Authentication Database

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 129 Experts worldwide ranked by ideXlab platform

Dijana Petrovskadelacretaz - One of the best experts on this subject based on the ideXlab platform.

  • biomet a multimodal person Authentication Database including face voice fingerprint hand and signature modalities
    Lecture Notes in Computer Science, 2003
    Co-Authors: Sonia Garciasalicetti, Charles Beumier, Gerard Chollet, Bernadette Dorizzi, Jean Leroux Les Jardins, Jan Lunter, Yang Ni, Dijana Petrovskadelacretaz
    Abstract:

    Information technology innovations involve a constant evolution of man-machine interaction modes. Automated Authentication of people could be used to better adapt the machine to the user. Security can also be enhanced through a better people Authentication. Biometrics appears as a promising tool in these two situations. Different modalities can be envisaged, such as: fingerprint, human face images, hand shape, voice, handwritten signature... In order to take advantage of the particularities of each modality, and to improve the performance of a person Authentication system, multimodality can be applied. This motivated the recording of BIOMET, a biometric Database with five different modalities, including face, voice, fingerprint, hand and signature data. In this paper, the BIOMET multimodal Database for person Authentication is described. Details about the acquisition protocols of each modality are given. Preliminary monomodal verification results, obtained on a subcorpus of the BIOMET fingerprint data, are also presented.

Min Wu - One of the best experts on this subject based on the ideXlab platform.

  • Robust and secure image hashing
    IEEE Transactions on Information Forensics and Security, 2006
    Co-Authors: Ashwin Swaminathan, Yinian Mao, Min Wu
    Abstract:

    Image hash functions find extensive applications in content Authentication, Database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.

P. Henry - One of the best experts on this subject based on the ideXlab platform.

  • GLOBECOM - A secure public wireless LAN access technique that supports walk-up users
    GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003
    Co-Authors: P. Henry
    Abstract:

    Next-generation wireless LAN security techniques will be based on 802.1x and 802.11i/WPA standards, which mandate mutual Authentication and air traffic encryption using per-user per-session keys. These requirements seem to be incompatible with supporting walk-up users (first-time users or one-time users), an important business strategy for public wireless LAN operators. This is because mutual Authentication often requires a user to share a secret with an Authentication server, but a walk-up user does not have a shared secret established in the public wireless LAN operator's Authentication Database yet. This paper proposes a secure public wireless LAN access technique to solve the above problem. It supports mutual Authentication and air traffic encryption using per-user per-session keys for both registered users and walk-up users. Its Authentication process consists of 802.1x/PEAP Authentication and browser-based Authentication. A registered user passing the 802.1x/PEAP Authentication will skip the browser-based Authentication. A walk-up user can pass the 802.1x/PEAP Authentication using a wild-card username and password, but must then go through the browser-based Authentication by either subscribing the public wireless LAN service or paying for it online. As soon as the 802.1x/PEAP Authentication is passed, a per-user per-session key is generated and is used to encrypt the user's air traffic based on 802.11i/WPA The system architecture of a public wireless LAN employing this technique is also described.

  • A secure public wireless LAN access technique that supports walk-up users
    GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003
    Co-Authors: P. Henry
    Abstract:

    Next-generation wireless LAN security techniques will be based on 802.1x and 802.11i/WPA standards, which mandate mutual Authentication and air traffic encryption using per-user per-session keys. These requirements seem to be incompatible with supporting walk-up users (first-time users or one-time users), an important business strategy for public wireless LAN operators. This is because mutual Authentication often requires a user to share a secret with an Authentication server, but a walk-up user does not have a shared secret established in the public wireless LAN operator's Authentication Database yet. This paper proposes a secure public wireless LAN access technique to solve the above problem. It supports mutual Authentication and air traffic encryption using per-user per-session keys for both registered users and walk-up users. Its Authentication process consists of 802.1x/PEAP Authentication and browser-based Authentication. A registered user passing the 802.1x/PEAP Authentication will skip the browser-based Authentication. A walk-up user can pass the 802.1x/PEAP Authentication using a wild-card username and password, but must then go through the browser-based Authentication by either subscribing the public wireless LAN service or paying for it online. As soon as the 802.1x/PEAP Authentication is passed, a per-user per-session key is generated and is used to encrypt the user's air traffic based on 802.11i/WPA The system architecture of a public wireless LAN employing this technique is also described.

Sonia Garciasalicetti - One of the best experts on this subject based on the ideXlab platform.

  • biomet a multimodal person Authentication Database including face voice fingerprint hand and signature modalities
    Lecture Notes in Computer Science, 2003
    Co-Authors: Sonia Garciasalicetti, Charles Beumier, Gerard Chollet, Bernadette Dorizzi, Jean Leroux Les Jardins, Jan Lunter, Yang Ni, Dijana Petrovskadelacretaz
    Abstract:

    Information technology innovations involve a constant evolution of man-machine interaction modes. Automated Authentication of people could be used to better adapt the machine to the user. Security can also be enhanced through a better people Authentication. Biometrics appears as a promising tool in these two situations. Different modalities can be envisaged, such as: fingerprint, human face images, hand shape, voice, handwritten signature... In order to take advantage of the particularities of each modality, and to improve the performance of a person Authentication system, multimodality can be applied. This motivated the recording of BIOMET, a biometric Database with five different modalities, including face, voice, fingerprint, hand and signature data. In this paper, the BIOMET multimodal Database for person Authentication is described. Details about the acquisition protocols of each modality are given. Preliminary monomodal verification results, obtained on a subcorpus of the BIOMET fingerprint data, are also presented.

Ashwin Swaminathan - One of the best experts on this subject based on the ideXlab platform.

  • Robust and secure image hashing
    IEEE Transactions on Information Forensics and Security, 2006
    Co-Authors: Ashwin Swaminathan, Yinian Mao, Min Wu
    Abstract:

    Image hash functions find extensive applications in content Authentication, Database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.