ARTICLE | doi:10.20944/preprints202007.0658.v1
Subject: Mathematics & Computer Science, Information Technology & Data Management Keywords: biometric matching; fully homomorphic encryption; privacy-preserving techniques
Online: 27 July 2020 (06:19:29 CEST)
One of the most reliable methods of authentication used today is biometric matching. This authentication process, which is done by using biometrics information such as fingerprint, iris, face, etc. is used in many application areas. Authentication at border gates is one of these areas. However, some restrictions have been introduced to storing and using such data, especially with the General Data Protection Regulation (GDPR). The main goal of this work is to find the practical implementation of fully homomorphic encryption-based biometric matching in border controls. In this paper, we propose a biometric authentication system based on hash expansion and fully homomorphic encryption features, considering these restrictions. One of the most significant drawbacks of the homomorphic encryption method is the long execution time. We solved this problem by executing the matching algorithm in parallel manner. The proposed scheme is implemented as proof-of-concept in the SMILE, and its advantages in privacy preservation has been demonstrated.
ARTICLE | doi:10.20944/preprints202301.0522.v1
Subject: Engineering, General Engineering Keywords: autonomous vehicle; data set; multidriver; biometric
Online: 28 January 2023 (07:55:36 CET)
The development of autonomous vehicles is becoming increasingly popular and gathering real world data is considered a valuable task. Many datasets have been published recently in the autonomous vehicle sector, with synthetic datasets gaining particular interest due to availability and cost. For a real implementation and correct evaluation of vehicles at higher levels of autonomy it is also necessary to consider human interaction, which is precisely something that lacks in existing datasets. In this article the UPCT dataset is presented, a public dataset containing high quality, multimodal data obtained using state of the art sensors and equipment installed onboard the UPCT’s CICar autonomous vehicle. The dataset includes data from a variety of perception sensors including 3D LiDAR, cameras, IMU, GPS, encoders, as well as driver biometric data and driver behaviour questionnaires. In addition to the dataset, the software developed for data synchronisation and processing has been made available. The quality of the dataset was validated using an end-to-end neural network model with multiple inputs to obtain speed and steering wheel angle and obtained very promising results.
ARTICLE | doi:10.20944/preprints201811.0239.v1
Subject: Mathematics & Computer Science, General & Theoretical Computer Science Keywords: wireless sensor networks; user authentication; biometric; smart card
Online: 9 November 2018 (04:15:26 CET)
Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme by fixing such vulnerabilities and improving the performance of the protocol.
ARTICLE | doi:10.20944/preprints202012.0118.v1
Subject: Medicine & Pharmacology, Allergology Keywords: ultrasound biomicroscopy; biometric measurement; anterior segment cysts; iris cysts
Online: 4 December 2020 (15:11:24 CET)
Study evaluates the characteristics and clinical course of patients with iris cysts in the long term of follow-up (24-48 months). We analyzed retrospectively the medical records of 39 patients with iris cysts (27 female and 12 male). Age, visual acuity, intraocular pressure (IOP), slit-lamp evaluation, and ultrasound biomicroscopy images were assessed. The mean age at diagnosis was 40.6±17.48 years. 30 (76.9%) cysts were peripheral, 5 (12.8%) cysts located at the pupillary margin, 2 (5.1%) cysts were midzonal and 2 (5.1%) multichamber cysts extended from the periphery to the pupillary margin. 23 (59%) cysts were in the lower temporal quadrant, 11 (28.2%) cysts in the lower nasal quadrant, and 5 (12.8%) cysts in the upper nasal quadrant. Cyst size was positively correlated with the age of the patients (rs = 0.38, p = 0.003) and negatively correlated with visual acuity (rs = -0.42, p = 0.014). No cyst growth was documented. The only complication was an increase in IOP in 3 (7.7%) patients with multiple cysts. The anatomical location of cysts cannot differentiate them from solid tumors. The vast majority of cysts are asymptomatic, do not increase in size, and do not require treatment in long-term follow-up.
ARTICLE | doi:10.20944/preprints201811.0323.v1
Subject: Mathematics & Computer Science, Information Technology & Data Management Keywords: cyber-physical systems; WBAN security; biometric authentication; medical systems
Online: 14 November 2018 (08:03:19 CET)
A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication. Extensive research has been conducted regarding the various methodologies (e.g. ECG, EEG, gait, head/arm motion, skin impedance). This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation. We suggest several authentication schemes which incorporate multiple biometric properties.
REVIEW | doi:10.20944/preprints201804.0072.v1
Subject: Engineering, Electrical & Electronic Engineering Keywords: ANN; biometric; crime-scene; fuzzy logic; gait; human footprint; Hidden Markov Model; PCA; Recognition
Online: 6 April 2018 (08:54:28 CEST)
Human footprint is having a unique set of ridges unmatched by any other human being, and therefore it can be used in different identity documents for example birth certificate, Indian biometric identification system AADHAR card, driving license, PAN card, and passport. There are many instances of the crime scene where an accused must walk around and left the footwear impressions as well as barefoot prints and therefore it is very crucial to recovering the footprints to identify the criminals. Footprint-based biometric is a considerably newer technique for personal identification. Fingerprints, retina, iris and face recognition are the methods most useful for attendance record of the person. This time world is facing the problem of global terrorism. It is challenging to identify the terrorist because they are living as regular as the citizens do. Their soft target includes the industries of special interests such as defense, silicon and nanotechnology chip manufacturing units, pharmacy sectors. They pretend themselves as religious persons, so temples and other holy places, even in markets is in their targets. These are the places where one can obtain their footprints easily. The gait itself is sufficient to predict the behaviour of the suspects. The present research is driven to identify the usefulness of footprint and gait as an alternative to personal identification.
ARTICLE | doi:10.20944/preprints202111.0177.v1
Subject: Keywords: Electronic Voting Machine; biometric fingerprint authentication; embedded systems applications; electronic voting technology; user friendly environment; system oriented approach
Online: 9 November 2021 (13:51:17 CET)
A reliable Electronic Voting Machine (EVM) is proposed and implemented in this study, which is integrated with a biometric fingerprint scanner to ensure a secure election process. This biometric EVM includes features such as an interactive user interface, hack-free design and master lock. The EVM system has the capability of registering user data and storing them in a database through proper authentication. Moreover, the system proposed lowers the requirement for human resources. This paper provides a detailed description of the systematic development of the hardware and software used. The software part includes algorithm development and implementation. A thorough and in-depth understanding of the data and the communication protocols along with the pathways used for storage of data in the devices is provided. Additionally, the cost of the system is 62.82% less than the officially existing EVM machines of India. Furthermore, this study seeks to demonstrate the benefits of such an approach from a technological and a social standpoint.