Wyniki wyszukiwania dla: BIOMETRIC IDENTITY VERIFICATION REACTIVE DOCUMENTS
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Analysis of results of large-scale multimodal biometric identity verification experiment
PublikacjaAn analysis of a large set of biometric data obtained during the enrolment and the verification phase in an experimental biometric system installed in bank branches is presented. Subjective opinions of bank clients and of bank tellers were also surveyed concerning the studied biometric methods in order to discover and to explore relations emerging from the obtained multimodal dataset. First, data acquisition and identity verification...
-
Performance Analysis of Developed Multimodal Biometric Identity Verification System
PublikacjaThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic handwritten signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed...
-
Pilot Testing of Developed Multimodal Biometric Identity Verification System
PublikacjaThe bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric sensors installed at engineered...
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Facial data registration facility for biometric protection of electronic documents
PublikacjaIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublikacjaThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
Handwritten signature verification system employing wireless biometric pen
PublikacjaThe handwritten signature verification system being a part of the developed multimodal biometric banking stand is presented. The hardware component of the solution is described with a focus on the signature acquisition and on verification procedures. The signature is acquired employing an accelerometer and a gyroscope built-in the biometric pen plus pressure sensors for the assessment of the proper pen grip and then the signature...
-
Evaluation of Face Detection Algorithms for the Bank Client Identity Verification
PublikacjaResults of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide...
-
Identity verification based on mouse movements
PublikacjaW pracy przedstawiono ideę systemu zabezpieczeń biometrycznych opartego na sposobie poruszania myszą. Pomiary odczytywane z myszy są przykładem cech behawioralnych, które w przeciwieństwie do fizjologicznych są bardzo niestabilne. Opisano zbiór cech, które można wydobyć z danych pochodzących z myszy. Przeprowadzono eksperymenty dla danych zebranych od trzynastu użytkowników. Zaprezentowano wyniki uwierzytelniania za pomocą metody...
-
Identity verification using complex representations of handwritten signature
PublikacjaThis paper is devoted to handwritten signature verification using the cross-correlation approach (adopted by the authors from telecommunications) and dynamic time warping. The following invariants of the handwritten signature: the net signature, the instantaneous complex frequency and the complex cepstrum are analyzed. The problem of setting the threshold for deciding whether the current signature is authentic or forged is discussed....
-
Identity Fusion and Status of the Evaluator as Moderators of Self-Enhancement and Self-Verification at the Group Level of Self-Description
Publikacja -
Validating data acquired with experimental multimodal biometric system installed in bank branches
PublikacjaAn experimental system was engineered and implemented in 100 copies inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank client voice recognition and hand vein distribution verification. The main purpose of the presented research was to analyze questionnaire responses reflecting user opinions on: comfort, ergonomics, intuitiveness and other aspects of the biometric enrollment...
-
Dynamic Signature Vertical Partitioning Using Selected Population-Based Algorithms
PublikacjaThe dynamic signature is a biometric attribute used for identity verification. It contains information on dynamics of the signing process. There are many approaches to the dynamic signature verification, including the one based on signature partitioning. Partitions are the regions created on the basis of signals describing the dynamics of the signature. They contain information on the shape of the signature characteristic of a...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Signature Partitioning Using Selected Population-Based Algorithms
PublikacjaDynamic signature is a biometric attribute which is commonly used for identity verification. Artificial intelligence methods, especially population-based algorithms (PBAs), can be very useful in the dynamic signature verification process. They are able to, among others, support selection of the most characteristic descriptors of the signature or perform signature partitioning. In this paper, we focus on creating the most characteristic...
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublikacjaAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublikacjaW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Variable length sliding models for banking clients face biometry
PublikacjaAn experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...
-
System Weryfikacji Autentyczności Podpisu Odręcznego
PublikacjaW referacie przedstawiono system statycznej i dynamicznej weryfikacji autentyczności podpisu odręcznego, składanego piórem biometrycznym, wyposażonym w 2 akcelerometry, 2 żyroskopy i 3 czujniki ścisku, na rezystancyjnej powierzchni dotykowej, łączącym się bezprzewodowo z urządzeniami komputerowymi. We wstępie przedstawiono architekturę sieciową wielomodalnego systemu biometrii. Przedstawiono warstwę sprzętową systemu weryfikacji...
-
Usability study of various biometric techniques in bank branches
PublikacjaThe purpose of the presented research was to evaluate the performance of the prepared biometric algorithms and obtain information on the opinions and preferences of their users in bank branches. The study aimed to determine users' attitudes towards particular modalities and preferences on how to use biometrics after the bank customers had practical experience with the operation of the prototype solutions. The research results...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Modified dynamic time warping method applied to handwritten signature authenticity verification
PublikacjaA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method’s efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublikacjaDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
Contextual ontology for tonality assessment
Publikacjaclassification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...
-
Face detection algorithms evaluation for the bank client verification
PublikacjaResults of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...
-
Developing a Low SNR Resistant, Text Independent Speaker Recognition System for Intercom Solutions - A Case Study
PublikacjaThis article presents a case study on the development of a biometric voice verification system for an intercom solution, utilizing the DeepSpeaker neural network architecture. Despite the variety of solutions available in the literature, there is a noted lack of evaluations for "text-independent" systems under real conditions and with varying distances between the speaker and the microphone. This article aims to bridge this gap....
-
Evolutionary Algorithm for Selecting Dynamic Signatures Partitioning Approach
PublikacjaIn the verification of identity, the aim is to increase effectiveness and reduce involvement of verified users. A good compromise between these issues is ensured by dynamic signature verification. The dynamic signature is represented by signals describing the position of the stylus in time. They can be used to determine the velocity or acceleration signal. Values of these signals can be analyzed, interpreted, selected, and compared....
-
Application of dynamic time warping and cepstrograms to text-dependent speaker verification
PublikacjaThis work provides a description of an automatic speaker verification (ASV) system. In particular, it documents the evolution of all individual stages of the proposed ASV system design from the phase of preprocessing to an operational decision making system. The aim of this research was to achieve the system of the best safety and ease of use in view of users. The objective estimation of this target has been accomplished by assessing...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublikacjaAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublikacjaThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Elgold intermediate: verified by the authors
Dane BadawczeThe dataset contains the texts from Elgold intermediate: verified by verification team additionaly verified by the dataset authors but before the final validation step with the elgold toolset.
-
Elgold intermediate: verified by verification team
Dane BadawczeThe dataset contains the texts from Elgold intermediate: annotated raw additionaly verified by the five-person verification team. arly 25% of the mentions were corrected in some aspect.
-
Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
PublikacjaThis paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...
-
Biometria i przetwarzanie mowy 2023
Kursy Online{mlang pl} Celem kursu jest zapoznanie studentów z: metodami ustalania i potwierdzania tożsamości ludzi na podstawie mierzalnych cech organizmu cechami mowy ludzkiej, w szczególności polskiej metodami rozpoznawania mowy metodami syntezy mowy {mlang} {mlang en} The aim of the course is to familiarize the students with: methods of identification and verification of identity of people based on measurable features of their...
-
Biometria i przetwarzanie mowy 2024
Kursy Online{mlang pl} Celem kursu jest zapoznanie studentów z: metodami ustalania i potwierdzania tożsamości ludzi na podstawie mierzalnych cech organizmu cechami mowy ludzkiej, w szczególności polskiej metodami rozpoznawania mowy metodami syntezy mowy {mlang} {mlang en} The aim of the course is to familiarize the students with: methods of identification and verification of identity of people based on measurable features of their...
-
Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems
PublikacjaEvents in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...
-
cDNA fingerprint from the hepatopancreatic glands of pond snails (Lymnaea stagnalis) exposed to benzo[a]pyrene
PublikacjaIdentification of differentially expressed genes that could be potentially used as biomarkers of PAH exposure of common invertebrate animal (like freshwater snail) would be a valuable resource for investigators interested in toxicology and biomonitoring of aquatic environments. Therefore, the aim of this research was to investigate effects of waterborne benzo[a]pyrene (B[a]P) exposure on mRNA expression in the pond snail’s (Lymnaea...
-
Identyfikacja regionalna i branżowa oraz poziom zaangażowania jako determinanty sukcesu inicjatywy klastrowej Interizon
PublikacjaCelem niniejszego artykułu jest analiza trzech wybranych składowych tożsamości grupowej w inicjatywie klastrowej Interizon: identyfikacji regionalnej, identyfikacji branżowej oraz zaangażowania w sprawy inicjatywy oraz ocena ich wpływu na dotychczasowe sukcesy inicjatywy. Autorki opierały się na wynikach badań zrealizowanych w 2014 roku wśród członków inicjatywy Interizon. Badania przeprowadzone były dwufazowo, w oparciu o obserwacje...
-
Renewable Energy in the Pomerania Voivodeship—Institutional, Economic, Environmental and Physical Aspects in Light of EU Energy Transformation
PublikacjaIn the era of globalization and rapid economic growth, affecting most world economies, increased production and consumption are leading to higher levels of energy production and consumption. The growing demand for energy means that energy resources from conventional sources are not sufficient; moreover, its production generates high costs and contributes to the emission of greenhouse gases and waste. In view of the above, many...