Context in source publication

Context 1
... IAMBIC system encompasses just such an adaptation feature, though in the prototype system considered here, a pool of just four possible biometric modalities (voice, face, fingerprint and hand vein patterns) is provided. Figure 1 shows the structure of the IAMBIC system. ...

Similar publications

Article
Full-text available
Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to...

Citations

... For these reasons attention is focused on access-permit tools based on the measurement of biometric parameters, of face, voice, iris and hand (geometry, fingerprints, palm prints, hand movement and signature). Some of these modalities (fingerprints, voice, face, signature) have been investigated for a long time [2,3]. As a result sets of reliable features and robust classification rules for identification/verification have been suggested and real-time application systems have been developed. ...
... The average absolute differences in the grey levels are calculated according to formula (1). 2 The obtained maximal average difference is of the order of 2,78 for the black-andwhite camera and 2,87 for the color cameras. The experiments with varying illumination showed that these values vary insignificantly and the results for the black-and-white camera were more stable ( fig.1). ...
Article
Full-text available
The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify him. A method for locating the signature zone and the duration of the process in series of camera recordings has been developed. Preliminary experiments have been carried out to describe the trajectory of the movement and to select identification features.
... This concerns the fact that, as we have already seen, in any application where a large user population is implied, or where the characteristics of the individual members of the population might be expected to be particularly variable, it becomes increasingly unlikely that a single biometric can be identified which can meet the needs of all potential system users, and this points to the need for further consideration of the problem and a more powerful strategy for implementation. One particularly promising approach to the problem is to adopt a methodology based on the use of multiple biometric modalities – in other words, accumulating evidence of identity from more than one biometric source [11,13,14,15]. While, at one end of the spectrum, this can lead in many cases to an increase in the security and reliability afforded by an overall system (in the sense that requiring a user to satisfy identity checking in more than one modality is likely to improve the confidence in the resulting identification decision), at the other end of the spectrum it is clear that a system designed around the availability of identification evidence from more than one biometric source can also offer exactly the degree of selectivity and personalised matching for which we have been arguing. ...
Conference Paper
Full-text available
The key concept of Universal Access in the Information Society has important and far-reaching implications for the design of a wide range of systems and data sources. This paper sets out to examine two fundamentally conflicting aspects of the broad principle of universality in design, pointing to the opposite requirement that, in many applications, access to a system or set of data must be limited to an identifiable population of “authorised” users. However, the idea of universality then applies at a lower level, since the mechanisms used to impose these limitations should themselves not be dependent on the physical attributes or expertise of individuals, but rather related to their identity and designated level of authorisation. This leads to an interesting situation where the concept of universality must be implemented at different levels and, equally, must be balanced against the competing claims of the constraints imposed by authorisation-determined selectivity. This paper argues that technology based on biometric processing - the exploitation of measurements relating to individual physiological or behavioural attributes - provides a key platform on which an access management structure can be realised. Experimental results based on various biometric modalities are used to support and illustrate the ideas proposed.
Article
Full-text available
This paper deals with a modified method of the dynamic time warping and feature points to extract various important information of the signature for the dynamic signature verification. We could achieve lower equal error rate, small and efficient feature points and fast processing time for the notification.
Conference Paper
Biometric-based access control, whether it be with respect to places, restricted information or personal data, is an increasingly important consideration in many situations. The handwritten signature is a common biometric which has been regularly used, but with authentication decisions traditionally made by human visual inspection. This paper investigates some important issues relating to signature complexity and authentication decisions, and points to the increasing need for an understanding of both human and machine-based perceptual mechanisms as biometric processing becomes more widespread. The human-computer interface developed for future generations of automated biometric systems can benefit significantly from a detailed study of the processes by which human biometric checking is carried out, and the important issues underlying this aspect of signature verification performance are addressed in this paper.
Conference Paper
Multimodal biometric systems provide both increased reliability and greater flexibility to users, yet also increase the degree of complexity in implementation and system management, especially where access permissions, security levels, data categorizations and user characteristics show a high degree of diversity. Also, sources of unreliability in biometric authentication are often traceable to problems of enrolment, and especially to poor data acquisition, and hence introducing a greater degree of monitoring and increasing intelligent user guidance at the system interface can make a significant impact on the overall performance of an identity authentication system, especially in a multimodal scenario. This paper illustrates some of these problems in practice and outlines an implementation framework which reconciles the need to support more effective interaction mechanisms with the wider problems of managing the complexity of data flow which arises in such systems.
Conference Paper
Multimodal biometric solutions can provide increased reliability and robustness in many applications where identity verification is important, and especially so in highly interactive scenarios such as those represented by internet based transactions. Yet multimodal configurations increase complexity and raise questions about the need for effective system optimisation. This paper describes an approach that uses genetic algorithms to evolve efficient configurations in such applications, and shows how such structures can be embedded within a broader implementation framework, which is especially suited to supporting typical transactions.
Article
The Internet has stimulated increased activity to address key problems relating to the implementation of reliable and robust biometric identity checking. Although not always the biometric modality most readily adopted in such an environment, the handwritten signature continues to offer many advantages over some other more commonly considered biometrics. The authors address some key issues relating to the nature of the handwritten signature and, especially, the strategies used by humans in analysing signature data. Through experimental studies and an analytical investigation, the paper identifies characteristics of the signature which influence its resilience to fraudulent penetration, pointing to some important principles on which to build procedures for both automated and non-automated identity authentication.