cm-sized, greyish-white laminae in sandstones. Analyses focus on bleached and unbleached zones in the same cm-sized samples. Bleached zones show a larger grain size (by 27 μm), less compaction and a higher porosity (by 3 %). They also exhibit stronger cementation by all observed authigenic phases of quartz, illite, K-feldspar and to a minor extent dolomite. Calculated intergranular volumes and cementational porosity loss also correlate positively with bleaching. Meanwhile unbleached zones contain more ductile grains (e.g. micas, detrital clay, rock fragments like phyllites and plutonic rock fragments) and are affected by major porosity loss via compaction. Bleaching is related to primary features like grain size-selective lamination and associated higher permeability in coarse-grained laminae. It is also reliant onto an early framework stabilising cement phase, which keeps pathways open for uplift-related leaching of the detritus and few dolomite cements
    corecore