首页 > 最新文献

IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)最新文献

英文 中文
Prior resemblance probability of users for multimodal biometrics rank fusion 多模态生物特征等级融合的用户先验相似概率
Hossein Talebi, M. Gavrilova
Multimodal biometric systems use multiple biometrics traits to increase the recognition rate. The fusion module plays a key role in multi-biometric system performance. This paper presents a novel multimodal rank reinforcement approach based on the prior resemblance probability distribution of each identity in the training data. The resemblance probability distribution is used before the fusion to reinforce the rank list of each biometric matcher. In this paper, we developed a multimodal biometric system based on the frontal face, the profiles face, and the ear. The experimental results show the ability of the prior reinforcement in increasing the accuracy of unimodal biometrics systems as well as increasing the recognition rate of various rank level fusion approaches.
多模态生物识别系统利用多种生物特征来提高识别率。融合模块对多生物识别系统的性能起着关键作用。本文提出了一种基于训练数据中每个身份的先验相似概率分布的多模态秩强化方法。在融合前利用相似性概率分布来增强每个生物特征匹配者的秩表。在本文中,我们开发了一个基于正面脸、侧面脸和耳朵的多模态生物识别系统。实验结果表明,先验强化能够提高单峰生物识别系统的准确率,并提高各种等级融合方法的识别率。
{"title":"Prior resemblance probability of users for multimodal biometrics rank fusion","authors":"Hossein Talebi, M. Gavrilova","doi":"10.1109/ISBA.2015.7126360","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126360","url":null,"abstract":"Multimodal biometric systems use multiple biometrics traits to increase the recognition rate. The fusion module plays a key role in multi-biometric system performance. This paper presents a novel multimodal rank reinforcement approach based on the prior resemblance probability distribution of each identity in the training data. The resemblance probability distribution is used before the fusion to reinforce the rank list of each biometric matcher. In this paper, we developed a multimodal biometric system based on the frontal face, the profiles face, and the ear. The experimental results show the ability of the prior reinforcement in increasing the accuracy of unimodal biometrics systems as well as increasing the recognition rate of various rank level fusion approaches.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction 一种聚焦细节位置和方向的指纹索引新方法
Guoqiang Li, Bian Yang, C. Busch
Biometrics identification systems containing a largescale database have been gaining increasing attention. In order to speed up searching in a large-scale fingerprint database, fingerprint indexing algorithm has been studied and introduced into biometrics identification system. One critical component of a fingerprint indexing algorithm is the feature extraction method. Majority of researchers developed the features by combining minutia with other information, such as ridge, singularities, orientation filed, etc. Instead, this paper will focus on only using minutia location and direction to extract features. The performance of proposed fingerprint indexing approach was evaluated on several public databases by being compared to the start-of-the- art fingerprint indexing method - minutia cylinder-code (MCC) - indexing as a benchmark. The experimental results show that the proposed approach gives equivalent performance or even outperforms MCC indexing method on the tested databases.
包含大规模数据库的生物识别系统已越来越受到关注。为了加快大规模指纹数据库的检索速度,研究了指纹索引算法,并将其引入到生物特征识别系统中。指纹索引算法的一个关键部分是特征提取方法。大多数研究人员通过将细节与其他信息(如脊、奇点、方向场等)相结合来开发特征。相反,本文将专注于仅使用细节位置和方向来提取特征。通过与最先进的指纹索引方法MCC (minutia圆柱体代码)索引方法进行比较,在多个公共数据库上对所提出的指纹索引方法进行了性能评价。实验结果表明,该方法在被测数据库上的索引性能与MCC索引方法相当,甚至优于MCC索引方法。
{"title":"A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction","authors":"Guoqiang Li, Bian Yang, C. Busch","doi":"10.1109/ISBA.2015.7126346","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126346","url":null,"abstract":"Biometrics identification systems containing a largescale database have been gaining increasing attention. In order to speed up searching in a large-scale fingerprint database, fingerprint indexing algorithm has been studied and introduced into biometrics identification system. One critical component of a fingerprint indexing algorithm is the feature extraction method. Majority of researchers developed the features by combining minutia with other information, such as ridge, singularities, orientation filed, etc. Instead, this paper will focus on only using minutia location and direction to extract features. The performance of proposed fingerprint indexing approach was evaluated on several public databases by being compared to the start-of-the- art fingerprint indexing method - minutia cylinder-code (MCC) - indexing as a benchmark. The experimental results show that the proposed approach gives equivalent performance or even outperforms MCC indexing method on the tested databases.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy 虹膜模式的个性建模和不一致位掩码策略的有效性
Bin Li, Zifei Yan, W. Zuo, Feng Yue
Iris recognition is one of the most accurate biometric technologies. The uniqueness of iris, also known as iris individuality, has been widely accepted as one foundation for iris recognition. Although a few iris individuality models have been proposed, they are either incomplete or less accurate. In this paper, we investigate the iris individuality problem using Daugman's iris code method. We divide the bits in an iriscode into two groups, i.e., consistent and inconsistent bits, and provide the individuality analysis by both FAR and FRR modeling. Numeric evaluation using real iris data shows its usefulness in predicting the empirical performance. Furthermore, till now it is just experimentally confirmed that the recognition accuracy could be improved by masking out inconsistent bits. In order to formally e- valuate the effectiveness of this strategy, we derive the iris individuality model after masking out the inconsistent bits. Comparison of the two models has demonstrated the improved accuracy of the masking strategy, and the drop of EER is up to about 80%.
虹膜识别是最精确的生物识别技术之一。虹膜的独特性,也称为虹膜个性,已被广泛接受为虹膜识别的基础之一。虽然已经提出了一些虹膜个性模型,但它们要么是不完整的,要么是不准确的。本文利用道格曼虹膜编码方法研究了虹膜的个性问题。我们将虹膜码中的位分为一致位和不一致位两组,并通过FAR和FRR建模进行个性分析。使用真实虹膜数据进行数值评价,表明了该方法在预测经验性能方面的有效性。此外,目前只有实验证实,通过屏蔽不一致的比特可以提高识别精度。为了形式化地评价该策略的有效性,我们在屏蔽掉不一致的比特后推导出虹膜个性模型。两种模型的对比结果表明,掩蔽策略的精度得到了提高,EER下降幅度可达80%左右。
{"title":"Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy","authors":"Bin Li, Zifei Yan, W. Zuo, Feng Yue","doi":"10.1109/ISBA.2015.7126351","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126351","url":null,"abstract":"Iris recognition is one of the most accurate biometric technologies. The uniqueness of iris, also known as iris individuality, has been widely accepted as one foundation for iris recognition. Although a few iris individuality models have been proposed, they are either incomplete or less accurate. In this paper, we investigate the iris individuality problem using Daugman's iris code method. We divide the bits in an iriscode into two groups, i.e., consistent and inconsistent bits, and provide the individuality analysis by both FAR and FRR modeling. Numeric evaluation using real iris data shows its usefulness in predicting the empirical performance. Furthermore, till now it is just experimentally confirmed that the recognition accuracy could be improved by masking out inconsistent bits. In order to formally e- valuate the effectiveness of this strategy, we derive the iris individuality model after masking out the inconsistent bits. Comparison of the two models has demonstrated the improved accuracy of the masking strategy, and the drop of EER is up to about 80%.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Expanding the human-biometric sensor interaction model to identity claim scenarios 扩展人体生物特征传感器交互模型以识别索赔场景
S. Elliott, Kevin O'Connor, Eric Bartlow, Joshua J. Robertson, R. Guest
Biometric technologies represent a significant component of comprehensive digital identity solutions, and play an important role in crucial security tasks. These technologies support identification and authentication of individuals based on their physiological and behavioral characteristics. This has led many governmental agencies to choose biometrics as a supplement to existing identification schemes, most prominently ID cards and passports. Studies have shown that the success of biometric systems relies, in part, on how humans interact and accept such systems. In this paper, the authors build on previous work related to the Human-Biometric Sensor Interaction (HBSI) model and examine it with respect to the introduction of a token (e.g. an electronic passport or identity card) into the biometric system. The role of the imposter within an Identity Claim scenario has been integrated to expand the HBSI model into a full version, which is able to categorise potential False Claims and Attack Presentations.
生物识别技术是综合数字身份解决方案的重要组成部分,在关键的安全任务中发挥着重要作用。这些技术支持基于生理和行为特征的个人识别和认证。这导致许多政府机构选择生物识别技术作为现有身份识别方案的补充,最突出的是身份证和护照。研究表明,生物识别系统的成功在一定程度上取决于人类如何与这些系统互动并接受它们。在本文中,作者建立在先前与人类生物识别传感器交互(HBSI)模型相关的工作基础上,并在引入令牌(例如电子护照或身份证)到生物识别系统方面对其进行了检查。身份声明场景中冒名顶替者的角色已被整合,以将HBSI模型扩展为完整版本,该模型能够对潜在的虚假声明和攻击演示进行分类。
{"title":"Expanding the human-biometric sensor interaction model to identity claim scenarios","authors":"S. Elliott, Kevin O'Connor, Eric Bartlow, Joshua J. Robertson, R. Guest","doi":"10.1109/ISBA.2015.7126362","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126362","url":null,"abstract":"Biometric technologies represent a significant component of comprehensive digital identity solutions, and play an important role in crucial security tasks. These technologies support identification and authentication of individuals based on their physiological and behavioral characteristics. This has led many governmental agencies to choose biometrics as a supplement to existing identification schemes, most prominently ID cards and passports. Studies have shown that the success of biometric systems relies, in part, on how humans interact and accept such systems. In this paper, the authors build on previous work related to the Human-Biometric Sensor Interaction (HBSI) model and examine it with respect to the introduction of a token (e.g. an electronic passport or identity card) into the biometric system. The role of the imposter within an Identity Claim scenario has been integrated to expand the HBSI model into a full version, which is able to categorise potential False Claims and Attack Presentations.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of human identification accuracy by wavelet of peak-aligned ECG 波峰对准心电小波对人体识别精度的提高
J. B. Fernando, Koji Morikawa
In this paper, a novel method of human identification using electrocardiogram (ECG) is proposed. In the method, while normalizing RR interval, in addition to normalized signal where time interval of P wave, Q wave, R wave, S wave relatively to R wave is unaligned, normalized signal where time interval of those peaks is aligned is also generated. Wavelet transform is then applied to both normalized signals and feature vector is extracted from their wavelet coefficients. ECG data are collected from 10 subjects using a pair of dry electrodes which are held by two fingers. Experiment results show that adding wavelet of peak-aligned ECG improves the classification accuracy, where the maximum accuracy is 100%, 97%, and 90% for data measured in more than 20 seconds, 5 seconds, and 3 seconds respectively.
本文提出了一种利用心电图进行人体识别的新方法。该方法在对RR区间进行归一化的同时,除了产生P波、Q波、R波、S波相对于R波的时间间隔不对齐的归一化信号外,还产生这些峰的时间间隔对齐的归一化信号。然后对归一化信号进行小波变换,并从其小波系数中提取特征向量。用两根手指握住一对干电极收集10名受试者的心电图数据。实验结果表明,加入峰对心电信号的小波后,对20秒以上、5秒以上、3秒以上的数据的分类准确率分别达到100%、97%和90%。
{"title":"Improvement of human identification accuracy by wavelet of peak-aligned ECG","authors":"J. B. Fernando, Koji Morikawa","doi":"10.1109/ISBA.2015.7126358","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126358","url":null,"abstract":"In this paper, a novel method of human identification using electrocardiogram (ECG) is proposed. In the method, while normalizing RR interval, in addition to normalized signal where time interval of P wave, Q wave, R wave, S wave relatively to R wave is unaligned, normalized signal where time interval of those peaks is aligned is also generated. Wavelet transform is then applied to both normalized signals and feature vector is extracted from their wavelet coefficients. ECG data are collected from 10 subjects using a pair of dry electrodes which are held by two fingers. Experiment results show that adding wavelet of peak-aligned ECG improves the classification accuracy, where the maximum accuracy is 100%, 97%, and 90% for data measured in more than 20 seconds, 5 seconds, and 3 seconds respectively.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context independent continuous authentication using behavioural biometrics 使用行为生物识别技术的上下文独立的连续身份验证
Soumik Mondal, Patrick A. H. Bours
In this research, we focus on context independent continuous authentication that reacts on every separate action performed by a user. The experimental data was collected in a complete uncontrolled condition from 53 users by using our data collection software. In our analysis, we considered both keystroke and mouse usage behaviour patterns to prevent a situation where an attacker avoids detection by restricting to one input device because the continuous authentication system only checks the other input device. The best result obtained from this research is that for 47 bio-metric subjects we have on average 275 actions required to detect an imposter where these biometric subjects are never locked out from the system.
在本研究中,我们关注于上下文无关的连续身份验证,该身份验证对用户执行的每个单独操作做出反应。实验数据是在完全不受控制的条件下,使用我们的数据采集软件采集53名用户的数据。在我们的分析中,我们考虑了击键和鼠标使用行为模式,以防止攻击者通过限制一个输入设备来避免检测的情况,因为连续身份验证系统只检查另一个输入设备。从这项研究中获得的最佳结果是,对于47个生物识别对象,我们平均需要275个动作来检测冒名顶替者,而这些生物识别对象永远不会被系统锁定。
{"title":"Context independent continuous authentication using behavioural biometrics","authors":"Soumik Mondal, Patrick A. H. Bours","doi":"10.1109/ISBA.2015.7126342","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126342","url":null,"abstract":"In this research, we focus on context independent continuous authentication that reacts on every separate action performed by a user. The experimental data was collected in a complete uncontrolled condition from 53 users by using our data collection software. In our analysis, we considered both keystroke and mouse usage behaviour patterns to prevent a situation where an attacker avoids detection by restricting to one input device because the continuous authentication system only checks the other input device. The best result obtained from this research is that for 47 bio-metric subjects we have on average 275 actions required to detect an imposter where these biometric subjects are never locked out from the system.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices 二进制水印:一个实用的方法,以解决对消费者移动设备的人脸识别重放攻击
Daniel F. Smith, A. Wiliem, B. Lovell
Mobile devices (laptops, tablets, and smart phones) are ideal for the wide deployment of biometric authentication, such as face recognition. However, their uncontrolled use and distributed management increases the risk of remote compromise of the device by intruders or malicious programs. Such compromises may result in the device being used to capture the user's face image and replay it to gain unauthorized access to their online accounts, possibly from a different device. Replay attacks can be highly automated and are cheap to launch worldwide, as opposed to spoofing attacks which are relatively expensive as they must be tailored to each individual victim. In this paper, we propose a technique to address replay attacks for a face recognition system by embedding a binary watermark into the captured video. Our monochrome watermark provides high contrast between the signal states, resulting in a robust signal that is practical in a wide variety of environmental conditions. It is also robust to different cameras and tolerates relative movements well. In this paper, the proposed technique is validated on different subjects using several cameras in a variety of lighting conditions. In addition, we explore the limitations of current devices and environments that can negatively impact on performance, and propose solutions to reduce the impact of these limitations.
移动设备(笔记本电脑、平板电脑和智能手机)是广泛部署生物识别身份验证(如面部识别)的理想选择。然而,它们的不受控制的使用和分布式管理增加了入侵者或恶意程序远程入侵设备的风险。这样的漏洞可能会导致设备被用来捕捉用户的面部图像,并重播它,以获得未经授权的访问他们的在线帐户,可能是从不同的设备。重放攻击可以高度自动化,并且在全球范围内启动成本低廉,而欺骗攻击则相对昂贵,因为它们必须针对每个受害者进行定制。在本文中,我们提出了一种通过在捕获的视频中嵌入二进制水印来解决人脸识别系统重放攻击的技术。我们的单色水印提供了信号状态之间的高对比度,从而产生了在各种环境条件下实用的鲁棒信号。它对不同的相机也很健壮,并且能很好地容忍相对运动。在本文中,所提出的技术在不同的主题上进行了验证,使用几个相机在各种照明条件下。此外,我们还探讨了当前设备和环境可能对性能产生负面影响的局限性,并提出了减少这些局限性影响的解决方案。
{"title":"Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices","authors":"Daniel F. Smith, A. Wiliem, B. Lovell","doi":"10.1109/ISBA.2015.7126344","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126344","url":null,"abstract":"Mobile devices (laptops, tablets, and smart phones) are ideal for the wide deployment of biometric authentication, such as face recognition. However, their uncontrolled use and distributed management increases the risk of remote compromise of the device by intruders or malicious programs. Such compromises may result in the device being used to capture the user's face image and replay it to gain unauthorized access to their online accounts, possibly from a different device. Replay attacks can be highly automated and are cheap to launch worldwide, as opposed to spoofing attacks which are relatively expensive as they must be tailored to each individual victim. In this paper, we propose a technique to address replay attacks for a face recognition system by embedding a binary watermark into the captured video. Our monochrome watermark provides high contrast between the signal states, resulting in a robust signal that is practical in a wide variety of environmental conditions. It is also robust to different cameras and tolerates relative movements well. In this paper, the proposed technique is validated on different subjects using several cameras in a variety of lighting conditions. In addition, we explore the limitations of current devices and environments that can negatively impact on performance, and propose solutions to reduce the impact of these limitations.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"4 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigating users' readiness to trade-off biometric fingerprint data 调查用户是否愿意交换生物指纹数据
Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, N. Memon
Biometric-based authentication is a growing trend. While this trend is enabled by the introduction of supporting technology, the use of biometrics introduces new privacy and ethical concerns about the direction of authentication. This paper explores willingness of users to share biometric information and therefore take advantage of these technological advances. Specifically, it examines, by means of an experiment, the factors that affect users' decision making when considering providing their fingerprints for a financial incentive. The study surveyed 100 participants and found that most were not willing to share their fingerprints with an e-commerce for any feasible reward. It found that while the financial incentive was a factor, perception of risk (influenced by being exposed to previous cyber-attacks) as well as the participants' self-efficacy had significant effect on the participants' decision making. The study also found that participants make context-based decision about sharing different types of personal data with different entities. The results of the study indicate that many users have concerns sharing their fingerprints with commercial companies. As new systems are being deployed, a better understanding is needed about user perceptions regarding fingerprint data sharing, so they can be better addressed by system designers in the future.
基于生物特征的身份验证是一个日益增长的趋势。虽然这一趋势是通过引入支持技术实现的,但生物识别技术的使用带来了关于身份验证方向的新隐私和道德问题。本文探讨了用户分享生物特征信息的意愿,从而利用这些技术进步。具体来说,它通过实验的方式检验了在考虑提供指纹以获得财政奖励时影响用户决策的因素。这项研究调查了100名参与者,发现大多数人不愿意为了任何可行的奖励而与电子商务分享他们的指纹。研究发现,虽然经济激励是一个因素,但对风险的感知(受之前遭受网络攻击的影响)以及参与者的自我效能感对参与者的决策有显著影响。该研究还发现,参与者在与不同实体共享不同类型的个人数据时,会根据情境做出决定。研究结果表明,许多用户担心与商业公司分享他们的指纹。随着新系统的部署,需要更好地了解用户对指纹数据共享的看法,以便系统设计师在未来更好地解决这些问题。
{"title":"Investigating users' readiness to trade-off biometric fingerprint data","authors":"Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, N. Memon","doi":"10.1109/ISBA.2015.7126366","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126366","url":null,"abstract":"Biometric-based authentication is a growing trend. While this trend is enabled by the introduction of supporting technology, the use of biometrics introduces new privacy and ethical concerns about the direction of authentication. This paper explores willingness of users to share biometric information and therefore take advantage of these technological advances. Specifically, it examines, by means of an experiment, the factors that affect users' decision making when considering providing their fingerprints for a financial incentive. The study surveyed 100 participants and found that most were not willing to share their fingerprints with an e-commerce for any feasible reward. It found that while the financial incentive was a factor, perception of risk (influenced by being exposed to previous cyber-attacks) as well as the participants' self-efficacy had significant effect on the participants' decision making. The study also found that participants make context-based decision about sharing different types of personal data with different entities. The results of the study indicate that many users have concerns sharing their fingerprints with commercial companies. As new systems are being deployed, a better understanding is needed about user perceptions regarding fingerprint data sharing, so they can be better addressed by system designers in the future.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Keystroke dynamics performance enhancement with soft biometrics 击键动力学性能增强与软生物识别
S. Idrus, E. Cherrier, C. Rosenberger, Soumik Mondal, Patrick A. H. Bours
It is accepted that the way a person types on a keyboard contains timing patterns, which can be used to classify him/her, is known as keystroke dynamics. Keystroke dynamics is a behavioural biometric modality, whose performances, however, are worse than morphological modalities such as fingerprint, iris recognition or face recognition. To cope with this, we propose to combine keystroke dynamics with soft biometrics. Soft biometrics refers to biometric characteristics that are not sufficient to authenticate a user (e.g. height, gender, skin/eye/hair colour). Concerning keystroke dynamics, three soft categories are considered: gender, age and handedness. We present different methods to combine the results of a classical keystroke dynamics system with such soft criteria. By applying simple sum and multiply rules, our experiments suggest that the combination approach performs better than the classification approach with best result of 5.41% of equal error rate. The efficiency of our approaches is illustrated on a public database.
人们普遍认为,一个人在键盘上打字的方式包含计时模式,可以用来对他/她进行分类,这被称为击键动力学。击键动力学是一种行为生物识别模式,然而,其性能不如形态学模式,如指纹,虹膜识别或面部识别。为了解决这个问题,我们建议将击键动力学与软生物识别技术相结合。软生物特征是指不足以验证用户身份的生物特征(例如身高、性别、皮肤/眼睛/头发颜色)。关于击键动力学,考虑了三个软类别:性别,年龄和惯用手。我们提出了不同的方法来结合一个经典的击键动力学系统的结果与这些软准则。通过简单的和乘规则,我们的实验表明,组合方法优于分类方法,其最佳结果为5.41%的等错误率。我们的方法的有效性在一个公共数据库上得到了说明。
{"title":"Keystroke dynamics performance enhancement with soft biometrics","authors":"S. Idrus, E. Cherrier, C. Rosenberger, Soumik Mondal, Patrick A. H. Bours","doi":"10.1109/ISBA.2015.7126345","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126345","url":null,"abstract":"It is accepted that the way a person types on a keyboard contains timing patterns, which can be used to classify him/her, is known as keystroke dynamics. Keystroke dynamics is a behavioural biometric modality, whose performances, however, are worse than morphological modalities such as fingerprint, iris recognition or face recognition. To cope with this, we propose to combine keystroke dynamics with soft biometrics. Soft biometrics refers to biometric characteristics that are not sufficient to authenticate a user (e.g. height, gender, skin/eye/hair colour). Concerning keystroke dynamics, three soft categories are considered: gender, age and handedness. We present different methods to combine the results of a classical keystroke dynamics system with such soft criteria. By applying simple sum and multiply rules, our experiments suggest that the combination approach performs better than the classification approach with best result of 5.41% of equal error rate. The efficiency of our approaches is illustrated on a public database.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Quality of online signature templates 在线签名模板的质量
Napa Sae-Bae, N. Memon
This paper proposes a metric to measure the quality of an online signature template derived from a set of enrolled signature samples in terms of its distinctiveness against random signatures. Particularly, the proposed quality score is computed based on statistical analysis of histogram features that are used as part of an online signature representation. Experiments performed on three datasets consistently confirm the effectiveness of the proposed metric as an indication of false acceptance rate against random forgeries when the system is operated at a particular decision threshold. Finally, the use of the proposed quality metric to enforce a minimum signature strength policy in order to enhance security and reliability of the system against random forgeries is demonstrated.
本文提出了一种度量标准来衡量从一组注册签名样本中获得的在线签名模板的质量,即其相对于随机签名的独特性。特别地,提出的质量分数是基于直方图特征的统计分析计算的,直方图特征被用作在线签名表示的一部分。在三个数据集上进行的实验一致地证实了当系统在特定的决策阈值下运行时,所提出的度量作为对随机伪造的错误接受率的指示的有效性。最后,演示了使用所提出的质量度量来强制执行最小签名强度策略,以增强系统的安全性和可靠性,防止随机伪造。
{"title":"Quality of online signature templates","authors":"Napa Sae-Bae, N. Memon","doi":"10.1109/ISBA.2015.7126354","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126354","url":null,"abstract":"This paper proposes a metric to measure the quality of an online signature template derived from a set of enrolled signature samples in terms of its distinctiveness against random signatures. Particularly, the proposed quality score is computed based on statistical analysis of histogram features that are used as part of an online signature representation. Experiments performed on three datasets consistently confirm the effectiveness of the proposed metric as an indication of false acceptance rate against random forgeries when the system is operated at a particular decision threshold. Finally, the use of the proposed quality metric to enforce a minimum signature strength policy in order to enhance security and reliability of the system against random forgeries is demonstrated.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115708724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1