Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 124

Liczba wyników na stronie
first rewind previous Strona / 7 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  biometrics
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 7 next fast forward last
PL
Postęp technologiczny w dziedzinie głębokiego uczenia znacząco przyczynił się do roz-woju syntezowania głosu, umożliwił tworzenie realistycznych nagrań audio, które mogą naśladować indywidualne cechy głosów ludzkich. Chociaż ta innowacja otwiera nowe możliwości w dziedzinie technologii mowy, niesie ze sobą również poważne obawy dotyczące bezpieczeństwa, zwłaszcza w kontekście potencjalnego wykorzystania technologii deepfake do celów przestępczych. Przeprowadzone badanie koncentrowało się na ocenie wpływu syntetycznych głosów na systemy biometrycznej weryfikacji mówców w języku polskim oraz skuteczności wykrywania deepfake’ów narzędziami dostępnymi publicznie, z wykorzystaniem dwóch głównych metod generowania głosu, tj. przekształcenia tekstu na mowę oraz konwersji mowy. Jednym z głównych wniosków analizy jest potwierdzenie zdolności syntetycznych głosów do zachowania charakterystycznych cech biometrycznych i otwierania drogi przestępcom do nieautoryzowanego dostępu do zabezpieczonych systemów lub danych. To podkreśla potencjalne zagrożenia dla indywidualnych użytkowników oraz instytucji, które polegają na technologiach rozpoznawania mówcy jako metodzie uwierzytelniania i wskazuje na konieczność wdrażania modułów wykrywania ataków. Badanie ponadto pokazało, że deepfaki odnalezione w polskiej części internetu dotyczące promowania fałszywych inwestycji lub kierowane w celach dezinformacji najczęściej wykorzystują popularne i łatwo dostępne narzędzia do syntezy głosu. Badanie przyniosło również nowe spojrzenie na różnice w skuteczności metod kon-wersji tekstu na mowę i klonowania mowy. Okazuje się, że metody klonowania mowy mogą być bardziej skuteczne w przekazywaniu biometrycznych cech osobniczych niż metody konwersji tekstu na mowę, co stanowi szczególny problem z punktu widzenia bezpieczeństwa systemów weryfikacji. Wyniki eksperymentów podkreślają potrzebę dalszych badań i rozwoju w dziedzinie bezpieczeństwa biometrycznego, żeby skutecznie przeciwdziałać wykorzystywaniu syntetycznych głosów do nielegalnych działań. Wzrost świadomości o potencjalnych zagrożeniach i kontynuacja pracy nad ulepszaniem technologii weryfikacji mówców są ważne dla ochrony przed coraz bardziej wyrafinowanymi atakami wykorzystującymi technologię deepfake.
EN
Technological advancements in the field of deep learning have significantly contributed to the development of voice synthesis, enabling the creation of realistic audio recordings that can mimic the individual characteristics of human voices. While this innovation opens up new possibilities in the field of speech technology, it also raises serious security concerns, especially in the context of the potential use of deepfake technology for criminal purposes. Our study focuses on assessing the impact of synthetic voices on biometric speaker verification systems in Polish and the effectiveness of detecting deepfakes with publicly available tools, considering two main approaches to voice generation: text-to-speech conversion and speech conversion. One of the main findings of our research is the confirmation that synthetic voices are capable of retaining biometric characteristics, which could allow criminals unauthorized access to protected systems or data. The analysis showed that the greater the biometric similarity between the „victim’s” voice and the „criminal’s” synthetic voice, the more difficult it is for verification systems to distinguish between real and fake voices. This highlights the potential threats to individual users and institutions that rely on speaker recognition technologies as a method of authentication. Our study also provides a new perspective on the differences in the effectiveness of text-to-speech conversion methods versus speech cloning. It turns out that speech cloning methods may be more effective in conveying individual biometric characteristics than text-to-speech conversion methods, posing a particular problem from the security perspective of verification systems. The results of the experiments underscore the need for further research and development in the field of biometric security to effectively counteract the use of synthetic voices for illegal activities. Increasing awareness of potential threats and continuing work on improving speaker verification technologies are crucial for protecting against increasingly sophisticated attacks utilizing deepfake technology.
2
Content available remote Electronic anti-theft protection for vehicles of people with special needs
EN
The article presents an electronic anti-theft protection subsystem that was incorporated into the vehicle control system dedicated to people with special communication needs. The aim of the work was to design and test an electronic subsystem allowing for the acquisition and quick analysis of fingerprint images, checking whether they belong to the vehicle owner and generating a signal allowing the vehicle to be started. The following hypothesis was put forward: it is possible to use artificial intelligence for accurate, automatic classification of fingerprint images acquired in a system with a single-chip microcomputer in order to identify a person. The research niche includes the use of biometrics in electronic anti-theft security adapted to people with special needs. This solution reduces the risk of theft and unauthorized use of special vehicles tailored to the owners’ individual needs. The use of a commercial algorithm offered by the sensor manufacturer or the use of artificial neural networks for the classification of fingerprints was considered. The results of research on the accuracy of fingerprint recognition obtained from the developed subsystem are presented. The experiments performed based on the NASNetLarge artificial neural network model confirmed the possibility of achieving recognition accuracy for the test set of 99.99%. Additionally, practical aspects of the applicability of the presented device in an electric vehicle control system supporting the movement of people with physical and/or intellectual disabilities were discussed. The presented solution, after minor modifications, can be used in access security systems for protected rooms, as well as vehicles and military equipment.
PL
W artykule zaprezentowano elektroniczny podsystem zabezpieczeń przed kradzieżą, który został włączony w system sterowania pojazdu dedykowanego dla osób o szczególnych potrzebach komunikacyjnych. Celem pracy było zaprojektowanie i przebadanie podsystemu elektronicznego pozwalającego na pozyskanie i szybką analizę obrazów odcisków palców, sprawdzenie czy należą do właściciela pojazdu i generowanie sygnału zezwalającego na uruchomienie pojazdu. Postawiono następującą hipotezę: możliwe jest wykorzystanie sztucznej inteligencji do dokładnej, automatycznej klasyfikacji obrazów z liniami papilarnymi, pozyskanych w systemie z mikrokomputerem jednoukładowym, w celu identyfikacji osoby. Nisza badawcza obejmuje wykorzystanie obszaru biometrii w elektronicznych zabezpieczeniach antykradzieżowych dostosowanych do osób o szczególnych potrzebach. Rozwiązanie to pozwala na zmniejszenie ryzyka kradzieży oraz użytkowania przez osoby niepowołane pojazdów specjalnych dostosowanych do indywidualnych potrzeb właścicieli. Rozważono wykorzystanie algorytmu komercyjnego, oferowanego przez producenta czujnika lub wykorzystanie sztucznych sieci neuronowych celem klasyfikacji odcisków placów. Przedstawiono wyniki przeprowadzonych badań nad dokładnością rozpoznawania odcisków palców uzyskane z opracowanego podsystemu. Przeprowadzone eksperymenty w oparciu o model sztucznej sieci neuronowej NASNetLarge potwierdziły możliwość osiągniecia dokładności rozpoznawania dla zbioru testowego na poziomie 99,99%. Dodatkowo, omówiono praktyczne aspekty stosowalności przedstawionego urządzenia w systemie stero- wania pojazdem elektrycznym wspomagającym poruszanie się osób z niepełnosprawnościami fizycznymi i/lub intelektualnymi. Zaprezentowane rozwiązanie, po niewielkich modyfikacjach, może zostać użyte w systemach zabezpieczeń dostępu do pomieszczeń chronionych, a także pojazdów i sprzętu wojskowego.
EN
Work is currently underway to regulate the use of artificial intelligence. The article presents the ideas and principles of creating remote biometric identification systems using AI technologies. Risks to privacy and possible scenarios for the use of such systems are presented.
EN
The feature-extraction step is a major and crucial step in analyzing and understanding raw data, as it has a considerable impact on system accuracy. Despite the very acceptable results that have been obtained by many handcrafted methods, these can unfortunately have difficulty representing features in the cases of large databases or with strongly correlated samples. In this context, we attempt to examine the discriminability of texture features by proposing a novel, simple, and lightweight method for deep feature extraction to characterize the discriminative power of different textures. We evaluated the performance of our method by using a palm print-based biometric system, and the experimental results (using the CASIA multispectral palm--print database) demonstrate the superiority of the proposed method over the latest handcrafted and deep methods.
PL
W artykule omówiono system weryfikacji tożsamości zbudowany w oparciu o specjalistyczny i otwarty pakiet oprogramowania Kaldi oraz przetestowany na dużej i darmowej bazie VoxCeleb przy wykorzystaniu wektorów tożsamości do modelowania głosu. Omówiono także problematykę zasobów mowy wykorzystywanych do testowania głosowych systemów biometrycznych. Przedstawiono wpływ wymiarowości wektorów tożsamości na błędy weryfikacji.
EN
This paper discusses a speaker verification system built with the help of free software Kaldi and tested with the VoxCeleb dataset. The problems with the speaker recognition datasets are also discussed. The results for speaker verification system based on i-vectors are shown as well as the influence of dimensionality of i-vectors on verification errors.
EN
The growing amount of collected and processed data means that there is a need to control access to these resources. Very often, this type of control is carried out on the basis of biometric analysis. The article proposes a new user authentication method based on a spatial analysis of the movement of the finger’s position. This movement creates a sequence of data that is registered by a motion recording device. The presented approach combines spatial analysis of the position of all fingers at the time. The proposed method is able to use the specific, often different movements of fingers of each user. The experimental results confirm the effectiveness of the method in biometric applications. In this paper, we also introduce an effective method of feature selection, based on the Hotelling T2 statistic. This approach allows selecting the best distinctive features of each object from a set of all objects in the database. It is possible thanks to the appropriate preparation of the input data.
7
Content available Detection of human faces in thermal infrared images
EN
The presented study concerns development of a facial detection algorithm operating robustly in the thermal infrared spectrum. The paper presents a brief review of existing face detection algorithms, describes the experiment methodology and selected algorithms. For the comparative study of facial detection three methods presenting three different approaches were chosen, namely the Viola-Jones, YOLOv2 and Faster-RCNN. All these algorithms were investigated along with various configurations and parameters and evaluated using three publicly available thermal face datasets. The comparison of the original results of various experiments for the selected algorithms is presented.
8
Content available remote Wizerunek twarzy w identyfikacji i weryfikacji tożsamości
PL
Identyfikatory naturalne są najstarszym i zarazem najdynamiczniej rozwijanym środkiem weryfikacji tożsamości człowieka. Rozwój ten dotyczy zwłaszcza zaawansowanych technik biometrycznych z elementami sztucznej inteligencji. W artykule zostały przedstawione - na tle innych środków identyfikacji człowieka - podstawowe zasady weryfikacji tożsamości na podstawie wizerunku twarzy.
EN
Natural means of identification are the oldest and most dynamically developed ways of verifying human identity. Their development concerns in particular advanced biometric techniques with elements of artificial intelligence. This article presents - against the background of other means of human identification - the basic principles used to verify identity based on the image of the face.
PL
Artykuł przedstawia przykładową implementację uwierzytelniania użytkownika aplikacji internetowej z użyciem danych biometrycznych w postaci twarzy oraz wyrażanej przez twarz emocji. Proces uwierzytelniania polega na porównaniu danych modelowych z danymi wprowadzonych podczas rejestracji do aplikacji.
EN
The article presents an example implementation of web application user authentication with the use of biometric data in the form of a face and emotions expressed by the face. The authentication process consists in comparing the model data with the data entered during registration to the application.
EN
Purpose: The research paper presents the issues of voting with the use of electronic communication, with emphasis on the mechanisms of granting, withdrawal and recovery of permissions covered by biometric methods. Design/methodology/approach: The work presents a theoretical model. Findings: The proposed solutions ensure compliance with the basic requirements for e-voting, including verification of permissions, ensuring the secrecy of the vote and the possibility of verifying the vote cast by the voter. Practical implications: The presented model of granting, withdrawal and recovery of voters’ permission can be used as a part of practical electronic voting systems. Originality/value: The authors presented a conceptual model of the use of biometrics to grant rights. The authors have not encountered in literature any examples of the use of biometrics for this purpose. Actually, anyone practically used system does not use biometry in the described scope.
PL
W artykule przedstawiono zagadnienie rozpoznawania tożsamości osób na podstawie odcisków palców. Przedstawiono aktualny stan wiedzy, wybrane metody i techniki zarówno opisu obrazu linii papilarnych, jak i metody klasyfikacji.
EN
The paper considers the issue of the identity recognition of persons on the basis of fingerprints. The current state of knowledge, selected methods and techniques of fingerprint image description and classification methods are presented.
EN
The aim of this paper is to compare the efficiency of various outlier correction methods for ECG signal processing in biometric applications. The main idea is to correct anomalies in various segments of ECG waveform rather than skipping a corrupted ECG heartbeat in order to achieve better statistics. Experiments were performed using a self-collected Lviv Biometric Dataset. This database contains over 1400 records for 95 unique persons. The baseline identification accuracy without any correction is around 86%. After applying the outlier correction the results were improved up to 98% for autoencoder based algorithms and up to 97.1% for sliding Euclidean window. Adding outlier correction stage in the biometric identification process results in increased processing time (up to 20%), however, it is not critical in the most use-cases.
EN
The on-line signature is a biometric attribute which can be used for identity verification. It is a very useful characteristic because it is commonly accepted in societies across the world. However, the verification process using this particular biometric feature is a rather difficult one. Researchers working on identity verification involving the on-line signature might face various problems, including the different discriminative power of signature descriptors, the problem of a large number of descriptors, the problem of descriptor generation, etc. However, population-based algorithms (PBAs) can prove very useful when resolving these problems. Hence, we propose a new method for on-line signature partitioning using a PBA in order to improve the verification process effectiveness. Our method uses the Differential Evolution algorithm with a properly defined evaluation function for creating the most characteristic partitions of the dynamic signature. We present simulation results of the proposed method for the BioSecure DS2 database distributed by the BioSecure Association.
EN
In biometrics, methods which are able to precisely adapt to the biometric features of users are much sought after. They use various methods of artificial intelligence, in particular methods from the group of soft computing. In this paper, we focus on on-line signature verification. Such signatures are complex objects described not only by the shape but also by the dynamics of the signing process. In standard devices used for signature acquisition (with an LCD touch screen) this dynamics may include pen velocity, but sometimes other types of signals are also available, e.g. pen pressure on the screen surface (e.g. in graphic tablets), the angle between the pen and the screen surface, etc. The precision of the on-line signature dynamics processing has been a motivational springboard for developing methods that use signature partitioning. Partitioning uses a well-known principle of decomposing the problem into smaller ones. In this paper, we propose a new partitioning algorithm that uses capabilities of the algorithms based on populations and fuzzy systems. Evolutionary-fuzzy partitioning eliminates the need to average dynamic waveforms in created partitions because it replaces them. Evolutionary separation of partitions results in a better matching of partitions with reference signatures, eliminates disproportions between the number of points describing dynamics in partitions, eliminates the impact of random values, separates partitions related to the signing stage and its dynamics (e.g. high and low velocity of signing, where high and low are imprecise-fuzzy concepts). The operation of the presented algorithm has been tested using the well-known BioSecure DS2 database of real dynamic signatures.
EN
Almost all people's data is stored on their personal devices. For this reason, there is a need to protect information from unauthorized access by means of user authentication. PIN codes, passwords, tokens can be forgotten, lost, transferred, brute-force attacked. For this reason, biometric authentication is gaining in popularity. Biometric data are unchanged for a long time, different for users, and can be measured. This paper explores voice authentication due to the ease of use of this technology, since obtaining voice characteristics of users doesn't require an equipment in addition to the microphone, which is built into almost all devices. The method of voice authentication based on an anomaly detection algorithm has been proposed. The software module for text-independent authentication has been developed on the Python language. It's based on a new Mozilla's open source voice dataset "Common voice". Experimental results confirmed the high accuracy of authentication by the proposed method.
16
PL
W artykule opisano możliwe sposoby ekstrakcji parametrów z próbek danych biometrycznych, takich jak odcisk palca czy nagranie głosu. Zweryfikowano wpływ konkretnych sposobów obróbki na skuteczność algorytmów obróbki próbek biometrycznych oraz ich porównania. Wykonano badania polegające na przetworzeniu dużej liczby próbek z użyciem wybranych algorytmów. W przypadku odcisku palca wykorzystano normalizację obrazu, filtr Gabora i porównanie z użyciem deskryptorów. Dla autoryzacji głosowej analizowano algorytmy LPC i MFCC. W przypadku obu rodzajów autoryzacji uzyskano zadowalającą skuteczność rzędu 60-80%.
EN
This article describes possible ways to extract parameters from biometric data samples, such as fingerprint or voice recording. Influence of particular approaches to biometric sample preparation and comparision algorithms accuracy was verified. Experiment involving processing big ammount of samples with usage of particular algorithms was performed. In fingerprint detection case the image normalization, Gabor filtering and comparision method based on descriptors were used. For voice authorization LPC and MFCC alghoritms were used. In both cases satisfying accuracy (60-80%) was the result of the surveys.
EN
Biometric systems have been widely considered as a synonym of security. However, in recent years, malicious people are violating them by presenting forged traits, such as gelatin fingers, to fool their capture sensors (spoofing attacks). To detect such frauds, methods based on traditional image descriptors have been developed, aiming liveness detection from the input data. However, due to their handcrafted approaches, most of them present low accuracy rates in challenging scenarios. In this work, we propose a novel method for fingerprint spoofing detection using the Deep Boltzmann Machines (DBM) for extraction of high-level features from the images. Such deep features are very discriminative, thus making complicated the task of forgery by attackers. Experiments show that the proposed method outperforms other state-of-the-art techniques, presenting high accuracy regarding attack detection
EN
Biometric databases are important components that help improve the performanceof state-of-the-art recognition applications. The availability of more andmore challenging data is attracting the attention of researchers, who are systematicallydeveloping novel recognition algorithms and increasing the accuracyof identification. Surprisingly, most of the popular face datasets (like LFW orIJBA) are not fully unconstrained. The majority of the available images werenot acquired on-the-move, which reduces the amount of blurring that is causedby motion or incorrect focusing. Therefore, the COMPACT database for studyingless-cooperative face recognition is introduced in this paper. The datasetconsists of high-resolution images of 108 subjects acquired in a fully automatedmanner as people go through the recognition gate. This ensures that the collecteddata contains real-world degradation factors: different distances, expressions,occlusions, pose variations, and motion blur. Additionally, the authorsconducted a series of experiments that verified the face-recognition performanceon the collected data.
EN
In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC). The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificate-less digital signature technology to the users, where public and private keys are generated on-the-fly.
PL
Wielopoziomowe uwierzytelnianie użytkownika (ang. multi-factor authentication system, MFA) jest sposobem na poprawę bezpieczeństwa przechowywanych danych. W artykule przedstawiono różne autorskie sposoby wykorzystania biometrii dłoni, które mogą zostać wykorzystane jako elementy systemu wielopoziomowego uwierzytelniania użytkowników oraz wyniki potwierdzające obiecującą skuteczność działania takiego systemu.
EN
Multi-factor authentication system (MFA) is a possible way of improvement of the stored data security. The article presents different original approaches to the hand-based biometrics that may be applied into a multifactor authentication system. Moreover, in the article there are promising research results provided.
first rewind previous Strona / 7 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.