For Your Eyes Only – Biometric Protection of PDF Documents - Publication - Bridge of Knowledge

Search

For Your Eyes Only – Biometric Protection of PDF Documents

Abstract

The paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important point is that documents developed in the project referred in the paper use common formats, it this particular case PDF.

Cite as

Full text

download paper
downloaded 41 times
Publication version
Accepted or Published Version
License
Copyright (2013 CSREA Press)

Keywords

Details

Category:
Conference activity
Type:
publikacja w wydawnictwie zbiorowym recenzowanym (także w materiałach konferencyjnych)
Title of issue:
Proceedings of the 2013 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, EEE 2013 strony 212 - 218
Publication year:
2013
Bibliographic description:
Siciarek J., Smiatacz M., Wiszniewski B.: For Your Eyes Only – Biometric Protection of PDF Documents// Proceedings of the 2013 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, EEE 2013/ ed. eds. H. R. Arabnia, A. Bahrami, F. G. Tinetti. : CSREA Press, 2013, s.212-218
Bibliography: test
  1. MeNaID project home page, "Methods and tools of future document engineering." [Online]. Available: www.menaid.org.pl open in new tab
  2. M. Godlewska and B. Wiszniewski, "Distributed MIND -a new processing model based on mobile interactive documents," in Proc. 8th Int. Conf. PPAM 2009, ser. LNCS, vol. 6068. Springer, 2010, pp. 244-249. open in new tab
  3. J. Siciarek and B. Wiszniewski, "IODA -an interactive open document architecture," Procedia CS, vol. 4, pp. 668-677, 2011. open in new tab
  4. SART-2 project home page, "Biometric security system for mobile workstations," 2012. [Online]. Available: http://sart2.eti.pg.gda.pl/ open in new tab
  5. M. Smiatacz and K. Przybycien, "A framework for training and testing of complex pattern recognition systems," in Proc. IEEE Conf. on Signal and Image Processing Applications (ICSIPA), 2011, pp. 198- 203. open in new tab
  6. P. Viola and M. J. Jones, "Robust real-time face detection," Int. J. Comp. Vision, vol. 57, no. 2, pp. 137-154, 2004. open in new tab
  7. X. Tan and B. Triggs, "Enhanced local texture feature sets for face recognition under difficult lighting conditions," IEEE Trans. Image Processing, vol. 19, no. 6, pp. 1635-1650, 2010.
  8. T. Sim, S. Baker, and M. Bsat, "The CMU pose, illumination, and expression (PIE) database," in Proc. 5th Int. Conf. on Automatic Face and Gesture Recognition, 2002, pp. 53-58. open in new tab
  9. M. Smiatacz, "Image normalization method for face identification under difficult lighting conditions," in Proc. 11th IEEE Int. Conf. on Information Sciences, Signal Processing and their Applications (ISSPA), 2012, pp. 204-209. open in new tab
  10. M. Szwoch and P. Pieniążek, "Eye blink based detection of liveness in biometric authentication systems using conditional random fields," LNCS, vol. 7594, pp. 669-676, 2012. open in new tab
  11. M. Smiatacz, "Liveness measurements using optical flow for biometric person authentication," Metrology and Measurement Systems, vol. 19, no. 2, pp. 257-268, 2012. open in new tab
  12. G. Donato, M. S. Bartlett, J. C. Hager, P. Ekman, and T. J. Sejnowski, "Classifying facial actions," IEEE Trans. Pattern Analysis and Ma- chine Intelligence, vol. 21, no. 10, pp. 974-989, 1999. open in new tab
  13. Document management -Portable document format -Part 1: PDF 1.7, Adobe Systems Inc., 2008. [Online]. Available: http://www.adobe.com/devnet/pdf/pdf_reference.html open in new tab
  14. J. Steube, "Hashcat -advanced password recovery," March 7, 2013. [Online]. Available: http://hashcat.net/hashcat/ open in new tab
  15. T. Meskauskas, "The FBI Federal Bureau of In- vestigation screen locker," July 16, 2012. [Online].
  16. L. V. Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: using hard AI problems for security," in Proc. 22nd Int. Conf. on The- ory and Applications of Cryptographic Techniques EUROCRYPT'03. Springer, 2003, pp. 294-311.
Verified by:
Gdańsk University of Technology

seen 129 times

Recommended for you

Meta Tags