Smart Signature. Gesture Based Authentication using a Smart Ring. Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan
|
|
|
- Clinton Chandler
- 10 years ago
- Views:
Transcription
1 SmartSignature Gesture Based Authentication using a Smart Ring Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan CS 244, Fall 2015 Acknowledgement: Nod Labs, for providing smart ring.
2 The Problem Problem: Authenticate a user using only sensor data generated by gestures performed while wearing smart ring. Why? Replace (or augment) written signatures by giving immediate feedback on authenticity. Diagram of our Proof of Concept:
3 Goals Speed, to avoid user frustration. Security: signature data not leaked to third party. Correctness / Unforgeability: a real signer has a high probability of being allowed access, while an adversary has a low probability of gaining access. No gesture vocabulary": user can use any gesture as a signature, as long as they are able to reproduce it consistently. Plane independence: user can sign on any plane (i.e., a surface or the air), as long as they do multi-plane samples in the training phase.
4 Hardware/Software Decisions Smart ring: Nod ring from Nod Labs Client: Mac OS Application, adapted from Nod Labs OpenSpatial code Server: Laptop Communication: Bluetooth Low Energy (Ring Client App) HTTPS (Client App Server) Authentication algorithm: Dynamic Time Warping
5 Data Format We capture accelerometer and gyroscope data from the ring that looks like this: Accel. X Accel. Y Accel. Z Gyro. X Gyro Y Gyro Z Sampling rate: 100 samples / second Challenge: How to determine how similar one sample is to another?
6 Key Features of Dynamic Time Warping (DTW) DTW collapses two time series (of possibly different lengths) into a single distance value that represents the difference between the two time series. DTW is a dynamic programming algorithm that warps" two time series on different scales to be on the same scale, and measures the level of distortion required to complete this warping. It solves the problem that the same gesture could be performed at different speeds in a non-linear fashion.
7 Our implementation of DTW Language: C++ Measure of distance: The distance between vectors (x 1, x 2,..., x 6 ) and (y 1, y 2,..., y 6 ) is: d = 6 (x i y i ) 2. i=1 Normalization: Data is normalized to be between 0 and 1 to offset normal variations in size and position. Asymptotic Running Time: O(m 2 ) where m is the length of the longer sample.
8 How we are using DTW: Training Phase Client collects user ID and n samples of same motion from signer and sends to server. Server creates array D of pairwise DTW distances. Server calculates a threshold t = average(d) + τ standard_deviation(d), where τ is a constant tolerance value. Server associates the threshold t, and the n reference samples, with the given user ID. Running time is in O(m 2 n 2 ), where m is the maximum sample length, and n is the number of samples.
9 How we are using DTW: Authentication Phase Signer gives user ID and does a gesture while wearing ring. Client collects data and sends the the test sample to server. Server grabs threshold and reference samples for given user ID. Server runs DTW on the test sample against every reference sample, and finds the minimum distance d. If d t, server sends a success signal to the client. Otherwise, server sends a failure signal. Running time is in O(m 2 n), where m is the maximum sample length, and n is the number of reference samples.
10 Initial Results are Promising Gesture tested: Signer s Initials # of signers tested: 2 # reference samples per signer: 20 # of trials (correct) per signer: 10 # of trials (forgery) per signer*: 10 Tolerace formula**: avg(d) std_dev(d) Success rate (correct) : 18/20 = 90% False positive rate (forgery) : 1/20 = 5% Est. speed of training: Est. speed of authentication***: 135 ms 250 ms * Forgeries were performed with coaching by real signer. ** Corresponds to 95% confidence level. *** Includes communication time.
11 Extensions and Improvements Plane independence: We did some work to allow for user to sign on multiple planes, but this allowed a forger to authenticate on one occasion. Testing: We need to test the system with more users, including users who are not co-creators of the system. Security: We have transport layer security (HTTPS), but there is the possibility that an adversary could gain access to reference samples on the server and trick the system into authenticating. Other applications: The system could be modified to be a non-security-critical gesture recognizer, e.g., to allow a Nod ring user to create custom gestures to do certain tasks.
12 References Md Tanvir Islam Aumi and Sven Kratz. Airauth: Evaluating in-air hand gestures for authentication. In Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & Services, MobileHCI 14, pages , New York, NY, USA, ACM. Nguyen Ngoc Diep, Cuong Pham, and Tu Minh Phuong. Sigver3d: Accelerometer based verification of 3-d signatures on mobile devices. In Viet-Ha Nguyen, Anh-Cuong Le, and Van-Nam Huynh, editors, Knowledge and Systems Engineering, volume 326 of Advances in Intelligent Systems and Computing, pages Springer International Publishing, Lawrence Rabiner and Biing-Hwang Juang. Fundamentals of Speech Recognition. Prentice Hall Signal Processing Series. Prentice Hall, Englewood Cliffs, New Jersey 07632, first edition, Software: Nod Labs OpenSpatial, DTW package in R.
13 Screenshot of App: Sucessful Authentication
14 Screenshot of App: Failed Authentication
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Advance Human Computer Interaction Using Air Signature
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 119-126 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Advance Human Computer Interaction Using
Human Activities Recognition in Android Smartphone Using Support Vector Machine
2016 7th International Conference on Intelligent Systems, Modelling and Simulation Human Activities Recognition in Android Smartphone Using Support Vector Machine Duc Ngoc Tran Computer Engineer Faculty
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Role of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 [email protected] *: In collaboration with colleagues from
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Identity authentication using improved online signature verification method
Pattern Recognition Letters 26 (2005) 2400 2408 www.elsevier.com/locate/patrec Identity authentication using improved online signature verification method Alisher Kholmatov, Berrin Yanikoglu * Sabanci
Effects of Time Normalization on the Accuracy of Dynamic Time Warping
Effects of Time Normalization on the Accuracy of Dynamic Time Warping Olaf Henniger Sascha Müller Abstract This paper revisits Dynamic Time Warping, a method for assessing the dissimilarity of time series.
Effective Use of Android Sensors Based on Visualization of Sensor Information
, pp.299-308 http://dx.doi.org/10.14257/ijmue.2015.10.9.31 Effective Use of Android Sensors Based on Visualization of Sensor Information Young Jae Lee Faculty of Smartmedia, Jeonju University, 303 Cheonjam-ro,
Leica SmartWorx Viva Software Release Notes
Leica SmartWorx Viva Software Release Notes Release Details: Version 5.05 Release date 13 March 2014 Available for: Products Field Controllers: CS10, CS15 Total Stations: TS11, TS15, TM50, TS50, MS50 GNSS
An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones
An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones German Castignani, Raphaël Frank, Thomas Engel Interdisciplinary Centre for Security Reliability and Trust (SnT) University of
Accelerometer Based Real-Time Gesture Recognition
POSTER 2008, PRAGUE MAY 15 1 Accelerometer Based Real-Time Gesture Recognition Zoltán PREKOPCSÁK 1 1 Dept. of Telecomm. and Media Informatics, Budapest University of Technology and Economics, Magyar tudósok
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)
CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) KEY RESEARCH AREAS Data compression for speech, audio, images, and video Digital and analog signal processing Image and video processing Computer vision
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Tracking devices. Important features. 6 Degrees of freedom. Mechanical devices. Types. Virtual Reality Technology and Programming
Tracking devices Virtual Reality Technology and Programming TNM053: Lecture 4: Tracking and I/O devices Referred to head-tracking many times Needed to get good stereo effect with parallax Essential for
A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM
A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM ABSTRACT Juanying Lin, Leanne Chan and Hong Yan Department of Electronic Engineering, City University of Hong Kong, Hong Kong,
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Robot Perception Continued
Robot Perception Continued 1 Visual Perception Visual Odometry Reconstruction Recognition CS 685 11 Range Sensing strategies Active range sensors Ultrasound Laser range sensor Slides adopted from Siegwart
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
GLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
ArcAid, Interactive Archery Assistant
ArcAid, Interactive Archery Assistant Jente Ameye Dept. of Industrial System & Product Design Ghent University Marksesteenweg 58 Kortrijk, Belgium [email protected] Sievert van Esch Dept. of Industrial
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
Digital Signatures. Prof. Zeph Grunschlag
Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
About Us. Technology Solutions & Services Company. Turn Innovative Ideas into Real Products & Software, Efficiently
Corporate Profile Confidential 2 About Us Technology Solutions & Services Company Turn Innovative Ideas into Real Products & Software, Efficiently A Reliable One Stop Solution Enabler Well-defined Processes
A colour Code Algorithm for Signature Recognition
Electronic Letters on Computer Vision and Image Analysis 6(1):1-12, 2007 A colour Code Algorithm for Signature Recognition Vinayak Balkrishana Kulkarni Department of Electronics Engineering. Finolex Academy
Can the smartphone sensors be used for wheelchair accessibility studies? Dr. Manik Gupta Dr. Behzad Heravi Dr. Catherine Holloway Prof.
Can the smartphone sensors be used for wheelchair accessibility studies? Dr. Manik Gupta Dr. Behzad Heravi Dr. Catherine Holloway Prof. Steve Hailes Outline Research motivation Importance of wheelchair
Internet of Things: Kris Pister. Prof. EECS, UC Berkeley Founder, Dust Networks
Internet of Things: Yesterday, Today, Tomorrow Kris Pister Prof. EECS, UC Berkeley Founder, Dust Networks Vision 2030 What happens when sensors become tiny and wireless? RAND, 1992 Smart Dust, 2001 Emerson
Motion. Complete Table 1. Record all data to three decimal places (e.g., 4.000 or 6.325 or 0.000). Do not include units in your answer.
Labs for College Physics: Mechanics Worksheet Experiment 2-1 Motion As you work through the steps in the lab procedure, record your experimental values and the results on this worksheet. Use the exact
WHITE PAPER Professional Series Detectors Sensor Data Fusion February 2008
WHITE PAPER Intrusion Professional Series Detectors Data Fusion February 2008 Introduction Bosch Security Systems, Inc. Professional Series detectors use a completely new form of processing called Data
Interaction Design. Intro to Human-Computer. Scott Klemmer. stanford hci group / cs147
stanford hci group / cs147 Intro to Human-Computer Interaction Design Scott Klemmer tas: Marcello Bastea-Forte, Joel Brandt, Neil Patel, Leslie Wu, Mike Cammarano 04 October 2007 http://cs147.stanford.edu
A wireless sensor network for traffic surveillance
A wireless sensor network for traffic surveillance Sing Yiu Cheung, Sinem Coleri, Ram Rajagopal, Pravin Varaiya University of California, Berkeley Outline Traffic measurement Wireless Sensor Networks Vehicle
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project
The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project Noura N. Al-Omar King Saud University/Software Engineering Department, College of Computer and Information Sciences, Riyadh,
A Model of Unforgeable Digital Certificate Document System
A Model of Unforgeable Digital Certificate System Koichi Nozaki *, Hideki Noda **, Eiji Kawaguchi ** and Richard Eason *** *Nagasaki University, **Kyushu Institute of Technology, ***University of Maine
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Importing and using your Personal Authentication Certificate with Djigzo for Android
Personal Authentication Certificates Importing and using your Personal Authentication Certificate with Djigzo for Android Djigzo is a third party mobile application that provides S/MIME services which
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Opening the Airspace for UAS
Opening the Airspace for UAS Lambert Dopping- Hepenstal, FREng ASTRAEA Programme Director RAeS UAS Operations Conference September 2012 Contents What are the aims of ASTRAEA? Why is it important? What
Android Phone Controlled Robot Using Bluetooth
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 443-448 International Research Publication House http://www.irphouse.com Android Phone Controlled
Project Development Plan
Project Development Plan Roverwerx A.R.M. IRP Santa Clara University Richard Rasay 1 TABLE OF CONTENTS Introduction 1 Software Design.3 Robot-Side Application.5 Client-Side Application.7 Current Status
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Product Definition Bode Collection Point software is used to collect and report personal information and other meta
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Des Moines Area Community College
Des Moines Area Community College Course Information EFFECTIVE FL 2012-01 Acronym/Number MDT 210 Historical Ref Title Android App Development II Credit breakout 3 3 0 0 0 (credit lecture lab practicum
Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview
4050-350-39 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1 With the current mindset of
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION Meenu [email protected] Prabhat Kumar Pankaj [email protected] Tarkeshwar Nath [email protected] Computer Science & Engineering Department.
Secure software updates for ITS communications devices
Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Strategic White Paper
Strategic White Paper Increase Security Through Signature Verification Technology Takeaway Understand the benefits of automatic signature verification Learn about the types of automatic signature verification
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock
Progressive Authentication on Mobile Devices Zachary Fritchen Introduction Standard authentication schemes on mobile phones are at the moment very limited. They are typically restricted to a single security
Hardware In The Loop Simulator in UAV Rapid Development Life Cycle
Hardware In The Loop Simulator in UAV Rapid Development Life Cycle Widyawardana Adiprawita*, Adang Suwandi Ahmad = and Jaka Semibiring + *School of Electric Engineering and Informatics Institut Teknologi
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
ACCREDITATION COUNCIL FOR BUSINESS SCHOOLS AND PROGRAMS ACBSP ACCREDITATION FOR FACULTY OF ECONOMICS AND COMMERCE
ACCREDITATION COUNCIL FOR BUSINESS SCHOOLS AND PROGRAMS ACBSP ACCREDITATION FOR FACULTY OF ECONOMICS AND COMMERCE Vung Tau City Winter 2014 Outline What is accreditation? What is ACBSP? Why is ACBSP accreditation
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Accelerometer and Gyroscope Design Guidelines
Application Note Accelerometer and Gyroscope Design Guidelines PURPOSE AND SCOPE This document provides high-level placement and layout guidelines for InvenSense MotionTracking devices. Every sensor has
ibump: Smartphone Application to Detect Car Accidents
ibump: Smartphone Application to Detect Car Accidents Fadi Aloul, Imran Zualkernan, Ruba Abu-Salma, Humaid Al-Ali, May Al-Merri Department of Computer Science & Engineering American University of Sharjah,
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
SPeach: Automatic Classroom Captioning System for Hearing Impaired
SPeach: Automatic Classroom Captioning System for Hearing Impaired Andres Cedeño, Riya Fukui, Zihe Huang, Aaron Roe, Chase Stewart, Peter Washington Problem Definition Over one in seven Americans have
Linux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
CS 51 Intro to CS. Art Lee. September 2, 2014
CS 51 Intro to CS Art Lee September 2, 2014 Announcements Course web page at: http://www.cmc.edu/pages/faculty/alee/cs51/ Homework/Lab assignment submission on Sakai: https://sakai.claremont.edu/portal/site/cx_mtg_79055
EMBEDDED MAJOR PROJECTS LIST
EMBEDDED MAJOR PROJECTS LIST WEBSERVER ETHERNET - CAN BASED APPLICATION 1 WEB-BASED STUDENT ATTENDANCE SYSTEM USING RFID TECHNOLOGY 2 THE COMMON DATA ACQUISITION SYSTEM BASED ON ARM7 3 CAN BASED ACCIDENT
RESEARCH ON SPOKEN LANGUAGE PROCESSING Progress Report No. 29 (2008) Indiana University
RESEARCH ON SPOKEN LANGUAGE PROCESSING Progress Report No. 29 (2008) Indiana University A Software-Based System for Synchronizing and Preprocessing Eye Movement Data in Preparation for Analysis 1 Mohammad
