232 resultados para Biometric characters
em Queensland University of Technology - ePrints Archive
Resumo:
A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%
Resumo:
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users.
Resumo:
It is possible for the visual attention characteristics of a person to be exploited as a biometric for authentication or identification of individual viewers. The visual attention characteristics of a person can be easily monitored by tracking the gaze of a viewer during the presentation of a known or unknown visual scene. The positions and sequences of gaze locations during viewing may be determined by overt (conscious) or covert (sub-conscious) viewing behaviour. This paper presents a method to authenticate individuals using their covert viewing behaviour, thus yielding a unique behavioural biometric. A method to quantify the spatial and temporal patterns established by the viewer for their covert behaviour is proposed utilsing a principal component analysis technique called `eigenGaze'. Experimental results suggest that it is possible to capture the unique visual attention characteristics of a person to provide a simple behavioural biometric.
Resumo:
IN Harold Pinter's No Man's Land, four Englishmen find themselves trapped in a strange sort of limbo in the library of a well-to-do-house with musty old books, far too many bottles of beer, wine and spirits, dusty lamps and memories that never quite match up.
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.
Resumo:
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.
Resumo:
Anthropomorphism is a cognitive bias, which occurs when individuals see human characteristics in a non-human agent, object or animal. Anthropomorphism is especially interesting to marketers, because once anthropomorphic bias has been triggered, it can lead to a greater feeling of connectedness to a non-human agent (Tam, Lee and Chao, 2013), the emulation of behaviours (Aggarwal and McGill, 2012) or greater attribution of brand personality and brand liking (Delbaere, McQuarrie and Phillips, 2011). Importantly, research now shows that levels of this tendency vary between individuals (Waytz, Cacioppo and Epley, 2010), but research to date has failed to focus on how anthropomorphic tendency influences individual responses to marketing communications messages. Spokes-characters present an ideal context through which to examine this gap, given that they function as personified brands, designed to trigger consumer anthropomorphic tendency. Further, little is understood about how spokes-characters operate and which consumers will prefer them to their human counterparts. Like anthropomorphic research, much empirical work to date has focused on design and outcomes, examining the sender’s encoding process and the feedback generated, but ignoring the individual decoding process that is so important to understanding individual differences and message effectiveness. The current research employs three experiments using an online survey with stimulus exposure to show that anthropomorphic tendency, personality similarity and spokes-character type all have relevance to the understanding of this complex relationship. Study one and two indicate that while a human spokesperson is still preferred by many, higher levels of anthropomorphic tendency increase likeability of cartoon spokes characters. Study three highlights the importance of personality similarity, which further increases likability. Additional analyses provide key findings concerning the nature of anthropomorphic tendency as an individual difference and trait. This research contributes to a greater understanding of anthropomorphism theory and fills existing gaps in the consumer psychology and marketing communications literature.
Resumo:
This thesis investigated how microblogging, a form of online social networking, was being employed by educators to support their professional learning. The study found that educators who participate in microblogging engage in a wide range of behaviours, with certain behaviours and activities commonly exhibited. An advantage of microblogging as a professional learning tool is its ability to link educators globally to exchange ideas from different perspectives and to share resources and teaching practices. Educators who microblog have access to relevant and timely learning that is not constrained by time or distance and can be tailored to meet their individual needs.
Resumo:
This thesis comprised a series of online experiments to examine the influence of an individual's level of anthropomorphic tendency on responses to spokes-characters. It finds that an individual's level of anthropomorphic tendency does influence their responses to some types of spokes-characters. Further, those with high anthropomorphic tendency tend towards being younger and more creative in their thinking. This research contributes to anthropomorphic tendency theory; specifically it addresses how this tendency operates in a marketing context and thereby aids practitioners seeking to utilise such characters in achieving positive business outcomes.
Resumo:
The World Wide Web has grown into a global information and communication space with more than a billion users and has entered a new, more social and participatory phase where people create and manage online content rather than just viewing it; a place where people can communicate knowledge, share resources and participate in social networks. Online social networks are being used to support professional learning where groups of people are using the Web to communicate and collaborate in order to build and share knowledge and form professional learning networks (PLNs). This session will present the results of research into how microblogging, a form of online social networking, is being employed by educators to support their professional learning. The study examined activities and perceptions of a group of educators in order to provide an insight into how and why they engage in microblogging and the value they place on microblogging as a professional learning tool. The session will outline the advantages of microblogging as a professional learning tool; the range of behaviours and activities that are undertaken to support professional learning; and the implications for practice.
Resumo:
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, speaker and bi-modal authentication techniques and show that inter-session variability modelling using Gaussian mixture models provides a consistently robust system for face, speaker and bi-modal authentication. It is also shown that multi-algorithm fusion provides a consistent performance improvement for face, speaker and bi-modal authentication. Using this bi-modal multi-algorithm system we derive a state-of-the-art authentication system that obtains a half total error rate of 6.3% and 1.9% for Female and Male trials, respectively.
Resumo:
BACKGROUND Tilted disc syndrome (TDS) is associated with characteristic ocular findings. The purpose of this study was to evaluate the ocular, refractive, and biometric characteristics in patients with TDS. METHODS This case-control study included 41 eyes of 25 patients who had established TDS and 40 eyes of 20 healthy control subjects. All participants underwent a complete ocular examination, including refraction and analysis using Fourier transformation, slit lamp biomicroscopy, pachymetry, keratometry, and ocular biometry. Corneal topography examinations were performed in the syndrome group only. RESULTS There were no significant differences in spherical equivalent (P = 0.13) and total astigmatism (P = 0.37) between groups. However, mean best spectacle-corrected visual acuity (Log Mar) was significantly worse in TDS patients (P = 0.003). The lenticular astigmatism was greater in the syndrome group, whereas the corneal component was greater in controls (P = 0.059 and P = 0.028, respectively). The measured biometric features were the same in both groups, except for the lens thickness and lens-axial length factor, which were greater in the TDS group (P = 0.007 and P = 0.055, respectively). CONCLUSIONS Clinically significant lenticular astigmatism, more oblique corneal astigmatism, and thicker lenses were characteristic findings in patients with TDS.