Arslan Brömme,Christoph Busch (Eds.) BIOSIG Proceedingsofthe 13 th International Conference of the Biometrics Special Interest Group

Size: px
Start display at page:

Download "Arslan Brömme,Christoph Busch (Eds.) BIOSIG 2014. Proceedingsofthe 13 th International Conference of the Biometrics Special Interest Group"

Transcription

1 Arslan Brömme,Christoph Busch (Eds.) BIOSIG 2014 Proceedingsofthe 13 th International Conference of the Biometrics Special Interest Group September 2014 in Darmstadt, Germany Gesellschaft für Informatik e.v. (GI)

2 Lecture Notes in Informatics (LNI) -Proceedings Series of the Gesellschaft für Informatik (GI) Volume P-230 ISBN ISSN Volume Editors Arslan Brömme GI BIOSIG, Gesellschaft für Informatik e.v. Ahrstraße 45, D Bonn Christoph Busch Hochschule Darmstadt CASED Haardtring100, D Darmstadt Series Editorial Board Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, Austria (Chairman, Dieter Fellner, Technische Universität Darmstadt, Germany Ulrich Flegel, Hochschule für Technik, Stuttgart, Germany Ulrich Frank, Universität Duisburg-Essen, Germany Johann-Christoph Freytag, Humboldt-Universität zuberlin, Germany Michael Goedicke, Universität Duisburg-Essen, Germany Ralf Hofestädt, Universität Bielefeld, Germany Michael Koch, Universität der Bundeswehr München, Germany Axel Lehmann, Universität der Bundeswehr München, Germany Peter Sanders, Karlsruher Institut für Technologie (KIT), Germany Sigrid Schubert, Universität Siegen, Germany Ingo Timm, Universität Trier,Germany Karin Vosseberg, Hochschule Bremerhaven, Germany Maria Wimmer, Universität Koblenz-Landau, Germany Dissertations Steffen Hölldobler,Technische Universität Dresden, Germany Seminars Reinhard Wilhelm, Universität des Saarlandes, Germany Thematics Andreas Oberweis, Karlsruher Institut für Technologie (KIT), Germany Gesellschaft für Informatik, Bonn 2014 printed by KöllenDruck+Verlag GmbH, Bonn

3 Chairs Message Welcome to the annual international conference of the Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik (GI) e.v. GI BIOSIG was founded in2002 as an experts group for the topics of biometric person identification/authentication and electronic signatures and its applications. Over the last decade the annual conference in strong partnership with the Competence Center for Applied Security Technology (CAST) established a well known forum for biometrics and security professionals from industry, science, representatives of the national governmental bodies and European institutions who are working inthese areas. The BIOSIG 2014 international conference isjointly organized by the Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik e.v., the Competence Center for Applied Security Technology e.v. (CAST), the German Federal Office for InformationSecurity(BSI), the European Association for Biometrics (EAB), the ICT COST Action IC1106, the European Commission Joint Research Centre (JRC), the TeleTrusT Deutschland e.v. (TeleTrusT), the Norwegian Biometrics Laboratory(NBL), the Center for Advanced Security Research Darmstadt (CASED), and the Fraunhofer Institute for Computer Graphics Research (IGD). This years international conference BIOSIG 2014 is technically co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE) and is enriched with satellite workshops by the TeleTrust Biometric WorkingGroup and the European Association for Biometrics. The international program committee accepted full scientific papers strongly according to the LNI guidelines (acceptance rate ~31%) within a scientific double-blinded review process of at minimum five reviews per paper. All papers were formally restricted for the printed proceedings to 12 pages for regular research contributions including an oral presentation and 8 pages for further conference contributions including a poster presentationatthe conference site. Furthermore, the program committee has created aprogram including selected contributions of strong interest (further conference contributions) for the outlined scope of this conference. All paper contributions for BIOSIG 2014 will be published additionally in the IEEE Xplore Digital Library. We would like to thank all authors for their contributions and the numerous reviewers for their work in the program committee. Darmstadt, 10 th September 2014 Arslan Brömme GI BIOSIG, GI e.v. Christoph Busch Hochschule Darmstadt

4 Chairs Arslan Brömme, GI BIOSIG, GI e.v., Bonn, Germany Christoph Busch, Hochschule Darmstadt -CASED, Germany Program Committee Harald Baier (CASED, DE) Oliver Bausinger (BSI, DE) Thiriamchos Bourlai (WVU, US) PatrickBours (GUC, NO) Sebastien Brangoulo (Morpho, FR) Ralph Breithaupt (BSI, DE) Julien Bringer (Morpho, FR) Arslan Brömme(GI/BIOSIG, DE) Christoph Busch (CAST-Forum, DE) Victor-Philipp Busch (Sybuca, DE) Patrizio Campisi (Uni Roma3,IT) Nathan Clarke (CSCAN, UK) Adam Czajka (NASK,PL) Henning Daum (secunet, DE) Nicolas Delvaux (Morpho, FR) Farzin Deravi (UKE, UK) Martin Drahansky(BUT, CZ) Julian Fierrez(UAM, ES) Simone Fischer-Hübner (KAU, SE) Lothar Fritsch (NR, NO) Steven Furnell(CSCAN, UK) SoniaGarcia(TSP, FR) PatrickGrother (NIST, US) Daniel Hartung (Dermalog, DE) Olaf Henniger (Fhg IGD, DE) DetlefHühnlein (ecsec, DE) Heinrich Ihmor (BSI, DE) Christiane Kaplan (softpro,de) Stefan Katzenbeisser (CASED, DE) TomKevenaar (GenKey, NL) ElaineNewton (NIST, US) Mark Nixon (UoS, UK) Alexander Nouak(FhgIGD, DE) Markus Nuppeney(BSI, DE) Hisao Ogata (Hitachi, JP) Martin Olsen (GUC, NO) Javier Ortega-Garcia(UAM, ES) Michael Peirce (Daon, IR) Dijana Petrovska(TSP, FR) AnikaPflug (CASED, DE) IoannisPitas (AUT, GR) Fernando Podio (NIST, US) Reinhard Posch (IAIK, AT) Raghu Ramachandra(GUC, NO) Kai Rannenberg (Uni FFM, DE) Nalini Ratha (IBM, US) Christian Rathgeb (CASED, DE) MarekRejman-Greene (HO, UK) Slobodan Ribaric (FER, HR) Arun Ross (MSU, US) Heiko Roßnagel (FhgIAO, DE) Raul Sanchez-Reillo (UC3M, ES) StephanieSchuckers (ClU, US) Günter Schumacher (JRC, IT) Takashi Shinzaki (Fujitsu, JP) MaxSnijder (EAB, NL) Luis Soares (ISCTE-IUL, PT) Luuk Spreeuwers (UTW, NL) Rainer Stiefelhagen (KIT, DE) Elham Tabassi (NIST, US)

5 Ulrike Korte(BSI, DE) Bernd Kowalski (BSI, DE) Ajay Kumar (Poly, HK) Herbert Leitold (a-sit, AT) GuoqiangLi(GUC, NO) Stan Li (CBSR, CN) Paulo Lobato Correira(IST, PT) Davide Maltoni (UBO,IT) Tony Mansfield (NPL, UK) Tsutomu Matsumoto (YNU, JP) Johannes Merkle (secunet, DE) Didier Meuwly (NFI, NL) Emilio Mordini (CSSC,IT) Axel Munde (BSI, DE) Tieniu Tan (NLPR, CN) CathyTilton (Daon, US) Massimo Tistarelli (UNISS, IT) Carlo Trugenberger (SwissSc, CH) Dimitrios Tzovaras (CfRaT, GR) Andreas Uhl (COSY, AT) Markus Ullmann (BSI, DE) Raymond Veldhuis (UTW, NL) Anne Wang (Cogent, US) JimWayman (SJSU, US) Peter Wild (UoR, UK) Andreas Wolf (BDR, DE) Bian Yang (GUC, NO) XuebingZhou (CASED, DE) Hosts Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik (GI) e.v. Competence Center for Applied Security Technology e.v. (CAST) Bundesamt für Sicherheit inder Informationstechnik(BSI) European Associationfor Biometrics (EAB) European Commission Joint Research Centre (JRC) TeleTrusT Deutschland e.v (TeleTrust) NorwegianBiometrics Laboratory(NBL) Center for Advanced Security Research Darmstadt (CASED) Fraunhofer-Institut für Graphische Datenverarbeitung (IGD)

6

7 BIOSIG 2014 Biometrics SpecialInterest Group 2014 International Conference ofthe Biometrics Special Interest Group 10 th -12 th September 2014 Biometrics provides efficient and reliable solutions to recognize individuals. With increasing number of identity theft and misuse incidents we do observe a significant fraud in e-commerce and thus growing interestsontrustworthiness of person authentication. Nowadays we find biometric applications in areas like border control, national ID cards, e-banking, e-commerce, e-health etc. Large-scale applications such as the European Union Visa Information System (VIS) and Unique Identification (UID) in India require high accuracy and also reliability, interoperability, scalability, system reliability and usability. Manyofthese are joint requirements also for forensic applications. Multimodal biometrics combined with fusion techniques can improve recognition performance. Efficient searching orindexing methods can accelerate identification efficiency. Additionally, quality of captured biometric samples can strongly influence the performance. Moreover, mobile biometrics is an emerging area and biometrics based smartphones can support deployment and acceptance ofbiometric systems. However concerns about security and privacy cannot be neglected. The relevant techniques in the area of presentation attack detection (liveness detection) and template protection are about to supplement biometric systems, in order to improve fake resistance, prevent potential attacks such as cross matching, identitytheft etc. BIOSIG 2014 offers you once again aplatform for international experts discussions on biometrics research and the full range of security applications.

8 Table of Contents BIOSIG 2014 Regular Research Papers.... Marek Tiits, Tarmo Kalvet, Katrin Laas-Mikko Social Acceptance of epassports..... Kiran B.Raja, Raghavendra Ramachandra, Martin Stokkenes, Christoph Busch Smartphone Authentication System Using Periocular Biometrics TeodorsEglitis, Mihails Pudzs, Modris Greitans Bimodal palm biometric feature extraction using a single RGB image 39 Roel Peeters, JensHermans, BartMennink Speedup for European epassport Authentication Jens Hermans, Roel Peeters, BartMennink Shattering the Glass Maze.. Jens Hermans, Bart Mennink, Roel Peeters When abloom FilterisaDoom Filter: Security Assessment ofanovel Iris Biometric Template Protection System.... Anna Mikaelyan, Josef Bigun Symmetry Assessment by Finite Expansion: application to forensic fingerprints.. Christoph Kauba, Jakob Reissig, AndreasUhl Pre-Processing Cascades and Fusion in Finger Vein Recognition... Pedro Tome, MatthiasVanoni, Sébastien Marcel On the Vulnerability of Finger Vein Recognition to Spoofing 111 Fieke Hillerström, Ajay Kumar, Raymond N.J. Veldhuis Generating and Analyzing Synthetic Finger Vein Images Georg M.Penn, Gerhard Pötzelsberger, Martin Rohde, AndreasUhl Customisation ofpaillierhomomorphic Encryption for Efficient Binary Biometric Feature Vector Matching Stefan Billeb, Christian Rathgeb, MichaelBuschbeck, Herbert Reininger, KlausKasper Efficient Two-stage Speaker Identification based on Universal Background Models Federico Alegre, Artur Janicki, NicholasEvans Re-assessing the threat ofreplay spoofingattacks against automatic speaker verification

9 BIOSIG 2014 Further Conference Contributions 169 Matteo Ferrara, Davide Maltoni, Raffaele Cappelli A Two-Factor Protection Scheme for MCC Fingerprint Templates. Meryem Erbilek, Michael Fairhurst, Márjory Da Costa-Abreu Improved age prediction from biometric data using multimodal configurations 179 Luuk J. Spreeuwers, Raymond N.J. Veldhuis, Siar Sultanali, Jasper Diephuis Fixed FAR Vote Fusion of Regional Facial Classifiers Štěpán Mráček,Martin Drahanský, Radim Dvořák, Ivo Provazník, Jan Váňa 3D Face Recognition on Low-Cost Depth Sensors Mohammad Derawi, Iurii Voitenko Fusion of Gait and ECG for Biometric User Authentication Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki A Biometric Key-Binding Scheme Using Lattice Masking.. Naciye Çelenli, Kamile N. Seviş, Muhammed F. Esgin, Kemal Altundağ, Umut Uludağ An unconstrained Activity Recognition Method using Smart Phones... Shigefumi Yamada, Takashi Shinzaki Evaluation of Independence between Multiple Fingerprints for Multibiometrics Julien Bringer, Mélanie Favre, Chloé Pelle, HughesdeSaxcé Fuzzy vault and template-level fusion applied toabinary fingerprint representation Houssemeddine Khemiri, Alexander Usoltsev, Marie-Christine Legout, Dijana Petrovska-Delacrétaz, Gérard Chollet Automatic Speaker Verification using Nearest Neighbor Normalization (3N) on an ipad Tablet.... AndreasLanitis, Nicolas Tsapatsoulis Assessing Facial Age Similarity: AFramework for Evaluating the Robustness of Different Feature Sets Peter Johnson, Stephanie Schuckers Fingerprint Pore Characteristics for Liveness Detection

10

Arslan Brömme, Christoph Busch (Eds.) BIOSIG 2013. Proceedings of the12 th International Conference of thebiometrics SpecialInterest Group

Arslan Brömme, Christoph Busch (Eds.) BIOSIG 2013. Proceedings of the12 th International Conference of thebiometrics SpecialInterest Group Arslan Brömme, Christoph Busch (Eds.) BIOSIG 2013 Proceedings of the12 th International Conference of thebiometrics SpecialInterest Group 04.-06. September 2013 in Darmstadt, Germany Gesellschaft für Informatik

More information

Arslan Brömme, Christoph Busch,DetlefHühnlein ( Eds.) BIOSIG 2008. Proceedings of thespecialinterest Group on Biometricsand ElectronicSignatures

Arslan Brömme, Christoph Busch,DetlefHühnlein ( Eds.) BIOSIG 2008. Proceedings of thespecialinterest Group on Biometricsand ElectronicSignatures Arslan Brömme, Christoph Busch,DetlefHühnlein ( Eds.) BIOSIG 2008 Proceedings of thespecialinterest Group on Biometricsand ElectronicSignatures 11.-12. September 2008 in Darmstadt, Germany Gesellschaft

More information

Enterprise Modelling. and Information Systems Architectures (EMISA 2013)

Enterprise Modelling. and Information Systems Architectures (EMISA 2013) Reinhard Jung, Manfred Reichert (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2013) Fifth International Workshop on Enterprise Modelling and Information Systems Architectures

More information

Enterprise Modelling and Information Systems Architectures

Enterprise Modelling and Information Systems Architectures Jens Kolb, Henrik Leopold, Jan Mendling (Eds.) Enterprise Modelling and Information Systems Architectures Proceedings of the 6th International Workshop on Enterprise Modelling and Information Systems Architectures

More information

Visualization of Large and Unstructured Data Sets

Visualization of Large and Unstructured Data Sets Hans Hagen, Andreas Kerren, Peter Dannenmann (Eds.) Visualization of Large and Unstructured Data Sets First workshop of the DFG s International Research Training Group Visualization of Large and Unstructured

More information

PRIMIUM Process Innovation for Enterprise Software

PRIMIUM Process Innovation for Enterprise Software Armin Heinzl, Peter Dadam, Stefan Kirn, Peter Lockemann (Eds.) PRIMIUM Process Innovation for Enterprise Software 15.04.2009 in Mannheim, Germany Gesellschaft für Informatik e.v. (GI) Lecture Notes in

More information

Enterprise Modelling and Information Systems Architectures (EMISA 2014)

Enterprise Modelling and Information Systems Architectures (EMISA 2014) Fernand Feltz, Bela Mutschler, Benoît Otjacques (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2014) Sixth International Workshop on Enterprise Modelling and Information Systems

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

IT-Incident Management & IT-Forensics

IT-Incident Management & IT-Forensics Oliver Göbel, Dirk Schadt, Sandra Frings, Hardo Hase, Detlef Günther, Jens Nedon (Eds.) IT-Incident Management & IT-Forensics Conference Proceedings October, 18 th 19 th, 2006 Stuttgart, Germany Special

More information

Proceedings. GI-Edition BIOSIG 2013. Lecture Notes in Informatics

Proceedings. GI-Edition BIOSIG 2013. Lecture Notes in Informatics Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

ISO 24745 - Biometric Template Protection

ISO 24745 - Biometric Template Protection ISO 24745 - Biometric Template Protection Hochschule Darmstadt / Gjøvik University College / Fraunhofer IGD IBPC 2010 -Satellite Workshop II NIST March 5, 2010 PET for the Protection of Biometric data

More information

BIOSIG 2012-11th International Conference of the Biometrics Special Interest Group

BIOSIG 2012-11th International Conference of the Biometrics Special Interest Group GI-Edition Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document

More information

Proceedings. GI-Edition. 12 th International Conference on Innovative Internet Community Systems (I 2 CS 2012) Lecture Notes in Informatics

Proceedings. GI-Edition. 12 th International Conference on Innovative Internet Community Systems (I 2 CS 2012) Lecture Notes in Informatics Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences

More information

Innovative Internet Community Services (I CS 2011)

Innovative Internet Community Services (I CS 2011) Gerald Eichler, Axel Küpper, Volkmar Schau, Hacène Fouchal, Herwig Unger (Eds.) 11 th International Conference on 2 Innovative Internet Community Services (I CS 2011) June 15-17, 2011 Deutsche Telekom

More information

A Comparative Study on ATM Security with Multimodal Biometric System

A Comparative Study on ATM Security with Multimodal Biometric System A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor

More information

Spoof Detection and the Common Criteria

Spoof Detection and the Common Criteria Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

How To Write A Paper On The Social Semantic Web

How To Write A Paper On The Social Semantic Web Sören Auer, Christian Bizer, Claudia Müller, Anna V. Zhdanova (Eds.) The Social Semantic Web 2007 Proceedings of the 1 st Conference on Social Semantic Web (CSSW) September 26-28, Leipzig, Germany Gesellschaft

More information

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security , pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,

More information

Best Practice Fingerprint Enrolment Standards European Visa Information System

Best Practice Fingerprint Enrolment Standards European Visa Information System Best Practice Fingerprint Enrolment Standards European Visa Information System Improving performance by improving fingerprint image quality Experiences from pilot project BioDEVII 1 Agenda BioDEVII Phase

More information

"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES

LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES "LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

Discriminative Multimodal Biometric. Authentication Based on Quality Measures

Discriminative Multimodal Biometric. Authentication Based on Quality Measures Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,

More information

Enterprise Modelling and Information Systems Architectures (EMISA 2011)

Enterprise Modelling and Information Systems Architectures (EMISA 2011) Markus Nüttgens, Oliver Thomas, Barbara Weber (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2011) Hamburg, Germany September 22-23, 2011 Gesellschaft für Informatik e.v. (GI)

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

18th IEEE Conference on Business Informatics Call for Papers

18th IEEE Conference on Business Informatics Call for Papers 18th IEEE Conference on Business Informatics Call for Papers Paris, France, 29 th August 1 st September 2016 http://cbi2016.cnam.fr/ Important Dates Mandatory abstract submission: April 26, 2016 (extended)

More information

MareikeSchoop,Aldo de Moor, JanDietz (eds.) PragWeb 2006. Proceedings of the FirstInternationalConference on the PragmaticWeb

MareikeSchoop,Aldo de Moor, JanDietz (eds.) PragWeb 2006. Proceedings of the FirstInternationalConference on the PragmaticWeb MareikeSchoop,Aldo de Moor, JanDietz (eds.) PragWeb 2006 Proceedings of the FirstInternationalConference on the PragmaticWeb 21-23 September 2006 Stuttgart, Germany Gesellschaft für Informatik 2006 Lecture

More information

Testing of Component-Based Systems and Software Quality

Testing of Component-Based Systems and Software Quality Sami Beydeda, Volker Gruhn, Johannes Mayer, Ralf Reussner, Franz Schweiggert (Hrsg.) Testing of Component-Based Systems and Software Quality Net.ObjectDays Workshops on Testing of Component- Based Systems

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

BiSPI Conformance Testing

BiSPI Conformance Testing Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To

More information

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity

More information

Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/

Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain 25-11-2013 to 26-11-2013 Gjøvik University College

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik

More information

SECURITY BIOMETRICS PDF

SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF

More information

Extending EMV payment smart cards with biometric on-card verification

Extending EMV payment smart cards with biometric on-card verification Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,

More information

Lecture Notes in Computer Science 3161

Lecture Notes in Computer Science 3161 Lecture Notes in Computer Science 3161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Qualified mobile electronic signatures: Possible, but worth a try?

Qualified mobile electronic signatures: Possible, but worth a try? Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)

More information

Safety Management in Nuclear Technology

Safety Management in Nuclear Technology Safety Management in Nuclear Technology Symposium October 16 17, 2014, Munich, Germany TÜV SÜD Akademie GmbH TÜV SÜD Industrie Service GmbH The Symposium is intended for specialists and managers at Nuclear

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Security and Privacy Challenges of Biometric Authentication for Online Transactions

Security and Privacy Challenges of Biometric Authentication for Online Transactions Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Security Audit VIS Central System. Summary Report

Security Audit VIS Central System. Summary Report Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

More information

Very large scale systems

Very large scale systems Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large

More information

Proceedings. GI-Edition. BIOSIG 2011 Biometrics and Electronic Signatures. Lecture Notes in Informatics

Proceedings. GI-Edition. BIOSIG 2011 Biometrics and Electronic Signatures. Lecture Notes in Informatics GI-Edition publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences that are organized

More information

Vorbesprechung am 17.10.2013, 15:20-17:00 Uhr

Vorbesprechung am 17.10.2013, 15:20-17:00 Uhr Programmierung eines graphischen Systems Fortgeschrittene Programmierung eines graphischen Systems Prof. Fellner, Prof. Goesele, Priv.-Doz. Kuijper, Hon.-Prof. Sakas, Hon.-Prof. Stork, Dr. von Landesberger

More information

Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.

Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. Vibha Kaw Raina. Department of Computer Sciences Birla Institute of Technology, Extension

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany.

Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany. Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany. He received engineering degrees from Erlangen University in Electrical Engineering (1980) and in Mathematics (1982). In 1989 he obtained

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

Empowerment of Health Professionals: How High Level Security Education Can Raise Awareness and Confidence

Empowerment of Health Professionals: How High Level Security Education Can Raise Awareness and Confidence ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 673 Empowerment of Health Professionals: How High Level Security

More information

9 th European Pressure Equipment Conference. Symposium, June 8 9, 2011, Fürstenfeldbruck (near Munich), Germany

9 th European Pressure Equipment Conference. Symposium, June 8 9, 2011, Fürstenfeldbruck (near Munich), Germany International Conferences 9 th European Pressure Equipment Conference Symposium, June 8 9, 2011, Fürstenfeldbruck (near Munich), Germany TÜV SÜD Industrie Service GmbH TÜV SÜD Akademie GmbH The conference

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

IT-Security All safe and sound?

IT-Security All safe and sound? IT-Security All safe and sound? The building blocks for secure E-Government Dr. Vienna, 20.10.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU

More information

Biometrics for payments. The use of biometrics in banking

Biometrics for payments. The use of biometrics in banking Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,

More information

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and

More information

Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering

Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering IRTG 1131 Workshop, March 19 21, 2010, Bodega Bay, U.S. Edited by Ariane Middel Inga Scheler

More information

Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany

Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face

More information

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed

More information

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),

More information

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria

More information

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India

More information

Keep Out of My Passport: Access Control Mechanisms in E-passports

Keep Out of My Passport: Access Control Mechanisms in E-passports Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

NIST Patriot Act Biometric Testing. C. L. Wilson Image Group IAD-ITL

NIST Patriot Act Biometric Testing. C. L. Wilson Image Group IAD-ITL NIST Patriot Act Biometric Testing C. L. Wilson Image Group IAD-ITL Outline Statutory Mandates Biometrics Testing is Scale Dependent Fingerprint Vendor Technology Evaluation (FpVTE) Testing Fingerprint

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Security of Biometric Authentication Systems Parvathi Ambalakat

Security of Biometric Authentication Systems Parvathi Ambalakat Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming

More information

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

Open Source Reference Systems for Biometric Verification of Identity

Open Source Reference Systems for Biometric Verification of Identity Open Source Reference Systems for Biometric Verification of Identity Aurélien Mayoue and Dijana Petrovska-Delacrétaz TELECOM & Management SudParis, 9 rue Charles Fourier, 91011 Evry Cedex, France Abstract.

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

A Note on the Security in the Card Management System of the German E-Health Card

A Note on the Security in the Card Management System of the German E-Health Card A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century

More information

Citizen s perceptions on digital identity

Citizen s perceptions on digital identity Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are

More information

RFID Guardian Back-end Security Protocol

RFID Guardian Back-end Security Protocol Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Securing Electronic Medical Records Using Biometric Authentication

Securing Electronic Medical Records Using Biometric Authentication Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring

More information

New Scholarships 2005 - New Scholarships 2005

New Scholarships 2005 - New Scholarships 2005 New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich

More information

Keywords: German electronic ID card, e-government and e-business applications, identity management

Keywords: German electronic ID card, e-government and e-business applications, identity management From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Fake Fingers and Stolen Templates: Topics in Biometric Security

Fake Fingers and Stolen Templates: Topics in Biometric Security Fake Fingers and Stolen Templates: Topics in Biometric Security Dr. Stephanie Schuckers, Clarkson University Director, Center for Identification Technology Research Presented March 2014 1 Center for Identification

More information

German Conference on Bioinformatics 2004

German Conference on Bioinformatics 2004 Robert Giegerich, Jens Stoye (eds.) German Conference on Bioinformatics 2004 GCB 2004 October 4-6, 2004, Bielefeld, Germany Gesellschaft für Informatik 2004 Lecture Notes in Informatics (LNI) - Proceedings

More information

Review of Environmental Informatics Education in Germany and selected European Universities 2

Review of Environmental Informatics Education in Germany and selected European Universities 2 EnviroInfo 2009 (Berlin) Environmental Informatics and Industrial Environmental Protection: Concepts, Methods and Tools Review of Environmental Informatics Education in Germany and selected European Universities

More information

Information Systems Technology and its Applications

Information Systems Technology and its Applications Anatoly Doroshenko, Terry Halpin, Stephen Liddle, Heinrich C. Mayr (eds.) Information Systems Technology and its Applications 3 rd International Conference ISTA 2004 July 15-17, 2004, Salt Lake City, Utah

More information

Enhanced Biometric Authentication System for Efficient and Reliable e-payment System in Nigeria

Enhanced Biometric Authentication System for Efficient and Reliable e-payment System in Nigeria Enhanced Biometric Authentication System for Efficient and Reliable e-payment System in Nigeria F.O. Aranuwa Department of Computer Science, Adekunle Ajasin University, Akungba Akoko, Ondo State,Nigeria

More information