909 research outputs found

    Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-16181-5_54Proceedings in Computer Vision - ECCV 2014 Workshops held in Zurich (Switzerland) on 2015.This paper studies ways to detect good users for biometric recognition based on keystroke dynamics. Keystroke dynamics is an active research field for the biometric scientific community. Despite the great efforts made during the last decades, the performance of keystroke dynamics recognition systems is far from the performance achieved by traditional hard biometrics. This is very pronounced for some users, who generate many recognition errors even with the most sophisticate recognition algorithms. On the other hand, previous works have demonstrated that some other users behave particularly well even with the simplest recognition algorithms. Our purpose here is to study ways to distinguish such classes of users using only the genuine enrollment data. The experiments comprise a public database and two popular recognition algorithms. The results show the effectiveness of the Kullback-Leibler divergence as a quality measure to categorize users in comparison with other four statistical measures.This work has been partially supported by projects Bio-Shield (TEC2012-34881) from Spanish MINECO and BEAT (FP7-SEC-284989) from EU

    Current landscape in the discovery of novel antibacterial agents

    Get PDF
    Background: Standard treatments against bacterial infections are becoming ineffective due to the rise of antibacterial resistance worldwide. Classical approaches to develop new antibacterial agents are not sufficient to fulfil the current pipeline, therefore new strategies are currently being devised in the field of antibacterial discovery. Objectives: The objective of this narrative review is to compile the most successful strategies for drug discovery within the antibacterial context that are currently being pursued. Sources: Peer-reviewed publications from the MEDLINE database with robust data addressing the discovery of new antibacterial agents in the current pipeline have been selected. Content: Several strategies to discover new antibacterials are described in this review: (i) derivatives of known antibacterial agents; the activity of a known antimicrobial agent can be improved through two strategies: (a) the modification of the original chemical structure of an antimicrobial agent to circumvent antibacterial resistance mechanisms and (b) the development of a compound that inhibits the mechanisms of resistance to an antibacterial agent; (ii) new antibacterial agents targeting new proteins; (iii) inhibitors of virulence factors; (iv) nanoparticles; (v) antimicrobial peptides and peptidomimetics; (vi) phage therapy and enzybiotics; and (vii) antisense oligonucleotides. Implications: This review intends to provide a positive message affirming that several different strategies to design new antibacterial agents are currently being developed, and we are therefore confident that in the near future some of the most promising approaches will come to fruition

    THE ROLE OF QMS IN THE RELATIONSHIP BETWEEN INNOVATION CLIMATE AND PERFORMANCE

    Get PDF
    The emergence of new global competitors, the convergence of high-technology industries and the increasing speed and cost of technological development promise an increasingly uncertain environment for organizations, making adaptation to changes in the environment a central theme in the study of the organization for both organization theory and strategic management. This paper is thus seeks principally to verify that, while innovation and QM alone do not possess the qualities required to provide organizations with sustainable competitive advantages, the bundle of innovation and QM together with other resources and competencies will allow organizations to obtain a competitive advantage and adapt to their environment. The results show that the factors determining innovation—such as resistance to change, cohesion, and workload pressures—have repercussions for the firms’ capacity to adapt to their environment, and that a QM context facilitates this adaptation. Finally, we can conclude that a climate of support for innovation is positively related to the organization’s performance

    Privacy-preserving comparison of variable-length data with application to biometric template protection

    Full text link
    The establishment of cloud computing and big data in a wide variety of daily applications has raised some privacy concerns due to the sensitive nature of some of the processed data. This has promoted the need to develop data protection techniques, where the storage and all operations are carried out without disclosing any information. Following this trend, this paper presents a new approach to efficiently compare variable-length data in the encrypted domain using homomorphic encryption where only encrypted data is stored or exchanged. The new variable-length-based algorithm is fused with existing fixed-length techniques in order to obtain increased comparison accuracy. To assess the soundness of the proposed approach, we evaluate its performance on a particular application: a multi-algorithm biometric template protection system based on dynamic signatures that complies with the requirements described in the ISO/IEC 24745 standard on biometric information protection. Experiments have been carried out on a publicly available database and a free implementation of the Paillier cryptosystem to ensure reproducibility and comparability to other schemes.This work was supported in part by the German Federal Ministry of Education and Research (BMBF); in part by the Hessen State Ministry for Higher Education, Research, and the Arts (HMWK) within the Center for Research in Security and Privacy (CRISP); in part by the Spanish Ministerio de Economia y Competitividad / Fondo Europeo de Desarrollo Regional through the CogniMetrics Project under Grant TEC2015-70627-R; and in part by Cecaban

    Score Normalization for Keystroke Dynamics Biometrics

    Get PDF
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. A. Morales, E. Luna-Garcia, J. Fierrez and J. Ortega-Garcia, "Score normalization for keystroke dynamics biometrics," Security Technology (ICCST), 2015 International Carnahan Conference on, Taipei, 2015, pp. 223-228. doi: 10.1109/CCST.2015.7389686This paper analyzes score normalization for keystroke dynamics authentication systems. Previous studies have shown that the performance of behavioral biometric recognition systems (e.g. voice and signature) can be largely improved with score normalization and target-dependent techniques. The main objective of this work is twofold: i) to analyze the effects of different thresholding techniques in 4 different keystroke dynamics recognition systems for real operational scenarios; and ii) to improve the performance of keystroke dynamics on the basis of target-dependent score normalization techniques. The experiments included in this work are worked out over the keystroke pattern of 114 users from two different publicly available databases. The experiments show that there is large room for improvements in keystroke dynamic systems. The results suggest that score normalization techniques can be used to improve the performance of keystroke dynamics systems in more than 20%. These results encourage researchers to explore this research line to further improve the performance of these systems in real operational environments.A.M. is supported by a post-doctoral Juan de la Cierva contract by the Spanish MECD (JCI-2012-12357). This work has been partially supported by projects: Bio-Shield (TEC2012-34881) from Spanish MINECO, BEAT (FP7-SEC-284989) from EU, CECABANK and Cátedra UAM Telefónica

    La vulnerabilidad de los/as menores con trastornos de espectro autista ante el maltrato en los centros educativos

    Get PDF
    págs.: 81-89Capítulo incluido en el libro: 1ª Jornada sobre Maltrato a las Personas con Discapacidad: Sevilla, 16-17 de Octubre 2014 Sevilla: Universidad Internacional de Andalucía, 2014. ISBN: 978-84-7993-256-5. Enlace: http://hdl.handle.net/10334/3371 . La presente ponencia expuesta en la mesa redonda “Señales del Maltrato” de las I Jornadas sobre maltrato a las personas con discapacidad, tiene por objeto visibilizar las discriminaciones y el maltrato institucional que sufren los/ as menores con Trastorno de Espectro Autista (TEA) en el ámbito educativo, al encontrar dificultades en el acceso a los centros educativos y al no ser resuel tas sus necesidades formativas durante su periodo escolar. Por este motivo, se expondrá el marco normativo regulador de estas situaciones, así como una seria de directrices metodológicas a seguir por parte de los/as profesionales que intervienen en el proceso educativo. Con todo ello, se establecerá un pro tocolo de detección y actuación ante este tipo de maltrato, en aras de facilitar los mecanismos y estrategias para la reivindicación del derecho a la educación inclusiva, presuponiendo que resultara útil para similares casos en los que estén inmersos o sufran el maltrato institucional

    DeepFakes Detection Based on Heart Rate Estimation: Single- and Multi-frame

    Full text link
    This chapter describes a DeepFake detection framework based on physiological measurement. In particular, we consider information related to the heart rate using remote photoplethysmography (rPPG). rPPG methods analyze video sequences looking for subtle color changes in the human skin, revealing the presence of human blood under the tissues. This chapter explores to what extent rPPG is useful for the detection of DeepFake videos. We analyze the recent fake detector named DeepFakesON-Phys that is based on a Convolutional Attention Network (CAN), which extracts spatial and temporal information from video frames, analyzing and combining both sources to better detect fake videos. DeepFakesON-Phys has been experimentally evaluated using the latest public databases in the field: Celeb-DF v2 and DFDC. The results achieved for DeepFake detection based on a single frame are over 98% AUC (Area Under the Curve) on both databases, proving the success of fake detectors based on physiological measurement to detect the latest DeepFake videos. In this chapter, we also propose and study heuristical and statistical approaches for performing continuous DeepFake detection by combining scores from consecutive frames with low latency and high accuracy (100% on the Celeb-DF v2 evaluation dataset). We show that combining scores extracted from short-time video sequences can improve the discrimination power of DeepFakesON-PhysThis work has been supported by projects: PRIMA (H2020-MSCA-ITN2019-860315), TRESPASS-ETN (H2020-MSCA-ITN-2019-860813), BIBECA (MINECO/FEDER RTI2018-101248-B-I00), and COST CA16101 (MULTI-FORESEE). J. H.-O. is supported by a PhD fellowship from UA

    A novel hand reconstruction approach and its application to vulnerability assessment

    Full text link
    This is the author’s version of a work that was accepted for publication in Information Sciences. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Information Sciences, 238 (2014) DOI: 10.1016/j.ins.2013.06.015The present work proposes a novel probabilistic method to reconstruct a hand shape image from its template. We analyse the degree of similarity between the reconstructed images and the original samples in order to determine whether the synthetic hands are able to deceive hand recognition systems. This analysis is made through the estimation of the success chances of an attack carried out with the synthetic samples against an independent system. The experimental results show that there is a high chance of breaking a hand recognition system using this approach. Furthermore, since it is a probabilistic method, several synthetic images can be generated from each original sample, which increases the success chances of the attack.This work has been partially supported by projects Contexts (S2009/TIC-1485) from CAM, Bio-Challenge (TEC2009-11186), BIOSINT (TEC2012-38630-C04-02) and Bio-Shield (TEC2012-34881) from Spanish MINECO, TABULA RASA (FP7-ICT-257289) and BEAT (FP7-SEC-284989) from EU, and Cátedra UAM-Telefónica. Marta Gomez-Barrero is supported by a FPU Fellowship from Spanish MECD

    Software tool for simulation of aircraft trajectories

    Get PDF
    New concepts in air navigation have been introduced recently. Among others, are the concepts of trajectory optimization, 4D trajectories, RBT (Reference Business Trajectory), TBO (trajectory based operations), CDA (Continuous Descent Approach) and ACDA (Advanced CDA), conflict resolution, arrival time (AMAN), introduction of new aircraft (UAVs, UASs) in air space, etc. Although some of these concepts are new, the future Air Traffic Management will maintain the four ATM key performance areas such as Safety, Capacity, Efficiency, and Environmental impact. So much, the performance of the ATM system is directly related to the accuracy with which the future evolution of the traffic can be predicted. In this sense, future air traffic management will require a variety of support tools to provide suitable help to users and engineers involved in the air space management. Most of these tools are based on an appropriate trajectory prediction module as main component. Therefore, the purposes of these tools are related with testing and evaluation of any air navigation concept before they become fully operative. The aim of this paper is to provide an overview to the design of a software tool useful to estimate aircraft trajectories adapted to air navigation concepts. Other usage of the tool, like controller design, vertical navigation assessment, procedures validation and hardware and software in the loop are available in the software tool. The paper will show the process followed to design the tool, the software modules needed to perform accurately and the process followed to validate the output data
    corecore