Arslan Brömme,Christoph Busch (Eds.) BIOSIG Proceedingsofthe 13 th International Conference of the Biometrics Special Interest Group
|
|
- Felix Kristopher Cummings
- 8 years ago
- Views:
Transcription
1 Arslan Brömme,Christoph Busch (Eds.) BIOSIG 2014 Proceedingsofthe 13 th International Conference of the Biometrics Special Interest Group September 2014 in Darmstadt, Germany Gesellschaft für Informatik e.v. (GI)
2 Lecture Notes in Informatics (LNI) -Proceedings Series of the Gesellschaft für Informatik (GI) Volume P-230 ISBN ISSN Volume Editors Arslan Brömme GI BIOSIG, Gesellschaft für Informatik e.v. Ahrstraße 45, D Bonn Christoph Busch Hochschule Darmstadt CASED Haardtring100, D Darmstadt Series Editorial Board Heinrich C. Mayr, Alpen-Adria-Universität Klagenfurt, Austria (Chairman, Dieter Fellner, Technische Universität Darmstadt, Germany Ulrich Flegel, Hochschule für Technik, Stuttgart, Germany Ulrich Frank, Universität Duisburg-Essen, Germany Johann-Christoph Freytag, Humboldt-Universität zuberlin, Germany Michael Goedicke, Universität Duisburg-Essen, Germany Ralf Hofestädt, Universität Bielefeld, Germany Michael Koch, Universität der Bundeswehr München, Germany Axel Lehmann, Universität der Bundeswehr München, Germany Peter Sanders, Karlsruher Institut für Technologie (KIT), Germany Sigrid Schubert, Universität Siegen, Germany Ingo Timm, Universität Trier,Germany Karin Vosseberg, Hochschule Bremerhaven, Germany Maria Wimmer, Universität Koblenz-Landau, Germany Dissertations Steffen Hölldobler,Technische Universität Dresden, Germany Seminars Reinhard Wilhelm, Universität des Saarlandes, Germany Thematics Andreas Oberweis, Karlsruher Institut für Technologie (KIT), Germany Gesellschaft für Informatik, Bonn 2014 printed by KöllenDruck+Verlag GmbH, Bonn
3 Chairs Message Welcome to the annual international conference of the Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik (GI) e.v. GI BIOSIG was founded in2002 as an experts group for the topics of biometric person identification/authentication and electronic signatures and its applications. Over the last decade the annual conference in strong partnership with the Competence Center for Applied Security Technology (CAST) established a well known forum for biometrics and security professionals from industry, science, representatives of the national governmental bodies and European institutions who are working inthese areas. The BIOSIG 2014 international conference isjointly organized by the Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik e.v., the Competence Center for Applied Security Technology e.v. (CAST), the German Federal Office for InformationSecurity(BSI), the European Association for Biometrics (EAB), the ICT COST Action IC1106, the European Commission Joint Research Centre (JRC), the TeleTrusT Deutschland e.v. (TeleTrusT), the Norwegian Biometrics Laboratory(NBL), the Center for Advanced Security Research Darmstadt (CASED), and the Fraunhofer Institute for Computer Graphics Research (IGD). This years international conference BIOSIG 2014 is technically co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE) and is enriched with satellite workshops by the TeleTrust Biometric WorkingGroup and the European Association for Biometrics. The international program committee accepted full scientific papers strongly according to the LNI guidelines (acceptance rate ~31%) within a scientific double-blinded review process of at minimum five reviews per paper. All papers were formally restricted for the printed proceedings to 12 pages for regular research contributions including an oral presentation and 8 pages for further conference contributions including a poster presentationatthe conference site. Furthermore, the program committee has created aprogram including selected contributions of strong interest (further conference contributions) for the outlined scope of this conference. All paper contributions for BIOSIG 2014 will be published additionally in the IEEE Xplore Digital Library. We would like to thank all authors for their contributions and the numerous reviewers for their work in the program committee. Darmstadt, 10 th September 2014 Arslan Brömme GI BIOSIG, GI e.v. Christoph Busch Hochschule Darmstadt
4 Chairs Arslan Brömme, GI BIOSIG, GI e.v., Bonn, Germany Christoph Busch, Hochschule Darmstadt -CASED, Germany Program Committee Harald Baier (CASED, DE) Oliver Bausinger (BSI, DE) Thiriamchos Bourlai (WVU, US) PatrickBours (GUC, NO) Sebastien Brangoulo (Morpho, FR) Ralph Breithaupt (BSI, DE) Julien Bringer (Morpho, FR) Arslan Brömme(GI/BIOSIG, DE) Christoph Busch (CAST-Forum, DE) Victor-Philipp Busch (Sybuca, DE) Patrizio Campisi (Uni Roma3,IT) Nathan Clarke (CSCAN, UK) Adam Czajka (NASK,PL) Henning Daum (secunet, DE) Nicolas Delvaux (Morpho, FR) Farzin Deravi (UKE, UK) Martin Drahansky(BUT, CZ) Julian Fierrez(UAM, ES) Simone Fischer-Hübner (KAU, SE) Lothar Fritsch (NR, NO) Steven Furnell(CSCAN, UK) SoniaGarcia(TSP, FR) PatrickGrother (NIST, US) Daniel Hartung (Dermalog, DE) Olaf Henniger (Fhg IGD, DE) DetlefHühnlein (ecsec, DE) Heinrich Ihmor (BSI, DE) Christiane Kaplan (softpro,de) Stefan Katzenbeisser (CASED, DE) TomKevenaar (GenKey, NL) ElaineNewton (NIST, US) Mark Nixon (UoS, UK) Alexander Nouak(FhgIGD, DE) Markus Nuppeney(BSI, DE) Hisao Ogata (Hitachi, JP) Martin Olsen (GUC, NO) Javier Ortega-Garcia(UAM, ES) Michael Peirce (Daon, IR) Dijana Petrovska(TSP, FR) AnikaPflug (CASED, DE) IoannisPitas (AUT, GR) Fernando Podio (NIST, US) Reinhard Posch (IAIK, AT) Raghu Ramachandra(GUC, NO) Kai Rannenberg (Uni FFM, DE) Nalini Ratha (IBM, US) Christian Rathgeb (CASED, DE) MarekRejman-Greene (HO, UK) Slobodan Ribaric (FER, HR) Arun Ross (MSU, US) Heiko Roßnagel (FhgIAO, DE) Raul Sanchez-Reillo (UC3M, ES) StephanieSchuckers (ClU, US) Günter Schumacher (JRC, IT) Takashi Shinzaki (Fujitsu, JP) MaxSnijder (EAB, NL) Luis Soares (ISCTE-IUL, PT) Luuk Spreeuwers (UTW, NL) Rainer Stiefelhagen (KIT, DE) Elham Tabassi (NIST, US)
5 Ulrike Korte(BSI, DE) Bernd Kowalski (BSI, DE) Ajay Kumar (Poly, HK) Herbert Leitold (a-sit, AT) GuoqiangLi(GUC, NO) Stan Li (CBSR, CN) Paulo Lobato Correira(IST, PT) Davide Maltoni (UBO,IT) Tony Mansfield (NPL, UK) Tsutomu Matsumoto (YNU, JP) Johannes Merkle (secunet, DE) Didier Meuwly (NFI, NL) Emilio Mordini (CSSC,IT) Axel Munde (BSI, DE) Tieniu Tan (NLPR, CN) CathyTilton (Daon, US) Massimo Tistarelli (UNISS, IT) Carlo Trugenberger (SwissSc, CH) Dimitrios Tzovaras (CfRaT, GR) Andreas Uhl (COSY, AT) Markus Ullmann (BSI, DE) Raymond Veldhuis (UTW, NL) Anne Wang (Cogent, US) JimWayman (SJSU, US) Peter Wild (UoR, UK) Andreas Wolf (BDR, DE) Bian Yang (GUC, NO) XuebingZhou (CASED, DE) Hosts Biometrics Special Interest Group (BIOSIG) of the Gesellschaft für Informatik (GI) e.v. Competence Center for Applied Security Technology e.v. (CAST) Bundesamt für Sicherheit inder Informationstechnik(BSI) European Associationfor Biometrics (EAB) European Commission Joint Research Centre (JRC) TeleTrusT Deutschland e.v (TeleTrust) NorwegianBiometrics Laboratory(NBL) Center for Advanced Security Research Darmstadt (CASED) Fraunhofer-Institut für Graphische Datenverarbeitung (IGD)
6
7 BIOSIG 2014 Biometrics SpecialInterest Group 2014 International Conference ofthe Biometrics Special Interest Group 10 th -12 th September 2014 Biometrics provides efficient and reliable solutions to recognize individuals. With increasing number of identity theft and misuse incidents we do observe a significant fraud in e-commerce and thus growing interestsontrustworthiness of person authentication. Nowadays we find biometric applications in areas like border control, national ID cards, e-banking, e-commerce, e-health etc. Large-scale applications such as the European Union Visa Information System (VIS) and Unique Identification (UID) in India require high accuracy and also reliability, interoperability, scalability, system reliability and usability. Manyofthese are joint requirements also for forensic applications. Multimodal biometrics combined with fusion techniques can improve recognition performance. Efficient searching orindexing methods can accelerate identification efficiency. Additionally, quality of captured biometric samples can strongly influence the performance. Moreover, mobile biometrics is an emerging area and biometrics based smartphones can support deployment and acceptance ofbiometric systems. However concerns about security and privacy cannot be neglected. The relevant techniques in the area of presentation attack detection (liveness detection) and template protection are about to supplement biometric systems, in order to improve fake resistance, prevent potential attacks such as cross matching, identitytheft etc. BIOSIG 2014 offers you once again aplatform for international experts discussions on biometrics research and the full range of security applications.
8 Table of Contents BIOSIG 2014 Regular Research Papers.... Marek Tiits, Tarmo Kalvet, Katrin Laas-Mikko Social Acceptance of epassports..... Kiran B.Raja, Raghavendra Ramachandra, Martin Stokkenes, Christoph Busch Smartphone Authentication System Using Periocular Biometrics TeodorsEglitis, Mihails Pudzs, Modris Greitans Bimodal palm biometric feature extraction using a single RGB image 39 Roel Peeters, JensHermans, BartMennink Speedup for European epassport Authentication Jens Hermans, Roel Peeters, BartMennink Shattering the Glass Maze.. Jens Hermans, Bart Mennink, Roel Peeters When abloom FilterisaDoom Filter: Security Assessment ofanovel Iris Biometric Template Protection System.... Anna Mikaelyan, Josef Bigun Symmetry Assessment by Finite Expansion: application to forensic fingerprints.. Christoph Kauba, Jakob Reissig, AndreasUhl Pre-Processing Cascades and Fusion in Finger Vein Recognition... Pedro Tome, MatthiasVanoni, Sébastien Marcel On the Vulnerability of Finger Vein Recognition to Spoofing 111 Fieke Hillerström, Ajay Kumar, Raymond N.J. Veldhuis Generating and Analyzing Synthetic Finger Vein Images Georg M.Penn, Gerhard Pötzelsberger, Martin Rohde, AndreasUhl Customisation ofpaillierhomomorphic Encryption for Efficient Binary Biometric Feature Vector Matching Stefan Billeb, Christian Rathgeb, MichaelBuschbeck, Herbert Reininger, KlausKasper Efficient Two-stage Speaker Identification based on Universal Background Models Federico Alegre, Artur Janicki, NicholasEvans Re-assessing the threat ofreplay spoofingattacks against automatic speaker verification
9 BIOSIG 2014 Further Conference Contributions 169 Matteo Ferrara, Davide Maltoni, Raffaele Cappelli A Two-Factor Protection Scheme for MCC Fingerprint Templates. Meryem Erbilek, Michael Fairhurst, Márjory Da Costa-Abreu Improved age prediction from biometric data using multimodal configurations 179 Luuk J. Spreeuwers, Raymond N.J. Veldhuis, Siar Sultanali, Jasper Diephuis Fixed FAR Vote Fusion of Regional Facial Classifiers Štěpán Mráček,Martin Drahanský, Radim Dvořák, Ivo Provazník, Jan Váňa 3D Face Recognition on Low-Cost Depth Sensors Mohammad Derawi, Iurii Voitenko Fusion of Gait and ECG for Biometric User Authentication Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki A Biometric Key-Binding Scheme Using Lattice Masking.. Naciye Çelenli, Kamile N. Seviş, Muhammed F. Esgin, Kemal Altundağ, Umut Uludağ An unconstrained Activity Recognition Method using Smart Phones... Shigefumi Yamada, Takashi Shinzaki Evaluation of Independence between Multiple Fingerprints for Multibiometrics Julien Bringer, Mélanie Favre, Chloé Pelle, HughesdeSaxcé Fuzzy vault and template-level fusion applied toabinary fingerprint representation Houssemeddine Khemiri, Alexander Usoltsev, Marie-Christine Legout, Dijana Petrovska-Delacrétaz, Gérard Chollet Automatic Speaker Verification using Nearest Neighbor Normalization (3N) on an ipad Tablet.... AndreasLanitis, Nicolas Tsapatsoulis Assessing Facial Age Similarity: AFramework for Evaluating the Robustness of Different Feature Sets Peter Johnson, Stephanie Schuckers Fingerprint Pore Characteristics for Liveness Detection
10
Arslan Brömme, Christoph Busch (Eds.) BIOSIG 2013. Proceedings of the12 th International Conference of thebiometrics SpecialInterest Group
Arslan Brömme, Christoph Busch (Eds.) BIOSIG 2013 Proceedings of the12 th International Conference of thebiometrics SpecialInterest Group 04.-06. September 2013 in Darmstadt, Germany Gesellschaft für Informatik
More informationArslan Brömme, Christoph Busch,DetlefHühnlein ( Eds.) BIOSIG 2008. Proceedings of thespecialinterest Group on Biometricsand ElectronicSignatures
Arslan Brömme, Christoph Busch,DetlefHühnlein ( Eds.) BIOSIG 2008 Proceedings of thespecialinterest Group on Biometricsand ElectronicSignatures 11.-12. September 2008 in Darmstadt, Germany Gesellschaft
More informationEnterprise Modelling. and Information Systems Architectures (EMISA 2013)
Reinhard Jung, Manfred Reichert (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2013) Fifth International Workshop on Enterprise Modelling and Information Systems Architectures
More informationEnterprise Modelling and Information Systems Architectures
Jens Kolb, Henrik Leopold, Jan Mendling (Eds.) Enterprise Modelling and Information Systems Architectures Proceedings of the 6th International Workshop on Enterprise Modelling and Information Systems Architectures
More informationVisualization of Large and Unstructured Data Sets
Hans Hagen, Andreas Kerren, Peter Dannenmann (Eds.) Visualization of Large and Unstructured Data Sets First workshop of the DFG s International Research Training Group Visualization of Large and Unstructured
More informationPRIMIUM Process Innovation for Enterprise Software
Armin Heinzl, Peter Dadam, Stefan Kirn, Peter Lockemann (Eds.) PRIMIUM Process Innovation for Enterprise Software 15.04.2009 in Mannheim, Germany Gesellschaft für Informatik e.v. (GI) Lecture Notes in
More informationEnterprise Modelling and Information Systems Architectures (EMISA 2014)
Fernand Feltz, Bela Mutschler, Benoît Otjacques (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2014) Sixth International Workshop on Enterprise Modelling and Information Systems
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationIT-Incident Management & IT-Forensics
Oliver Göbel, Dirk Schadt, Sandra Frings, Hardo Hase, Detlef Günther, Jens Nedon (Eds.) IT-Incident Management & IT-Forensics Conference Proceedings October, 18 th 19 th, 2006 Stuttgart, Germany Special
More informationProceedings. GI-Edition BIOSIG 2013. Lecture Notes in Informatics
Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationISO 24745 - Biometric Template Protection
ISO 24745 - Biometric Template Protection Hochschule Darmstadt / Gjøvik University College / Fraunhofer IGD IBPC 2010 -Satellite Workshop II NIST March 5, 2010 PET for the Protection of Biometric data
More informationBIOSIG 2012-11th International Conference of the Biometrics Special Interest Group
GI-Edition Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document
More informationProceedings. GI-Edition. 12 th International Conference on Innovative Internet Community Systems (I 2 CS 2012) Lecture Notes in Informatics
Gesellschaft für Informatik e.v. (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences
More informationInnovative Internet Community Services (I CS 2011)
Gerald Eichler, Axel Küpper, Volkmar Schau, Hacène Fouchal, Herwig Unger (Eds.) 11 th International Conference on 2 Innovative Internet Community Services (I CS 2011) June 15-17, 2011 Deutsche Telekom
More informationA Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor
More informationSpoof Detection and the Common Criteria
Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationHow To Write A Paper On The Social Semantic Web
Sören Auer, Christian Bizer, Claudia Müller, Anna V. Zhdanova (Eds.) The Social Semantic Web 2007 Proceedings of the 1 st Conference on Social Semantic Web (CSSW) September 26-28, Leipzig, Germany Gesellschaft
More informationAnalysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
More informationBest Practice Fingerprint Enrolment Standards European Visa Information System
Best Practice Fingerprint Enrolment Standards European Visa Information System Improving performance by improving fingerprint image quality Experiences from pilot project BioDEVII 1 Agenda BioDEVII Phase
More information"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center
More informationBiometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
More informationDiscriminative Multimodal Biometric. Authentication Based on Quality Measures
Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,
More informationEnterprise Modelling and Information Systems Architectures (EMISA 2011)
Markus Nüttgens, Oliver Thomas, Barbara Weber (Eds.) Enterprise Modelling and Information Systems Architectures (EMISA 2011) Hamburg, Germany September 22-23, 2011 Gesellschaft für Informatik e.v. (GI)
More informationMegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More information18th IEEE Conference on Business Informatics Call for Papers
18th IEEE Conference on Business Informatics Call for Papers Paris, France, 29 th August 1 st September 2016 http://cbi2016.cnam.fr/ Important Dates Mandatory abstract submission: April 26, 2016 (extended)
More informationMareikeSchoop,Aldo de Moor, JanDietz (eds.) PragWeb 2006. Proceedings of the FirstInternationalConference on the PragmaticWeb
MareikeSchoop,Aldo de Moor, JanDietz (eds.) PragWeb 2006 Proceedings of the FirstInternationalConference on the PragmaticWeb 21-23 September 2006 Stuttgart, Germany Gesellschaft für Informatik 2006 Lecture
More informationTesting of Component-Based Systems and Software Quality
Sami Beydeda, Volker Gruhn, Johannes Mayer, Ralf Reussner, Franz Schweiggert (Hrsg.) Testing of Component-Based Systems and Software Quality Net.ObjectDays Workshops on Testing of Component- Based Systems
More informationBiometrics for public sector applications
Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationBiSPI Conformance Testing
Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationsmart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To
More informationMOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
More informationBiometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity
More informationŞule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/
Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain 25-11-2013 to 26-11-2013 Gjøvik University College
More informationConformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
More informationSECURITY BIOMETRICS PDF
SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF
More informationExtending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
More informationLecture Notes in Computer Science 3161
Lecture Notes in Computer Science 3161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
More informationOpinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationQualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
More informationSafety Management in Nuclear Technology
Safety Management in Nuclear Technology Symposium October 16 17, 2014, Munich, Germany TÜV SÜD Akademie GmbH TÜV SÜD Industrie Service GmbH The Symposium is intended for specialists and managers at Nuclear
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecurity and Privacy Challenges of Biometric Authentication for Online Transactions
Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationSecurity Audit VIS Central System. Summary Report
Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among
More informationVery large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
More informationProceedings. GI-Edition. BIOSIG 2011 Biometrics and Electronic Signatures. Lecture Notes in Informatics
GI-Edition publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences that are organized
More informationVorbesprechung am 17.10.2013, 15:20-17:00 Uhr
Programmierung eines graphischen Systems Fortgeschrittene Programmierung eines graphischen Systems Prof. Fellner, Prof. Goesele, Priv.-Doz. Kuijper, Hon.-Prof. Sakas, Hon.-Prof. Stork, Dr. von Landesberger
More informationIntegration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.
Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. Vibha Kaw Raina. Department of Computer Sciences Birla Institute of Technology, Extension
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationKarlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany.
Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany. He received engineering degrees from Erlangen University in Electrical Engineering (1980) and in Mathematics (1982). In 1989 he obtained
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationEmpowerment of Health Professionals: How High Level Security Education Can Raise Awareness and Confidence
ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 673 Empowerment of Health Professionals: How High Level Security
More information9 th European Pressure Equipment Conference. Symposium, June 8 9, 2011, Fürstenfeldbruck (near Munich), Germany
International Conferences 9 th European Pressure Equipment Conference Symposium, June 8 9, 2011, Fürstenfeldbruck (near Munich), Germany TÜV SÜD Industrie Service GmbH TÜV SÜD Akademie GmbH The conference
More informationDevelopment of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
More informationApplication-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationA Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
More informationIT-Security All safe and sound?
IT-Security All safe and sound? The building blocks for secure E-Government Dr. Vienna, 20.10.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More informationDevelopment of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and
More informationVisualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering
Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering IRTG 1131 Workshop, March 19 21, 2010, Bodega Bay, U.S. Edited by Ariane Middel Inga Scheler
More informationAdvances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
More informationSOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed
More informationDESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
More informationTwo-Factor Biometric Recognition with Integrated Tamper-protection Watermarking
Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria
More informationBIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
More informationKeep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationNIST Patriot Act Biometric Testing. C. L. Wilson Image Group IAD-ITL
NIST Patriot Act Biometric Testing C. L. Wilson Image Group IAD-ITL Outline Statutory Mandates Biometrics Testing is Scale Dependent Fingerprint Vendor Technology Evaluation (FpVTE) Testing Fingerprint
More informationKEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
More informationSecurity of Biometric Authentication Systems Parvathi Ambalakat
Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming
More informationAn Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com
More informationOpen Source Reference Systems for Biometric Verification of Identity
Open Source Reference Systems for Biometric Verification of Identity Aurélien Mayoue and Dijana Petrovska-Delacrétaz TELECOM & Management SudParis, 9 rue Charles Fourier, 91011 Evry Cedex, France Abstract.
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century
More informationCitizen s perceptions on digital identity
Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are
More informationRFID Guardian Back-end Security Protocol
Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationSecuring Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
More informationNew Scholarships 2005 - New Scholarships 2005
New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich
More informationKeywords: German electronic ID card, e-government and e-business applications, identity management
From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
More informationFake Fingers and Stolen Templates: Topics in Biometric Security
Fake Fingers and Stolen Templates: Topics in Biometric Security Dr. Stephanie Schuckers, Clarkson University Director, Center for Identification Technology Research Presented March 2014 1 Center for Identification
More informationGerman Conference on Bioinformatics 2004
Robert Giegerich, Jens Stoye (eds.) German Conference on Bioinformatics 2004 GCB 2004 October 4-6, 2004, Bielefeld, Germany Gesellschaft für Informatik 2004 Lecture Notes in Informatics (LNI) - Proceedings
More informationReview of Environmental Informatics Education in Germany and selected European Universities 2
EnviroInfo 2009 (Berlin) Environmental Informatics and Industrial Environmental Protection: Concepts, Methods and Tools Review of Environmental Informatics Education in Germany and selected European Universities
More informationInformation Systems Technology and its Applications
Anatoly Doroshenko, Terry Halpin, Stephen Liddle, Heinrich C. Mayr (eds.) Information Systems Technology and its Applications 3 rd International Conference ISTA 2004 July 15-17, 2004, Salt Lake City, Utah
More informationEnhanced Biometric Authentication System for Efficient and Reliable e-payment System in Nigeria
Enhanced Biometric Authentication System for Efficient and Reliable e-payment System in Nigeria F.O. Aranuwa Department of Computer Science, Adekunle Ajasin University, Akungba Akoko, Ondo State,Nigeria
More information