Your search

In authors or contributors
Resource language
  • We give the theoretical foundation for finding a reject region which gives the minimum equal error rate in serial fusion based biometric verification. Given a user-specified tolerance of x percent genuine score reject rate, we prove that there exists a unique reject region inside which the false alarm rate and impostor pass rate curves overlap, and this reject region gives the minimum equal error rate. Our theory leads to new algorithms for finding reject regions, which have two key advantages over the state-of-the-art: (1) the algorithms allow the system administrator to control the proportion of genuine scores that a reject region can erroneously reject and (2) the algorithms determine reject regions directly from the scores, without the need to estimate score distributions. Our proofs do not rely on data belonging to any particular distribution, which makes them applicable to a wide range of biometric modalities including face, finger, iris, speech, gait, and keystrokes. © 2016 IEEE.

  • Person detection is often critical for personal safety, property protection, and national security. Most person detection technologies implement unimodal classification, making predictions based on a single sensor data modality, which is most often vision. There are many ways to defeat unimodal person detectors, and many more reasons to ensure technologies responsible for detecting the presence of a person are accurate and precise. In this paper, we design and implement a multimodal person detection system which can acquire data from multiple sensors and detect persons based on a variety of unimodal classifications and multimodal fusions. We present two methods of generating system-level predictions: (1) device perspectives which makes a final decision based on multiple device-level predictions and (2) system perspectives which combines data samples from multiple devices into a single data sample and then makes a decision. Our experimental results show that system-level predictions from system perspectives are generally more accurate than system-level predictions from device perspectives. We achieve an accuracy of 100%, zero false positive rate and zero false negative rate with fusion of system perspectives motion and distance data. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.

  • A multi-biometric verification system lowers the verification errors by fusing information from multiple biometric sources. Information can be fused in parallel or serial modes. While parallel fusion gives a higher accuracy, it may suffer from a serious problem of taking a longer verification time. Serial fusion can alleviate this problem by allowing the users to submit a subset of the available biometric characteristics. Unfortunately, several studies show that serial fusion may not reach the level of accuracy of parallel fusion. In this paper, we propose a fusion framework which combines the advantages of both parallel and serial fusion. The core of the framework is a new concept of “confident reject region” which incurs nearly zero verification error. We evaluate our framework by performing experiments on two multi-biometric verification systems built with NIST biometric scores set release 1. The experimental results show that our framework achieves a lower equal error rate and takes a shorter verification time than standard parallel fusion. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.

  • We defined a set of quantifiable features for authorship categorization. We performed our experiments on public domain literature - all books analyzed were obtained in plain text format through Project Gutenberg's online repository of classic books. We tested three machine learning algorithms: Artificial Neural Network, Naïve Bayes Classifier, and Support Vector Machine with our features. We found that certain features, such as punctuation and various suffixes result in a higher accuracy. In addition, the Support Vector Machine classifier produces repeatedly higher accuracies than other classifiers and seems to be a far superior method of classification in terms of authorship categorization. © 2016 IEEE.

  • Retweeting is an important way of information propagation on Twitter. In this paper, we investigate the sentiment correlation between regular tweets and retweets. We anticipate our investigation sheds a light on how the sentiment of regular tweets impacts the retweets of different sentiments. We propose a method for measuring the sentiment of tweets. We categorize the Twitter users into different groups by different norms, which are the follower count, the betweenness connectivity, a combination of follower count and betweenness centrality,and the amount of tweets. Then, we calculate the sentiment correlation for different groups to examine the influential factors for retweeting a message with a certain sentiment.We find that the users with higher betweenness centrality and higher tweets amount tend to exhibit a higher sentiment correlation. The users with medium-level followers_count show the highest sentiment correlation compared to the low-level and high-level followers_count. After combining the two factors of followers_count and betweenness centrality, we discover that specifically at low-level betweenness centrality the users with medium-level followers_count have the highest sentiment correlation. Our last observation is that the difference for correlation coefficients exists between different types of users. Our study on the sentiment correlation provides instructional information for modeling information propagation in human society. © 2020, Springer-Verlag GmbH Austria, part of Springer Nature.

  • Poor security practices among smartphone users, such as the use of simple, easily guessed passcodes for logins, are a result of the effort required to memorize stronger ones. In this paper, we devise a concept of “open code” biometric tap pad to authenticate smartphone users, which eliminates the need of memorizing secret codes. A biometric tap pad consists of a grid of buttons each labeled with a unique digit. The user attempting to log into the phone will tap these buttons in a given sequence. He/she will not memorize this tap sequence. Instead, the sequence will be displayed on the screen. The focus here is how the user types the sequence. This typing behavior is used for authentication. An open code biometric tap pad has several advantages, such as (1) users do not need to memorize passcodes, (2) manufacturers do not need to include extra sensors, and (3) onlookers have no chance to practice shoulder-surfing. We designed three tap pads and incorporated them into an Android app. We evaluated the performance of these tap pads by experimenting with three sequence styles and five different fingers: two thumbs, two index fingers, and the “usual” finger. We collected data from 33 participants over two weeks. We tested three machine learning algorithms: Support Vector Machine, Artificial Neural Network, and Random Forest. Experimental results show significant promise of open code biometric tap pads as a solution to the problem of weak smartphone security practices used by a large segment of the population.

  • The traditional architecture of serial fusion based multi-biometric verification systems places an average performing or the worst performing individual verifier in the final stage. Because the final stage gives the verification decision using a single threshold and takes on the most confusing samples which are rejected by all previous stages, an average or the worst performing individual verifier may incur high verification errors in the final stage, which may negatively impact the performance of the whole system. Unfortunately, it is not possible to place a strong individual verifier in the final stage of a traditional architecture because if we place a strong individual verifier in the final stage, we will have to place a weak individual verifier in an earlier stage. Studies show that placing a weak individual verifier in an earlier stage worsens the performance of the whole system by giving more wrong decision earlier. Hence, the challenge is-how can we place the best performing individual verifier in the first stage and at the same time not place an average or the worst performing individual verifier in the final stage? In this paper, we address this challenge. We have come up with a very simple but effective solution. We have proposed a modification to the traditional architecture of serial fusion based multi-biometric verification systems. With rigorous experiments on the NIST multi-modal dataset and using three serial fusion based multi-biometric verification schemes, we demonstrated that our proposed architecture significantly improves the performance of serial fusion based multi-biometric verification systems. © 2018 IEEE.

  • This paper focuses on how zoom touchscreen gestures can be used to continuously authenticate and identify smartphone users. The zoom gesture is critically under-researched as a behavioral biometric despite richness of data found in this gesture. Furthermore, analysing how the zoom gesture performs over time is a novel line of inquiry. Zoom samples from three different data collection sessions were sourced. In these sessions, each participant zoomed in and out on three images. Eighty-five features were extracted from each gesture. The classification models used were Support Vector Machine (SVM), Random Forest (RF), and K-nearest Neighbor (KNN). The best authentication performance of AUC 0.937 and EER 10.6% were achieved using the SVM classifier. The best identification performance of 65.5% accuracy, 69.6% precision, and 67.9% recall were achieved using the RF classifier. In terms of stability over time, SVM proved to be the most stable classifier, with an AUC degradation of only 0.007 after two weeks had elapsed. This analysis proves that zoom gestures demonstrate promise for use in continuous smartphone authentication and identification applications. © 2021 Elsevier Ltd

  • Smartphones, while providing users ease of access to sensitive information on the go, also present severe security risks if an attacker is able to gain access to them. To strengthen the user authentication and identification in a smartphone, we develop a biometric authentication and identification system which uses the capacitive touchscreen that is featured in all current smartphones. Our methodology focuses on using the touchscreen as a sensor to capture the image of a user's ear, thumb or four fingers. We extract the capacitive raw data from the touched body part to obtain a capacitive image, and then use it to capture geometric features (e.g., length and width of a finger) and principal components. After that, we experiment with Support Vector Machine (SVM) and Random Forest (RF) classifiers to verify and also identify each user. We achieved the maximum authentication accuracy of 98.84% by four fingers with SVM, and maxinum identification accuracy of 97.61% by four fingers with RF. © 2016 IEEE.

  • Authorship attribution identifies the true author of an unknown document. Authorship attribution plays a crucial role in plagiarism detection and blackmailer identification, however, the existing studies on authorship attribution in Bengali are limited. In this paper, we propose an instance-based deep authorship attribution model, called DAAB, to identify authors in Bengali. Our DAAB model fuses features from convolutional neural networks and another set of features from an artificial neural network to learn the stylometry of an author for authorship attribution. Extensive experiments with three real benchmark datasets such as Bengali-Quora and two online Bengali Corpus demonstrate the superiority of our authorship attribution model. © 2021 IEEE.

Last update from database: 3/13/26, 4:15 PM (UTC)

Explore

Resource type

Resource language