SlideShare a Scribd company logo
1 of 33
Download to read offline
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Biometric Signature Veriļ¬cation
A Tomasi1

M Sala1

V Da Rold1

1 University of Trento
Department of Mathematics
2 Fondazione Bruno Kessler
Security and Trust

May 30, 2013

BioSigV

G Sciarretta2
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Outline

1

Biometric Authentication

2

Error correction

3

Hash functions

4

Fuzzy Commitment

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Biometric Authentication

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Authentication systems
Authentication systems can be based on several factors:
something you know,

password!

something you have,

something you are.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Biometric measures
Physical biometrics:
Pros :
Cannot be lost or forgotten
Diļ¬ƒcult to forge
Cons :
Intrusive, or at least perceived as such
Diļ¬ƒcult if not impossible to revoke
Present and future privacy issues: health,
ethnicity etc.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Biometric signature I
A behavioural, non-intrusive measurement, familiar and widely
accepted. Con: high variability.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Biometric signature II

Input data: [x,y,t,p,e]
Extracted features:
ID
1
2
3
4-5
6-7
8-9

Description
Number of Strokes
Time Duration
Aspect Ratio
X and Y Area
Average X and Y Velocity
Absolute Average X and Y Velocity

ID
10-11
12-13
14-15
16-20
21-30
31-40

Description
Average X and Y Acceleration
Initial X and Y
Final X and Y
M1,1 ,M1,2 ,M2,1 and M0,3
X and Y Sub-Areas
X and Y Sub-Velocity

BioSigV

ID
41-50
51-52
53-55
56-58
59-61
62-63

Description
X and Y Sub-Accelerations
Height and Width
Mean X,Y and Pressure Value
Maximum X,Y and Pressure Value
Minimum X,Y and Pressure Value
Maximum X and Y Velocity
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Genuines vs. forgeries
Some features are more
distinguishing than others.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Error correction

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Error correction

Consider the following scenario: a source sends a message m
across a channel to a receiver. The channel is aļ¬€ected by noise,
which modiļ¬es the signal.
Broadly speaking, an error correction scheme is composed of two
algorithms, E ncode and Decode, that modify the message to make
it more resilient to errors e, so that
D (E (m) + e) = m
for suļ¬ƒciently ā€œsmallā€ e.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Linear block ECC I
Let Fq be the ļ¬nite ļ¬eld with q elements and (Fq )n be the linear
space of all n-tuples over Fq .
Deļ¬nition
Let k, n āˆˆ N such that 1 ā‰¤ k ā‰¤ n. A linear code C is a
k-dimensional vector subspace of (Fq )n .
Deļ¬nition
If C is an [n, k]q code, then any matrix G whose rows form a basis
for C as a k-dimensional vector space is called a generator matrix
for C .
The encoding procedure of a message m āˆˆ (Fq )k into the word
c āˆˆ (Fq )n is just mG = c.
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Linear block ECC II

Concretely, we split a message m into blocks of length k and map
every possible mk into a codeword, c. Crudely speaking, this is a
more complex form of redundancy:

1 ā†’ [111]
0 ā†’ [000]
A code with minimum distance d can detect up to d āˆ’ 1 and
correct up to (d āˆ’ 1)/2 errors.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Cyclic Codes
Deļ¬nition
An [n, k, d]q linear code C is cyclic if the cyclic shift of a word is
also a word, i.e.
(c0 , . . . , cnāˆ’1 ) āˆˆ C

=ā‡’

(cnāˆ’1 , c0 , . . . , cnāˆ’2 ) āˆˆ C .

Consider the univariate polynomial ring Fq [x] and the ideal
I = x n āˆ’ 1 . We denote by R the ring Fq [x]/I . We construct a
bijective correspondence between the vectors of (Fq )n and the
residue classes of polynomials in R:
(v0 , . . . , vnāˆ’1 ) ā†” v0 + v1 x + Ā· Ā· Ā· + vnāˆ’1 x nāˆ’1 .
We can view linear codes as subsets of the ring R, thanks to the
correspondence above.
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Generator Polynomial
Theorem
An [n, k, d]q code C is cyclic iļ¬€ C is an ideal of R.
Since R is a principal ideal ring (if C is not trivial) there exists a
unique monic polynomial g that generates C . We call g the
generator polynomial of C .
Let m = (m0 , . . . , mkāˆ’1 ) be a message to encode, and consider its
polynomial representation m(x) in R. To obtain an associated word
it is suļ¬ƒcient to multiply m(x) by the generator polynomial g (x):
c(x) = m(x)g (x) āˆˆ C .

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Hash functions

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Hash functions
A cryptographic hash function h maps messages of arbitrary
length1 into a ļ¬xed-length message digest. Hash functions are
required to be:
one-way : given a known digest d generated by a known hash
function h(Ā·), it is infeasible to deduce m such that
d = h(m);
collision resistant : it is infeasible to ļ¬nd explicitly two messages
m1 , m2 such that h(m1 ) = h(m2 );
input sensitive : the smallest diļ¬€erence between two messages
m1 , m2 leads to completely diļ¬€erent digests
h(m1 ), h(m2 ).
1

up to some very large maximum
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Example: SHA-1
SHA-1: Security Hash Algorithm [FIPS2 180-1]. Given an input
message of length up to 264 bits, SHA-1 outputs a 160-bit string:
message
mā€™illumino di immenso
mi illumino di immenso
Roma
roma

2

SHA-1 digest
04DEC8C39C14B4E5AB28
4EE204C81D58F1A59936
666BCFA1CC6D6580F316
AF077B85B9DE34055A57
DE5429D6F4FA2C86427A
50757791DE88A0B75C85
A6B6EA31C49A8E944EFE
9ECBC072A26903A1461A

Federal Information Processing Standard
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Collision resistance
The collision resistance of hash functions can be measured in terms
of their robustness against birthday attacks, i.e. the number of
brute-force hash operations it takes, in probability, before we ļ¬nd
two messages with the same hash by simply picking random
messages from the whole message space. For an n-bit output hash,
this is proportional to 2n/2 .
Crudely speaking, assume we have a commercial PC capable of
performing hashes at 1 GHz, i.e. 109 h(Ā·)s āˆ’1 . A 128-bit digest hash
such as SHA-1 will yield a collision in at most roughly 2 Ā· 1019
hashes, which would take at most 30 years. Adding processing
power and ļ¬nding vulnerabilities in the hash function signiļ¬cantly
reduce the waiting time.
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Fuzzy Commitment

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Fuzziļ¬cation
By applying a repeatable but non-invertible transform f (s) to the
signature we commit enough biometric data to authenticate users,
but as little as possible to preserve privacy. We do this based on
thresholds.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

The scheme at a glance
Enrolment(s):
1
2
3

generate a random message, r , and encode it (E (r ))
sum the message with the fuzzy median signature, f (ĀÆ)
s
commit enrolment data:
a hash of the message, h(r )
a user-speciļ¬c string, u = E (r ) + f (ĀÆ)
s
the error correction capacity t corresponding to the user

Veriļ¬cation(Ė†, h(r ), u, t):
s
1

subtract the fuzzy observed signature from the userā€™s string:
v = u āˆ’ f (Ė†)
s
= E (r ) + f (ĀÆ) āˆ’ f (Ė†)
s
s
= E (r ) + e

2

3

correct the errors in the transmitted message:
Ė† = D(E (r ) + e);
r
if h(r ) == h(Ė†), accept the observed signature as authentic.
r
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Encoding choices

Block codes make sense for authentication schemes because we
can precisely deļ¬ne the length of our encoded message (n).
Furthermore, for MDS codes, i.e. ones for which strict equality
holds in the Singleton bound d ā‰¤ n āˆ’ k + 1, we can uniquely
associate an error correction capacity t with a given message and
code length. We can also tweak t based on whether we want to
make it easier for users to authenticate themselves or harder for
forgers to gain access.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Privacy and cancelability

Cancelability

Privacy

Since the random message r is generated at
enrolment, any user can enrol the same
signature again.
The signature itself can be changed, since it is
behavioural.
A suļ¬ƒciently long random message r and robust
hash function h(Ā·) ensure that the userā€™s
biometric data cannot be recovered by anyone.
Even if the data were recovered, all we have
committed is a fuzzy version.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Enrolment

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Authentication

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Privacy and cancelability
Cancelability

Since the random message r is generated at
enrolment, any user can enrol the same
signature again.
The signature itself can be changed, since it is a
behavioural measure.

Privacy

A suļ¬ƒciently long random message r and robust
hash function h(Ā·) ensure that the userā€™s
biometric data cannot be feasibly recovered by
anyone, whether thief or system administrator.
Even if the data were recovered, all we have
committed is a fuzzy version.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

Performance

Assessed against both research and custom database, allowing two
authentication attempts.
False Rejection Rate / Type I Error: 3.5%
False Acceptance Rate / Type II Error: 3.2%
Work commissioned by PayBay Networks Srl, part of QUI!Group

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[Bov+03]

L Bovino et al. ā€œMulti-Expert Veriļ¬cation of
Hand-Written Signaturesā€. In: Proceedings of the
Seventh International Conference on Document
Analysis and Recognition (ICDAR). Vol. 2.
Washington, DC, USA: IEEE Computer Society, 2003,
pp. 932ā€“936. isbn: 0-7695-1960-1. doi:
10.1.1.160.9174.

[Fre08]

M. R. Freire. ā€œBiometric Template Protection in
Dynamic Signature Veriļ¬cationā€. MSc. Universidad
AutĀ“noma de Madrid, Nov. 2008.
o

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[GJ07]

G. K. Gupta and R. C. Joyce. ā€œUsing position extrema
points to capture shape in on-line handwritten
signature veriļ¬cationā€. In: Pattern Recognition 40.10
(Oct. 2007), pp. 2811ā€“2817. issn: 0031-3203. doi:
10.1016/j.patcog.2007.01.014.

[IP08]

D. Impedovo and G. Pirlo. ā€œAutomatic Signature
Veriļ¬cation: The State of the Artā€. In: Systems, Man,
and Cybernetics, Part C: Applications and Reviews,
IEEE Transactions on 38.5 (Sept. 2008), pp. 609ā€“635.
issn: 1094-6977. doi: 10.1109/TSMCC.2008.923866.

[IW09]

T. Ignatenko and F. M. J. Willems. ā€œBiometric
Systems: Privacy and Secrecy Aspectsā€. In:
Information Forensics and Security, IEEE Transactions
on 4.4 (2009), pp. 956ā€“973. issn: 1556-6013. doi:
10.1109/TIFS.2009.2033228.
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[IW10]

T. Ignatenko and F. M. J. Willems. ā€œUsing position
extrema points to capture shape in on-line handwritten
signature veriļ¬cationā€. In: Information Forensics and
Security, IEEE Transactions on 5.2 (2010),
pp. 337ā€“348. doi: 10.1109/TIFS.2010.2046984.

[JGC02]

A. K. Jain, F. D. Griess, and S. D. Connell. ā€œOn-line
signature veriļ¬cationā€. In: Pattern Recognition 35
(2002), pp. 2963ā€“2972.

[JNN08]

A. K. Jain, K. Nandakumar, and A. Nagar. ā€œBiometric
template securityā€. In: EURASIP Journal on Advances
in Signal Processing (Jan. 2008). issn: 1110-8657.
doi: 10.1155/2008/579416.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[JS06]

A. Juels and M. Sudan. ā€œA fuzzy vault schemeā€. In:
Designs, Codes and Cryptography 38.2 (2006),
pp. 237ā€“257. doi: 10.1007/s10623-005-6343-z.

[JW99]

A. Juels and M. Wattenberg. ā€œA fuzzy commitment
schemeā€. In: Proceedings of the 6th ACM conference
on Computer and communications security (CCS ā€™99ā€™).
Kent Ridge Digital Labs, Singapore: ACM, 1999,
pp. 28ā€“36. isbn: 1-58113-148-8. doi:
10.1145/319709.319714.

[LBA96]

L Lee, T Berger, and E Aviczer. ā€œReliable On-Line
Human Signature Veriļ¬cation Systemsā€. In: IEEE
Trans. Pattern Anal. Mach. Intell. 18.6 (June 1996),
pp. 643ā€“647. issn: 0162-8828. doi:
10.1109/34.506415.
BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[Lee+04]

J. Lee et al. ā€œUsing geometric extrema for
segment-to-segment characteristics comparison in
online signature veriļ¬cationā€. In: Pattern Recognition
37.1 (Jan. 2004), pp. 93ā€“103. issn: 0031-3203. doi:
10.1016/S0031-3203(03)00229-2.

[Liw+11]

M. Liwicki et al. ā€œSignature Veriļ¬cation Competition
for Online and Oļ¬„ine Skilled Forgeries
(SigComp2011)ā€. In: Document Analysis and
Recognition (ICDAR), 2011 International Conference
on. IEEE Computer Society. 2011, pp. 1480ā€“1484.
doi: 10.1109/ICDAR.2011.294.

BioSigV
Biometric Authentication
Error correction
Hash functions
Fuzzy Commitment
References

[Liw+12]

M. Liwicki et al. ā€œICFHR 2012 Competition on
Automatic Forensic Signature Veriļ¬cation (4NsigComp
2012)ā€. In: Frontiers in Handwriting Recognition
(ICFHR), 2012 International Conference on. IEEE.
Bari, Sept. 2012, pp. 823ā€“828. doi:
10.1109/ICFHR.2012.217.

[SE00]

S Sanderson and J. H. Erbetta. ā€œAuthentication for
secure environments based on iris scanning
technologyā€. In: Visual Biometrics (Ref.No. 2000/018),
IEE Colloquium on. 2000, pp. 8/1ā€“8/7. doi:
10.1049/ic:20000468.

[YWP95]

L Yang, B. K. Widjaja, and R Prasad. ā€œApplication of
hidden Markov models for signature veriļ¬cationā€. In:
Pattern Recognition 28.2 (1995), pp. 161ā€“170. issn:
0031-3203. doi: 10.1016/0031-3203(94)00092-Z.
BioSigV

More Related Content

What's hot

Error Control coding
Error Control codingError Control coding
Error Control codingDr Naim R Kidwai
Ā 
error control coding
error control coding error control coding
error control coding Suhad Malayshi
Ā 
Source coding
Source codingSource coding
Source codingMOHIT KUMAR
Ā 
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyAn Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyCSCJournals
Ā 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...TELKOMNIKA JOURNAL
Ā 
Digital signature
Digital signatureDigital signature
Digital signatureCoders Hub
Ā 
IRJET- Formulation of a Secure Communication Protocol and its Implementation
IRJET-  	  Formulation of a Secure Communication Protocol and its ImplementationIRJET-  	  Formulation of a Secure Communication Protocol and its Implementation
IRJET- Formulation of a Secure Communication Protocol and its ImplementationIRJET Journal
Ā 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their DecodingKakali Saharia
Ā 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsNestor Barraza
Ā 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonaniruddh Tyagi
Ā 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knightDevanshi Piprottar
Ā 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codesShailesh Tanwar
Ā 
Coding theory updated
Coding theory updatedCoding theory updated
Coding theory updated14cs40128
Ā 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingBhagwat Singh Rathore
Ā 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
Ā 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemTELKOMNIKA JOURNAL
Ā 

What's hot (19)

Error Control coding
Error Control codingError Control coding
Error Control coding
Ā 
error control coding
error control coding error control coding
error control coding
Ā 
Source coding
Source codingSource coding
Source coding
Ā 
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyAn Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
Ā 
79 83
79 8379 83
79 83
Ā 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Ā 
Coding
CodingCoding
Coding
Ā 
Digital signature
Digital signatureDigital signature
Digital signature
Ā 
IRJET- Formulation of a Secure Communication Protocol and its Implementation
IRJET-  	  Formulation of a Secure Communication Protocol and its ImplementationIRJET-  	  Formulation of a Secure Communication Protocol and its Implementation
IRJET- Formulation of a Secure Communication Protocol and its Implementation
Ā 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Ā 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping sets
Ā 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
Ā 
Slides
SlidesSlides
Slides
Ā 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
Ā 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codes
Ā 
Coding theory updated
Coding theory updatedCoding theory updated
Coding theory updated
Ā 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
Ā 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
Ā 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problem
Ā 

Viewers also liked

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
Ā 
Elcom biometric signature Presented by Arxtech
Elcom biometric signature Presented by ArxtechElcom biometric signature Presented by Arxtech
Elcom biometric signature Presented by ArxtechArxtech Canada
Ā 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
Ā 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
Ā 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIPbabak danyal
Ā 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
Ā 
Bio battery 2003
Bio battery 2003Bio battery 2003
Bio battery 2003santhosh reddy
Ā 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
Ā 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
Ā 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
Ā 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
Ā 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
Ā 

Viewers also liked (13)

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
Ā 
Elcom biometric signature Presented by Arxtech
Elcom biometric signature Presented by ArxtechElcom biometric signature Presented by Arxtech
Elcom biometric signature Presented by Arxtech
Ā 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Ā 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Ā 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP
Ā 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
Ā 
Bio battery 2003
Bio battery 2003Bio battery 2003
Bio battery 2003
Ā 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
Ā 
bio batteryyyyy
bio batteryyyyybio batteryyyyy
bio batteryyyyy
Ā 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
Ā 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Ā 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
Ā 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
Ā 

Similar to Testimonianza di Alessandro Tommasi presentation biosig

13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.pptWinterSnow16
Ā 
06 ET 351_Lecture_06_January_07_2023.ppt
06 ET 351_Lecture_06_January_07_2023.ppt06 ET 351_Lecture_06_January_07_2023.ppt
06 ET 351_Lecture_06_January_07_2023.pptOmmyOmar
Ā 
Data links
Data links Data links
Data links EshaAfzal5
Ā 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
Ā 
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docx
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docxQuestion 1 of 215.0 PointsPseudo-random generators, pseudo.docx
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docxIRESH3
Ā 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoderijsrd.com
Ā 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
Ā 
5 linear block codes
5 linear block codes5 linear block codes
5 linear block codesJagruti_Ingale
Ā 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementationramya c b
Ā 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
Ā 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - SecurityWayne Jones Jnr
Ā 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -IntroductionBurdwan University
Ā 
Channel Coding.ppt
Channel Coding.pptChannel Coding.ppt
Channel Coding.pptHendIbrahim35
Ā 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
Ā 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
Ā 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoderijsrd.com
Ā 

Similar to Testimonianza di Alessandro Tommasi presentation biosig (20)

13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
Ā 
06 ET 351_Lecture_06_January_07_2023.ppt
06 ET 351_Lecture_06_January_07_2023.ppt06 ET 351_Lecture_06_January_07_2023.ppt
06 ET 351_Lecture_06_January_07_2023.ppt
Ā 
Data links
Data links Data links
Data links
Ā 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Ā 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
Ā 
lecture13.pdf
lecture13.pdflecture13.pdf
lecture13.pdf
Ā 
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docx
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docxQuestion 1 of 215.0 PointsPseudo-random generators, pseudo.docx
Question 1 of 215.0 PointsPseudo-random generators, pseudo.docx
Ā 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
Ā 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Ā 
5 linear block codes
5 linear block codes5 linear block codes
5 linear block codes
Ā 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementation
Ā 
rs_1.pptx
rs_1.pptxrs_1.pptx
rs_1.pptx
Ā 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Ā 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
Ā 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
Ā 
Channel Coding.ppt
Channel Coding.pptChannel Coding.ppt
Channel Coding.ppt
Ā 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Ā 
Protocols for Provable Solvency
Protocols for Provable SolvencyProtocols for Provable Solvency
Protocols for Provable Solvency
Ā 
Linear block coding
Linear block codingLinear block coding
Linear block coding
Ā 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
Ā 

More from laboratoridalbasso

Ldb Rural in Action_CurandiKatz
Ldb Rural in Action_CurandiKatz Ldb Rural in Action_CurandiKatz
Ldb Rural in Action_CurandiKatz laboratoridalbasso
Ā 
Ldb Rural in Action_Coppola 01
Ldb Rural in Action_Coppola 01Ldb Rural in Action_Coppola 01
Ldb Rural in Action_Coppola 01laboratoridalbasso
Ā 
Ldb Rural in Action_Coppola 02
Ldb Rural in Action_Coppola 02Ldb Rural in Action_Coppola 02
Ldb Rural in Action_Coppola 02laboratoridalbasso
Ā 
Ldb neetneedeu panetta 08
Ldb neetneedeu panetta 08 Ldb neetneedeu panetta 08
Ldb neetneedeu panetta 08 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 07
Ldb neetneedeu panetta 07 Ldb neetneedeu panetta 07
Ldb neetneedeu panetta 07 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 06
Ldb neetneedeu panetta 06 Ldb neetneedeu panetta 06
Ldb neetneedeu panetta 06 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 05
Ldb neetneedeu panetta 05 Ldb neetneedeu panetta 05
Ldb neetneedeu panetta 05 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 04
Ldb neetneedeu panetta 04 Ldb neetneedeu panetta 04
Ldb neetneedeu panetta 04 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 03
Ldb neetneedeu panetta 03 Ldb neetneedeu panetta 03
Ldb neetneedeu panetta 03 laboratoridalbasso
Ā 
Ldb neetneedeu cavalhro 01
Ldb neetneedeu cavalhro 01Ldb neetneedeu cavalhro 01
Ldb neetneedeu cavalhro 01laboratoridalbasso
Ā 
Ldb neetneedeu panetta 01
Ldb neetneedeu panetta 01 Ldb neetneedeu panetta 01
Ldb neetneedeu panetta 01 laboratoridalbasso
Ā 
Ldb neetneedeu panetta 02
Ldb neetneedeu panetta 02Ldb neetneedeu panetta 02
Ldb neetneedeu panetta 02laboratoridalbasso
Ā 
Ldb Asola, non Verba_Santanocito02
Ldb Asola, non Verba_Santanocito02Ldb Asola, non Verba_Santanocito02
Ldb Asola, non Verba_Santanocito02laboratoridalbasso
Ā 
Ldb Asola, non Verba_Santanocito01
Ldb Asola, non Verba_Santanocito01Ldb Asola, non Verba_Santanocito01
Ldb Asola, non Verba_Santanocito01laboratoridalbasso
Ā 
Ldb Asola Non Verba_Attanasio
Ldb Asola Non Verba_AttanasioLdb Asola Non Verba_Attanasio
Ldb Asola Non Verba_Attanasiolaboratoridalbasso
Ā 
#LdbStorytelling_Rural in Action
#LdbStorytelling_Rural in Action#LdbStorytelling_Rural in Action
#LdbStorytelling_Rural in Actionlaboratoridalbasso
Ā 
Tre anni di Laboratori dal Basso
Tre anni di Laboratori dal BassoTre anni di Laboratori dal Basso
Tre anni di Laboratori dal Bassolaboratoridalbasso
Ā 
Ldb valecoricerca_lentini_web
Ldb valecoricerca_lentini_webLdb valecoricerca_lentini_web
Ldb valecoricerca_lentini_weblaboratoridalbasso
Ā 
Ldb valecoricerca_indolfi_brevetti_3
Ldb valecoricerca_indolfi_brevetti_3Ldb valecoricerca_indolfi_brevetti_3
Ldb valecoricerca_indolfi_brevetti_3laboratoridalbasso
Ā 

More from laboratoridalbasso (20)

Ldb Rural in Action_CurandiKatz
Ldb Rural in Action_CurandiKatz Ldb Rural in Action_CurandiKatz
Ldb Rural in Action_CurandiKatz
Ā 
Ldb Rural in Action_Coppola 01
Ldb Rural in Action_Coppola 01Ldb Rural in Action_Coppola 01
Ldb Rural in Action_Coppola 01
Ā 
Ldb Rural in Action_Coppola 02
Ldb Rural in Action_Coppola 02Ldb Rural in Action_Coppola 02
Ldb Rural in Action_Coppola 02
Ā 
Ldb neetneedeu panetta 08
Ldb neetneedeu panetta 08 Ldb neetneedeu panetta 08
Ldb neetneedeu panetta 08
Ā 
Ldb neetneedeu panetta 07
Ldb neetneedeu panetta 07 Ldb neetneedeu panetta 07
Ldb neetneedeu panetta 07
Ā 
Ldb neetneedeu panetta 06
Ldb neetneedeu panetta 06 Ldb neetneedeu panetta 06
Ldb neetneedeu panetta 06
Ā 
Ldb neetneedeu panetta 05
Ldb neetneedeu panetta 05 Ldb neetneedeu panetta 05
Ldb neetneedeu panetta 05
Ā 
Ldb neetneedeu panetta 04
Ldb neetneedeu panetta 04 Ldb neetneedeu panetta 04
Ldb neetneedeu panetta 04
Ā 
Ldb neetneedeu panetta 03
Ldb neetneedeu panetta 03 Ldb neetneedeu panetta 03
Ldb neetneedeu panetta 03
Ā 
Ldb neetneedeu cavalhro 01
Ldb neetneedeu cavalhro 01Ldb neetneedeu cavalhro 01
Ldb neetneedeu cavalhro 01
Ā 
Ldb neetneedeu panetta 01
Ldb neetneedeu panetta 01 Ldb neetneedeu panetta 01
Ldb neetneedeu panetta 01
Ā 
Ldb neetneedeu_mola 01
Ldb neetneedeu_mola 01Ldb neetneedeu_mola 01
Ldb neetneedeu_mola 01
Ā 
Ldb neetneedeu panetta 02
Ldb neetneedeu panetta 02Ldb neetneedeu panetta 02
Ldb neetneedeu panetta 02
Ā 
Ldb Asola, non Verba_Santanocito02
Ldb Asola, non Verba_Santanocito02Ldb Asola, non Verba_Santanocito02
Ldb Asola, non Verba_Santanocito02
Ā 
Ldb Asola, non Verba_Santanocito01
Ldb Asola, non Verba_Santanocito01Ldb Asola, non Verba_Santanocito01
Ldb Asola, non Verba_Santanocito01
Ā 
Ldb Asola Non Verba_Attanasio
Ldb Asola Non Verba_AttanasioLdb Asola Non Verba_Attanasio
Ldb Asola Non Verba_Attanasio
Ā 
#LdbStorytelling_Rural in Action
#LdbStorytelling_Rural in Action#LdbStorytelling_Rural in Action
#LdbStorytelling_Rural in Action
Ā 
Tre anni di Laboratori dal Basso
Tre anni di Laboratori dal BassoTre anni di Laboratori dal Basso
Tre anni di Laboratori dal Basso
Ā 
Ldb valecoricerca_lentini_web
Ldb valecoricerca_lentini_webLdb valecoricerca_lentini_web
Ldb valecoricerca_lentini_web
Ā 
Ldb valecoricerca_indolfi_brevetti_3
Ldb valecoricerca_indolfi_brevetti_3Ldb valecoricerca_indolfi_brevetti_3
Ldb valecoricerca_indolfi_brevetti_3
Ā 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...gurkirankumar98700
Ā 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Ā 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Ā 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 

Testimonianza di Alessandro Tommasi presentation biosig

  • 1. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Biometric Signature Veriļ¬cation A Tomasi1 M Sala1 V Da Rold1 1 University of Trento Department of Mathematics 2 Fondazione Bruno Kessler Security and Trust May 30, 2013 BioSigV G Sciarretta2
  • 2. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Outline 1 Biometric Authentication 2 Error correction 3 Hash functions 4 Fuzzy Commitment BioSigV
  • 3. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Biometric Authentication BioSigV
  • 4. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Authentication systems Authentication systems can be based on several factors: something you know, password! something you have, something you are. BioSigV
  • 5. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Biometric measures Physical biometrics: Pros : Cannot be lost or forgotten Diļ¬ƒcult to forge Cons : Intrusive, or at least perceived as such Diļ¬ƒcult if not impossible to revoke Present and future privacy issues: health, ethnicity etc. BioSigV
  • 6. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Biometric signature I A behavioural, non-intrusive measurement, familiar and widely accepted. Con: high variability. BioSigV
  • 7. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Biometric signature II Input data: [x,y,t,p,e] Extracted features: ID 1 2 3 4-5 6-7 8-9 Description Number of Strokes Time Duration Aspect Ratio X and Y Area Average X and Y Velocity Absolute Average X and Y Velocity ID 10-11 12-13 14-15 16-20 21-30 31-40 Description Average X and Y Acceleration Initial X and Y Final X and Y M1,1 ,M1,2 ,M2,1 and M0,3 X and Y Sub-Areas X and Y Sub-Velocity BioSigV ID 41-50 51-52 53-55 56-58 59-61 62-63 Description X and Y Sub-Accelerations Height and Width Mean X,Y and Pressure Value Maximum X,Y and Pressure Value Minimum X,Y and Pressure Value Maximum X and Y Velocity
  • 8. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Genuines vs. forgeries Some features are more distinguishing than others. BioSigV
  • 9. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Error correction BioSigV
  • 10. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Error correction Consider the following scenario: a source sends a message m across a channel to a receiver. The channel is aļ¬€ected by noise, which modiļ¬es the signal. Broadly speaking, an error correction scheme is composed of two algorithms, E ncode and Decode, that modify the message to make it more resilient to errors e, so that D (E (m) + e) = m for suļ¬ƒciently ā€œsmallā€ e. BioSigV
  • 11. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Linear block ECC I Let Fq be the ļ¬nite ļ¬eld with q elements and (Fq )n be the linear space of all n-tuples over Fq . Deļ¬nition Let k, n āˆˆ N such that 1 ā‰¤ k ā‰¤ n. A linear code C is a k-dimensional vector subspace of (Fq )n . Deļ¬nition If C is an [n, k]q code, then any matrix G whose rows form a basis for C as a k-dimensional vector space is called a generator matrix for C . The encoding procedure of a message m āˆˆ (Fq )k into the word c āˆˆ (Fq )n is just mG = c. BioSigV
  • 12. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Linear block ECC II Concretely, we split a message m into blocks of length k and map every possible mk into a codeword, c. Crudely speaking, this is a more complex form of redundancy: 1 ā†’ [111] 0 ā†’ [000] A code with minimum distance d can detect up to d āˆ’ 1 and correct up to (d āˆ’ 1)/2 errors. BioSigV
  • 13. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Cyclic Codes Deļ¬nition An [n, k, d]q linear code C is cyclic if the cyclic shift of a word is also a word, i.e. (c0 , . . . , cnāˆ’1 ) āˆˆ C =ā‡’ (cnāˆ’1 , c0 , . . . , cnāˆ’2 ) āˆˆ C . Consider the univariate polynomial ring Fq [x] and the ideal I = x n āˆ’ 1 . We denote by R the ring Fq [x]/I . We construct a bijective correspondence between the vectors of (Fq )n and the residue classes of polynomials in R: (v0 , . . . , vnāˆ’1 ) ā†” v0 + v1 x + Ā· Ā· Ā· + vnāˆ’1 x nāˆ’1 . We can view linear codes as subsets of the ring R, thanks to the correspondence above. BioSigV
  • 14. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Generator Polynomial Theorem An [n, k, d]q code C is cyclic iļ¬€ C is an ideal of R. Since R is a principal ideal ring (if C is not trivial) there exists a unique monic polynomial g that generates C . We call g the generator polynomial of C . Let m = (m0 , . . . , mkāˆ’1 ) be a message to encode, and consider its polynomial representation m(x) in R. To obtain an associated word it is suļ¬ƒcient to multiply m(x) by the generator polynomial g (x): c(x) = m(x)g (x) āˆˆ C . BioSigV
  • 15. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Hash functions BioSigV
  • 16. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Hash functions A cryptographic hash function h maps messages of arbitrary length1 into a ļ¬xed-length message digest. Hash functions are required to be: one-way : given a known digest d generated by a known hash function h(Ā·), it is infeasible to deduce m such that d = h(m); collision resistant : it is infeasible to ļ¬nd explicitly two messages m1 , m2 such that h(m1 ) = h(m2 ); input sensitive : the smallest diļ¬€erence between two messages m1 , m2 leads to completely diļ¬€erent digests h(m1 ), h(m2 ). 1 up to some very large maximum BioSigV
  • 17. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Example: SHA-1 SHA-1: Security Hash Algorithm [FIPS2 180-1]. Given an input message of length up to 264 bits, SHA-1 outputs a 160-bit string: message mā€™illumino di immenso mi illumino di immenso Roma roma 2 SHA-1 digest 04DEC8C39C14B4E5AB28 4EE204C81D58F1A59936 666BCFA1CC6D6580F316 AF077B85B9DE34055A57 DE5429D6F4FA2C86427A 50757791DE88A0B75C85 A6B6EA31C49A8E944EFE 9ECBC072A26903A1461A Federal Information Processing Standard BioSigV
  • 18. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Collision resistance The collision resistance of hash functions can be measured in terms of their robustness against birthday attacks, i.e. the number of brute-force hash operations it takes, in probability, before we ļ¬nd two messages with the same hash by simply picking random messages from the whole message space. For an n-bit output hash, this is proportional to 2n/2 . Crudely speaking, assume we have a commercial PC capable of performing hashes at 1 GHz, i.e. 109 h(Ā·)s āˆ’1 . A 128-bit digest hash such as SHA-1 will yield a collision in at most roughly 2 Ā· 1019 hashes, which would take at most 30 years. Adding processing power and ļ¬nding vulnerabilities in the hash function signiļ¬cantly reduce the waiting time. BioSigV
  • 19. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Fuzzy Commitment BioSigV
  • 20. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Fuzziļ¬cation By applying a repeatable but non-invertible transform f (s) to the signature we commit enough biometric data to authenticate users, but as little as possible to preserve privacy. We do this based on thresholds. BioSigV
  • 21. Biometric Authentication Error correction Hash functions Fuzzy Commitment References The scheme at a glance Enrolment(s): 1 2 3 generate a random message, r , and encode it (E (r )) sum the message with the fuzzy median signature, f (ĀÆ) s commit enrolment data: a hash of the message, h(r ) a user-speciļ¬c string, u = E (r ) + f (ĀÆ) s the error correction capacity t corresponding to the user Veriļ¬cation(Ė†, h(r ), u, t): s 1 subtract the fuzzy observed signature from the userā€™s string: v = u āˆ’ f (Ė†) s = E (r ) + f (ĀÆ) āˆ’ f (Ė†) s s = E (r ) + e 2 3 correct the errors in the transmitted message: Ė† = D(E (r ) + e); r if h(r ) == h(Ė†), accept the observed signature as authentic. r BioSigV
  • 22. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Encoding choices Block codes make sense for authentication schemes because we can precisely deļ¬ne the length of our encoded message (n). Furthermore, for MDS codes, i.e. ones for which strict equality holds in the Singleton bound d ā‰¤ n āˆ’ k + 1, we can uniquely associate an error correction capacity t with a given message and code length. We can also tweak t based on whether we want to make it easier for users to authenticate themselves or harder for forgers to gain access. BioSigV
  • 23. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Privacy and cancelability Cancelability Privacy Since the random message r is generated at enrolment, any user can enrol the same signature again. The signature itself can be changed, since it is behavioural. A suļ¬ƒciently long random message r and robust hash function h(Ā·) ensure that the userā€™s biometric data cannot be recovered by anyone. Even if the data were recovered, all we have committed is a fuzzy version. BioSigV
  • 24. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Enrolment BioSigV
  • 25. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Authentication BioSigV
  • 26. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Privacy and cancelability Cancelability Since the random message r is generated at enrolment, any user can enrol the same signature again. The signature itself can be changed, since it is a behavioural measure. Privacy A suļ¬ƒciently long random message r and robust hash function h(Ā·) ensure that the userā€™s biometric data cannot be feasibly recovered by anyone, whether thief or system administrator. Even if the data were recovered, all we have committed is a fuzzy version. BioSigV
  • 27. Biometric Authentication Error correction Hash functions Fuzzy Commitment References Performance Assessed against both research and custom database, allowing two authentication attempts. False Rejection Rate / Type I Error: 3.5% False Acceptance Rate / Type II Error: 3.2% Work commissioned by PayBay Networks Srl, part of QUI!Group BioSigV
  • 28. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [Bov+03] L Bovino et al. ā€œMulti-Expert Veriļ¬cation of Hand-Written Signaturesā€. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR). Vol. 2. Washington, DC, USA: IEEE Computer Society, 2003, pp. 932ā€“936. isbn: 0-7695-1960-1. doi: 10.1.1.160.9174. [Fre08] M. R. Freire. ā€œBiometric Template Protection in Dynamic Signature Veriļ¬cationā€. MSc. Universidad AutĀ“noma de Madrid, Nov. 2008. o BioSigV
  • 29. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [GJ07] G. K. Gupta and R. C. Joyce. ā€œUsing position extrema points to capture shape in on-line handwritten signature veriļ¬cationā€. In: Pattern Recognition 40.10 (Oct. 2007), pp. 2811ā€“2817. issn: 0031-3203. doi: 10.1016/j.patcog.2007.01.014. [IP08] D. Impedovo and G. Pirlo. ā€œAutomatic Signature Veriļ¬cation: The State of the Artā€. In: Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 38.5 (Sept. 2008), pp. 609ā€“635. issn: 1094-6977. doi: 10.1109/TSMCC.2008.923866. [IW09] T. Ignatenko and F. M. J. Willems. ā€œBiometric Systems: Privacy and Secrecy Aspectsā€. In: Information Forensics and Security, IEEE Transactions on 4.4 (2009), pp. 956ā€“973. issn: 1556-6013. doi: 10.1109/TIFS.2009.2033228. BioSigV
  • 30. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [IW10] T. Ignatenko and F. M. J. Willems. ā€œUsing position extrema points to capture shape in on-line handwritten signature veriļ¬cationā€. In: Information Forensics and Security, IEEE Transactions on 5.2 (2010), pp. 337ā€“348. doi: 10.1109/TIFS.2010.2046984. [JGC02] A. K. Jain, F. D. Griess, and S. D. Connell. ā€œOn-line signature veriļ¬cationā€. In: Pattern Recognition 35 (2002), pp. 2963ā€“2972. [JNN08] A. K. Jain, K. Nandakumar, and A. Nagar. ā€œBiometric template securityā€. In: EURASIP Journal on Advances in Signal Processing (Jan. 2008). issn: 1110-8657. doi: 10.1155/2008/579416. BioSigV
  • 31. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [JS06] A. Juels and M. Sudan. ā€œA fuzzy vault schemeā€. In: Designs, Codes and Cryptography 38.2 (2006), pp. 237ā€“257. doi: 10.1007/s10623-005-6343-z. [JW99] A. Juels and M. Wattenberg. ā€œA fuzzy commitment schemeā€. In: Proceedings of the 6th ACM conference on Computer and communications security (CCS ā€™99ā€™). Kent Ridge Digital Labs, Singapore: ACM, 1999, pp. 28ā€“36. isbn: 1-58113-148-8. doi: 10.1145/319709.319714. [LBA96] L Lee, T Berger, and E Aviczer. ā€œReliable On-Line Human Signature Veriļ¬cation Systemsā€. In: IEEE Trans. Pattern Anal. Mach. Intell. 18.6 (June 1996), pp. 643ā€“647. issn: 0162-8828. doi: 10.1109/34.506415. BioSigV
  • 32. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [Lee+04] J. Lee et al. ā€œUsing geometric extrema for segment-to-segment characteristics comparison in online signature veriļ¬cationā€. In: Pattern Recognition 37.1 (Jan. 2004), pp. 93ā€“103. issn: 0031-3203. doi: 10.1016/S0031-3203(03)00229-2. [Liw+11] M. Liwicki et al. ā€œSignature Veriļ¬cation Competition for Online and Oļ¬„ine Skilled Forgeries (SigComp2011)ā€. In: Document Analysis and Recognition (ICDAR), 2011 International Conference on. IEEE Computer Society. 2011, pp. 1480ā€“1484. doi: 10.1109/ICDAR.2011.294. BioSigV
  • 33. Biometric Authentication Error correction Hash functions Fuzzy Commitment References [Liw+12] M. Liwicki et al. ā€œICFHR 2012 Competition on Automatic Forensic Signature Veriļ¬cation (4NsigComp 2012)ā€. In: Frontiers in Handwriting Recognition (ICFHR), 2012 International Conference on. IEEE. Bari, Sept. 2012, pp. 823ā€“828. doi: 10.1109/ICFHR.2012.217. [SE00] S Sanderson and J. H. Erbetta. ā€œAuthentication for secure environments based on iris scanning technologyā€. In: Visual Biometrics (Ref.No. 2000/018), IEE Colloquium on. 2000, pp. 8/1ā€“8/7. doi: 10.1049/ic:20000468. [YWP95] L Yang, B. K. Widjaja, and R Prasad. ā€œApplication of hidden Markov models for signature veriļ¬cationā€. In: Pattern Recognition 28.2 (1995), pp. 161ā€“170. issn: 0031-3203. doi: 10.1016/0031-3203(94)00092-Z. BioSigV