1 |
Enhanced usability, resilience, and accuracy in mobile keystroke dynamic biometric authenticationAlshanketi, Faisal 27 September 2018 (has links)
With the progress achieved to this date in mobile computing technologies, mobile devices are increasingly being used to store sensitive data and perform security-critical transactions and services. However, the protection available on these devices is still lagging behind. The primary and often only protection mechanism in these devices is authentication using a password or a PIN. Passwords are notoriously known to be a weak
authentication mechanism, no matter how complex the underlying format is. Mobile authentication can be strengthened by extracting and analyzing keystroke dynamic biometric from supplied passwords. In this thesis, I identified gaps in the literature, and investigated new models and mechanisms to improve accuracy, usability and resilience against statistical forgeries for mobile keystroke dynamic biometric authentication. Accuracy is investigated through cost sensitive learning and sampling, and by comparing the strength of different classifiers. Usability is improved by introducing a new approach for typo handling in the authentication model. Resilience against statistical attacks is achieved by introducing a new multimodal approach combining fixed and variable keystroke dynamic biometric passwords, in which two different fusion models are studied. Experimental evaluation using several datasets, some publicly available and others collected locally, yielded encouraging performance results in terms of accuracy, usability, and resistance against statistical attacks. / Graduate / 2019-09-25
|
2 |
Trust in national identification systems a trust model based on the TRA/TPB /Li, Xin, January 2004 (has links) (PDF)
Thesis (Ph. D.)--Washington State University. / Subtitle of caption title on p. iv.: A comprehensive trust model based on the TRA/TPB. Includes bibliographical references.
|
3 |
Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication MechanismBatie, Robert B. 01 January 2016 (has links)
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as "BIO+PIN"). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN.
|
4 |
Metodologia para a extração de características biométricas da mão humana visando aplicação na identificação pessoal / Metodology to extract biometrics features of the human hand aiming personal identification applicationsGava, Águida Aparecida 17 December 2004 (has links)
O objetivo deste trabalho é desenvolver um algoritmo capaz de extrair medidas dos dedos e da palma das mãos. Essas imagens serão adquiridas através de um banco de imagens digitalizadas em um scanner de mesa, facilmente encontrado, e processadas para se obter uma curva do contorno da mão, permitindo assim que se extraia informações biométricas das mesmas. As imagens armazenadas no banco serão então associadas a um determinado usuário, visando em um estágio futuro, aplicações na identificação pessoal. / The object of this work is to develop an algorithm to extract fingers and hands palm measures. Those images will be acquired from a database of images digitalized by a scanner, easily founded, and processed to get the hand contour, allowing biometrics informations to be extracted. The images stored in the database will be associated with an user, aiming personal identification in a future stage.
|
5 |
Asmens tapatybės nustatymas Internete, teisiniai aspektai / Personal identification in the Internet and its legal aspectsMuliuolis, Remigijus 04 February 2009 (has links)
Magistro baigiamąjame darbe nagrinėjama asmens tapatybės nustatymo Internete samprata bei praktinis realizavimas, analizuojama ar pakankamai teisiškai reglamentuota, taip pat ar yra būtinumas kriminalizuoti asmens tapatybės klastotę Internete, atribojant ją nuo paprasto sukčiavimo.
Pagrindinis tyrimo tikslas - išanalizuoti teisinius ir praktinius asmens tapatybės Internete buvimo, slėpimo ir klastojimo aspektus, nurodyti pagrindines teisines problemas, su kuriomis susiduriama siekiant išlikti anonimiškam, o taip pat pateikti išvadas ir siūlymus kaip tobulinti teisinį reguliavimą.
Darbe iškelta hipotezė, kad asmens tapatybės nustatymo internete samprata bei praktinis realizavimas yra neaiški ir nepakankamai teisiškai reglamentuota, taip pat reiktų kriminalizuoti asmens tapatybės klastotę elektroninėje erdvėje, atribojant ją nuo paprasto sukčiavimo, nepasitvirtino šiais aspektais:
Lietuvoje nėra atskirai išskirta ir kriminalizuota asmens tapatybės klastotė Internete, tačiau to ir nereikia, kadangi visiškai užtenka šiuo metu galiojančių teisės aktų.
Lietuvoje teisinė bazė pilnai reglamentuota ir pakankama, kad tinkamai kvalifikuoti nusikalstamas veikas, padaromas elektroninėje erdvėje.
Dabartinis Lietuvoje veikiantis teisinis reguliavimas nėra pritaikytas anonimiškumui elektroninėje erdvėje, todėl siūlytina derinti šiuo metu galiojančias prekybos ir paslaugų taisykles prie elektroninės komercijos keliamų poreikių. Didžiausią dėmesį skirti anonimiškų vartotojų, ypatingai tų... [toliau žr. visą tekstą] / Master work examines the concept of online identity and the practical implementation, analysis, or enough legally regulated, including whether there is the need to criminalize identity fraud in the Internet banned it from a simple fraud.
The main purpose of the study - to examine the legal and practical identity online presence, evasion and fraud aspects of major legal problems encountered in order to survive in anonymous, as well as the conclusions and proposals for improving the legal regulations.
The paper put forward a hypothesis that a person's identity online and practical realization of the concept is unclear and not legally regulated, should also be criminalize identity fraud in cyberspace banned it from a mere fraud, failed the following aspects:
Lithuania does not separately distinguished, and criminalized identity forgery Internet, however, and it is not necessary, because sufficient current legislation.
Lithuania legal basis for a fully regulated and sufficient suitably qualified criminal acts committed in cyberspace.
Current Lithuania acting regulation is not adapted to the anonymity of cyberspace, and therefore propose to combine the existing marketing and service rules for electronic commerce needs are. Focus on the anonymity of users, particularly those using electronic means, protection of the rights. It is also proposed to create an entirely new regulatory framework to govern completely anonymous transactions for the needs, but also specify the rights... [to full text]
|
6 |
Metodologia para a extração de características biométricas da mão humana visando aplicação na identificação pessoal / Metodology to extract biometrics features of the human hand aiming personal identification applicationsÁguida Aparecida Gava 17 December 2004 (has links)
O objetivo deste trabalho é desenvolver um algoritmo capaz de extrair medidas dos dedos e da palma das mãos. Essas imagens serão adquiridas através de um banco de imagens digitalizadas em um scanner de mesa, facilmente encontrado, e processadas para se obter uma curva do contorno da mão, permitindo assim que se extraia informações biométricas das mesmas. As imagens armazenadas no banco serão então associadas a um determinado usuário, visando em um estágio futuro, aplicações na identificação pessoal. / The object of this work is to develop an algorithm to extract fingers and hands palm measures. Those images will be acquired from a database of images digitalized by a scanner, easily founded, and processed to get the hand contour, allowing biometrics informations to be extracted. The images stored in the database will be associated with an user, aiming personal identification in a future stage.
|
7 |
User Identification Roadmap towards 2020 : A study of personal identification challenges for ubiquitous computing worldPour, Shiva. Abdi Farzaneh January 2008 (has links)
This thesis is about Personal Identification challenges towards Ubiquitous Computing world as targeted in 2020. The study starts by defining the problems that how diversity of tools for personal identification as an always-foreground activity is problematic in order to become a pervasive interaction. The thesis is divided into three parts. Part one is introduction, background and related works. Part two will describe the empirical study—Triangulation— that is supported by qualitative and quantitative methods. Observation and the analysis over collected data, also the result of informal interviews will cover the qualitative part. The informal interview consists of pre-determined questions that some answers have been analyzed by graphs and the last part of interview was the open discussion that ascertain what values the interviewees counts in today’s identification designs and what challenges or improvements they believe for future of personal identification. Last part is the future works and conclusion. The result of empirical study was applied on new technologies like RFID, Mobile identification and Biometrics, to investigate whether new identification tools and techniques cover the challenges on today’s identification and what future works they might need to focus on. / This thesis starts with thinking about the problems of the today’s identification; why we need to carry dozens of different magnetic cards, bunches of keys, or memorizing many digital pins and pass code? To do the study, I observed people at shopping and traveling to find out what and how people interact with tools, what are their behaviors, experiences, or reactions when they need to approve their identity. and what problems they encounter. Informal discussion with designers was the next step of empirical study. The analysis over collected data guided us into problems in today’s identifications: ‘Foreground activity’, ‘Diversity of tools and interactions’, ‘security’, ‘trust’ and ‘being economical’. Last section of the thesis is the investigating on current designs; RFID can be good solution for pervasive identification if the security and privacy of people respected. Mobile will be an inevitable part of every design in future. However, mobile phone designers should think about diversity of interface layouts that may be a barrier for unified identification interactions. Biometrics also seems the inevitable part of future of identification. Apart from technology, social engagement and supports, especially in terms of privacy is one of the most noticeable concerns. Information forensics, and level of awareness should be specified before the benefits of pervasive identifications threaten people’s privacies.
|
8 |
Daktyloskopie - historie, současnost a budoucnost / Fingerprinting - Past, Present and FutureJanotová, Martina January 2017 (has links)
1 Abstract Fingerprinting - Past, Present and Future The objective of the presented diploma thesis is to provide a comprehensive overview of findings in fingerprints area. Fingerprinting is a unique method enabling quick, inexpensive and reliable personal identification. To provide a comprehensive understanding of the presented issue, fingerprint reputation as ever-changing and continuously developing method is put into contrast with its contradictions and current problems. The first part of the thesis describes roots and genesis of the method from its beginnings in ancient realms up to date. The process of shaping of the knowledge in the field of fingerprints into a science is presented through the works of the most prominent fingerprints personalities. Despite the difficult beginnings, fingerprints finally reached the position of trustworthy and respectful area of forensic science. Due to that; the historical part follows the journey of fingerprints evidence into the police investigation and court rooms. Final point brings an attention to the establishment of fingerprinting in Czech criminal investigation. The main part of the thesis is dedicated to the practical aspect of fingerprints expertise. To provide a deep level of understanding, particular role of fingerprints in criminal investigations and its...
|
9 |
Právní a sociální aspekty daktyloskopování osob / Personal dactyloscopy {--} its legal and social aspectsMIKLOŠ, Petr January 2007 (has links)
This diploma thesis is focused on criminalistic dactyloscopy, one of many methods of personal identification by fingerprints used in criminalistic praxis. However, this activity involves interventions and restrictions of human rights of persons being dactyloscoped. The areas affected are mainly personal data protection, human dignity and freedom and personal security rights. Thus this procedure has to be legal, reasonable and legitimate. The aim of this diploma thesis is to provide a complete description of historical development, possible uses and legal framework of criminalistic dactyloscopy. Closely connected to this topic are definitions of several conceptions. The basis of this work lies in an evaluation and comparison of the state of dactyloscopic identification prior to 1990. It also notes the changes occurring after this date and changes connected with the entry of the Czech Republic into the European Union. The aim of this work is to provide the reader or any person interested in this topic with basics of procedures of dactyloscopic analysis and a list of related books for additional information. Resulting from these aims of this work and from the study of professional literature, following hypotheses were established: There was insufficient legal protection of dactyloscoped subjects prior to 1990. After 1990, a gradual development of legal system created conditions of adequate human rights protection of dactyloscoped subjects. Both hypotheses were confirmed by professional literature and legal regulations, mainly Law No. 40/1974 (on the former police functioning), International Pact of Civil and Political Rights as stated in the Law No. 120/1976 Coll., Law No. 283/1991 Coll. (on the Police of Czech Republic) within the meaning of later regulations, Law No. 101/2000 (on personal data protection) and further legal norms. The concept of this diploma thesis is to provide a complete overview of criminalistic dactyloscopy and a basic sketch of the development of human rights protection of dactyloscoped subjects. Its readers can compare current situation with historical development. It should give them a wider understanding of this topic with the aim of orientating the readers in basic law regulations and providing them with a list of extra resources.
|
10 |
Método de reconhecimento pessoal através da íris usando funções geoestatísticas / Method of personal recognition through iris texture using geostatistics functionsSOUSA JUNIOR, Osvaldo Silva de 04 December 2006 (has links)
Made available in DSpace on 2016-08-17T14:53:17Z (GMT). No. of bitstreams: 1
Osvaldo Junior.pdf: 1458966 bytes, checksum: a19ea3d3a77d6e058740e17388f1c8fa (MD5)
Previous issue date: 2006-12-04 / Biometrics identification methods are gaining applications each day and this
has motivated a lot of research in this area. This work presents a proposal
for a method to identify people through iris texture analysis using geostatistics
functions and their combination.
To achieve this work objective, it is considered the following phases: automatic
localization of the iris, features extraction and classification. In the localization
phase, it is used a combination of three techniques: Watershed, Hough Transform
and Active Contours. Each technique has an essential function to achieve a good
performance. Within the extraction phase, there were used four geostatistics
functions (semivariogram, semimadogram, covariogram and correlogram) and a
combination of them to extract this features with a good precision. Finally in the
phase of classification it is used a Euclidean Distance to determine the similarity
degree between the extracted features.
The tests were realised for the phases of localization and classification using
an iris database called CASIA that has 756 images. The results achieved by the
localization method are about 90%. For the classification method, considering
the tests realized with the authentication mode, the obtained results has reached
a success rate of 97.02% for a false acceptance rate equal to zero and 97.22% for
a false acceptance rate equal to a false rejection rate. The tests realized with the
identification mode have reached a rate of success of 98.14%. / Os métodos de identificação biométrica estão ganhando espaço em aplicações
do dia-a-dia o que vem motivando a pesquisa nessa área. Este trabalho apresenta
uma proposta de um método para identificação de pessoas através da análise da
textura da íris usando funções geoestatísticas e uma combinação das mesmas.
Para realização do trabalho foram consideradas as seguintes fases: localização
automática da íris, extração de características e classificação. Na fase de
localização foi usada a combinação de três técnicas Watershed, Transformada
de Hough e Contornos Ativos, onde cada uma possui uma função essencial
para um bom desempenho do processo. Na fase de extração são usadas
quatro funções geoestatísticas (semivariograma, semimadograma, covariograma
e correlograma) e uma combinação das mesmas para extrair características que
discriminem a íris com uma boa precisão. Finalmente, na fase de classificação
é usada a distancia Euclidiana para determinar o grau de similaridade entre as
características extraídas.
Os testes foram realizados, para as fases de localização e classificação, com
um banco de dados de íris, denominado CASIA que possui 756 imagens. Na fase
de localização o resultado alcançado foi de 90%. Para a fase de classificação,
considerando os testes realizados no modo de autenticação, os resultados obtidos
chegaram a uma taxa de sucesso de 97.02% para uma falsa aceitação igual a zero
e de 97.22% para uma falsa aceitação igual a uma falsa rejeição. Para os testes
realizados no modo de identificação a taxa de sucesso chegou a 98.14%.
|
Page generated in 0.2274 seconds