NASA Astrophysics Data System (ADS)
El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy
2011-04-01
Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.
Online fingerprint verification.
Upendra, K; Singh, S; Kumar, V; Verma, H K
2007-01-01
As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.
Gabor filter based fingerprint image enhancement
NASA Astrophysics Data System (ADS)
Wang, Jin-Xiang
2013-03-01
Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.
Enhancing security of fingerprints through contextual biometric watermarking.
Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M
2007-07-04
This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.
NASA Astrophysics Data System (ADS)
Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil
2017-11-01
Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.
Three-dimensional imaging of artificial fingerprint by optical coherence tomography
NASA Astrophysics Data System (ADS)
Larin, Kirill V.; Cheng, Yezeng
2008-03-01
Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.
Altered fingerprints: analysis and detection.
Yoon, Soweon; Feng, Jianjiang; Jain, Anil K
2012-03-01
The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Several cases of fingerprint obfuscation have been reported in the press. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly. The main contributions of this paper are: 1) compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing AFIS, 2) investigating the impact of fingerprint alteration on the accuracy of a commercial fingerprint matcher, 3) classifying the alterations into three major categories and suggesting possible countermeasures, 4) developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae distribution, and 5) evaluating the proposed technique and the NFIQ algorithm on a large database of altered fingerprints provided by a law enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need to further pursue this problem.
Can soft biometric traits assist user recognition?
NASA Astrophysics Data System (ADS)
Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik
2004-08-01
Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... personnel and law enforcement officers. For Confidential Informants, fingerprints, handwriting samples... Informant; Fingerprints; Handwriting sample; Identifying numbers, such as Social Security Number, Alien...; Photograph of the individual; Fingerprints; Handwriting sample; Identifying numbers, such as Social Security...
A preliminary study of DTI Fingerprinting on stroke analysis.
Ma, Heather T; Ye, Chenfei; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo
2014-01-01
DTI (Diffusion Tensor Imaging) is a well-known MRI (Magnetic Resonance Imaging) technique which provides useful structural information about human brain. However, the quantitative measurement to physiological variation of subtypes of ischemic stroke is not available. An automatically quantitative method for DTI analysis will enhance the DTI application in clinics. In this study, we proposed a DTI Fingerprinting technology to quantitatively analyze white matter tissue, which was applied in stroke classification. The TBSS (Tract Based Spatial Statistics) method was employed to generate mask automatically. To evaluate the clustering performance of the automatic method, lesion ROI (Region of Interest) is manually drawn on the DWI images as a reference. The results from the DTI Fingerprinting were compared with those obtained from the reference ROIs. It indicates that the DTI Fingerprinting could identify different states of ischemic stroke and has promising potential to provide a more comprehensive measure of the DTI data. Further development should be carried out to improve DTI Fingerprinting technology in clinics.
Secure Fingerprint Identification of High Accuracy
2014-01-01
secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger
2014-09-18
radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and
A Radio-Map Automatic Construction Algorithm Based on Crowdsourcing
Yu, Ning; Xiao, Chenxian; Wu, Yinfeng; Feng, Renjian
2016-01-01
Traditional radio-map-based localization methods need to sample a large number of location fingerprints offline, which requires huge amount of human and material resources. To solve the high sampling cost problem, an automatic radio-map construction algorithm based on crowdsourcing is proposed. The algorithm employs the crowd-sourced information provided by a large number of users when they are walking in the buildings as the source of location fingerprint data. Through the variation characteristics of users’ smartphone sensors, the indoor anchors (doors) are identified and their locations are regarded as reference positions of the whole radio-map. The AP-Cluster method is used to cluster the crowdsourced fingerprints to acquire the representative fingerprints. According to the reference positions and the similarity between fingerprints, the representative fingerprints are linked to their corresponding physical locations and the radio-map is generated. Experimental results demonstrate that the proposed algorithm reduces the cost of fingerprint sampling and radio-map construction and guarantees the localization accuracy. The proposed method does not require users’ explicit participation, which effectively solves the resource-consumption problem when a location fingerprint database is established. PMID:27070623
Linguistically informed digital fingerprints for text
NASA Astrophysics Data System (ADS)
Uzuner, Özlem
2006-02-01
Digital fingerprinting, watermarking, and tracking technologies have gained importance in the recent years in response to growing problems such as digital copyright infringement. While fingerprints and watermarks can be generated in many different ways, use of natural language processing for these purposes has so far been limited. Measuring similarity of literary works for automatic copyright infringement detection requires identifying and comparing creative expression of content in documents. In this paper, we present a linguistic approach to automatically fingerprinting novels based on their expression of content. We use natural language processing techniques to generate "expression fingerprints". These fingerprints consist of both syntactic and semantic elements of language, i.e., syntactic and semantic elements of expression. Our experiments indicate that syntactic and semantic elements of expression enable accurate identification of novels and their paraphrases, providing a significant improvement over techniques used in text classification literature for automatic copy recognition. We show that these elements of expression can be used to fingerprint, label, or watermark works; they represent features that are essential to the character of works and that remain fairly consistent in the works even when works are paraphrased. These features can be directly extracted from the contents of the works on demand and can be used to recognize works that would not be correctly identified either in the absence of pre-existing labels or by verbatim-copy detectors.
Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun
2017-03-10
Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
Yu, Jianping; Zhang, Peng; Wang, Shulan
2015-01-01
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. PMID:25873989
A fingerprint encryption scheme based on irreversible function and secure authentication.
Yang, Yijun; Yu, Jianping; Zhang, Peng; Wang, Shulan
2015-01-01
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
Efficient Fingercode Classification
NASA Astrophysics Data System (ADS)
Sun, Hong-Wei; Law, Kwok-Yan; Gollmann, Dieter; Chung, Siu-Leung; Li, Jian-Bin; Sun, Jia-Guang
In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e. g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.
NASA Astrophysics Data System (ADS)
Jun, An Won
2006-01-01
We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.
Comparative study of minutiae selection algorithms for ISO fingerprint templates
NASA Astrophysics Data System (ADS)
Vibert, B.; Charrier, C.; Le Bars, J.-M.; Rosenberger, C.
2015-03-01
We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods including 2 methods from the literature and 1 like reference (No Selection). Experimental results on 3 fingerprint databases from the Fingerprint Verification Competition show their relative efficiency in terms of performance and computation time.
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus
2011-11-01
The preventive application of automated latent fingerprint acquisition devices can enhance the Homeland Defence, e.g. by improving the border security. Here, contact-less optical acquisition techniques for the capture of traces are subject to research; chromatic white light sensors allow for multi-mode operation using coarse or detailed scans. The presence of potential fingerprints could be detected using fast coarse scans. Those Regions-of- Interest can be acquired afterwards with high-resolution detailed scans to allow for a verification or identification of individuals. An acquisition and analysis of fingerprint traces on different objects that are imported or pass borders might be a great enhancement for security. Additionally, if suspicious objects require a further investigation, an initial securing of potential fingerprints could be very useful. In this paper we show current research results for the coarse detection of fingerprints to prepare the detailed acquisition from various surface materials that are relevant for preventive applications.
Rapid Characterization of Microorganisms by Mass Spectrometry—What Can Be Learned and How?
NASA Astrophysics Data System (ADS)
Fenselau, Catherine C.
2013-08-01
Strategies for the rapid and reliable analysis of microorganisms have been sought to meet national needs in defense, homeland security, space exploration, food and water safety, and clinical diagnosis. Mass spectrometry has long been a candidate technique because it is extremely rapid and can provide highly specific information. It has excellent sensitivity. Molecular and fragment ion masses provide detailed fingerprints, which can also be interpreted. Mass spectrometry is also a broad band method—everything has a mass—and it is automatable. Mass spectrometry is a physiochemical method that is orthogonal and complementary to biochemical and morphological methods used to characterize microorganisms.
Rapid characterization of microorganisms by mass spectrometry--what can be learned and how?
Fenselau, Catherine C
2013-08-01
Strategies for the rapid and reliable analysis of microorganisms have been sought to meet national needs in defense, homeland security, space exploration, food and water safety, and clinical diagnosis. Mass spectrometry has long been a candidate technique because it is extremely rapid and can provide highly specific information. It has excellent sensitivity. Molecular and fragment ion masses provide detailed fingerprints, which can also be interpreted. Mass spectrometry is also a broad band method--everything has a mass--and it is automatable. Mass spectrometry is a physiochemical method that is orthogonal and complementary to biochemical and morphological methods used to characterize microorganisms.
Attendance fingerprint identification system using arduino and single board computer
NASA Astrophysics Data System (ADS)
Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.
2018-03-01
Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.
Secure Indoor Localization Based on Extracting Trusted Fingerprint
Yin, Xixi; Zheng, Yanliu; Wang, Chun
2018-01-01
Indoor localization based on WiFi has attracted a lot of research effort because of the widespread application of WiFi. Fingerprinting techniques have received much attention due to their simplicity and compatibility with existing hardware. However, existing fingerprinting localization algorithms may not resist abnormal received signal strength indication (RSSI), such as unexpected environmental changes, impaired access points (APs) or the introduction of new APs. Traditional fingerprinting algorithms do not consider the problem of new APs and impaired APs in the environment when using RSSI. In this paper, we propose a secure fingerprinting localization (SFL) method that is robust to variable environments, impaired APs and the introduction of new APs. In the offline phase, a voting mechanism and a fingerprint database update method are proposed. We use the mutual cooperation between reference anchor nodes to update the fingerprint database, which can reduce the interference caused by the user measurement data. We analyze the standard deviation of RSSI, mobilize the reference points in the database to vote on APs and then calculate the trust factors of APs based on the voting results. In the online phase, we first make a judgment about the new APs and the broken APs, then extract the secure fingerprints according to the trusted factors of APs and obtain the localization results by using the trusted fingerprints. In the experiment section, we demonstrate the proposed method and find that the proposed strategy can resist abnormal RSSI and can improve the localization accuracy effectively compared with the existing fingerprinting localization algorithms. PMID:29401755
Secure Indoor Localization Based on Extracting Trusted Fingerprint.
Luo, Juan; Yin, Xixi; Zheng, Yanliu; Wang, Chun
2018-02-05
[-5]Indoor localization based on WiFi has attracted a lot of research effort because of the widespread application of WiFi. Fingerprinting techniques have received much attention due to their simplicity and compatibility with existing hardware. However, existing fingerprinting localization algorithms may not resist abnormal received signal strength indication (RSSI), such as unexpected environmental changes, impaired access points (APs) or the introduction of new APs. Traditional fingerprinting algorithms do not consider the problem of new APs and impaired APs in the environment when using RSSI. In this paper, we propose a secure fingerprinting localization (SFL) method that is robust to variable environments, impaired APs and the introduction of new APs. In the offline phase, a voting mechanism and a fingerprint database update method are proposed. We use the mutual cooperation between reference anchor nodes to update the fingerprint database, which can reduce the interference caused by the user measurement data. We analyze the standard deviation of RSSI, mobilize the reference points in the database to vote on APs and then calculate the trust factors of APs based on the voting results. In the online phase, we first make a judgment about the new APs and the broken APs, then extract the secure fingerprints according to the trusted factors of APs and obtain the localization results by using the trusted fingerprints. In the experiment section, we demonstrate the proposed method and find that the proposed strategy can resist abnormal RSSI and can improve the localization accuracy effectively compared with the existing fingerprinting localization algorithms.
Improving the recognition of fingerprint biometric system using enhanced image fusion
NASA Astrophysics Data System (ADS)
Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma
2010-04-01
Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.
49 CFR 1552.3 - Flight training.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Except as provided in paragraph (k) of this section, the candidate's fingerprints, in accordance with... candidate poses a threat to aviation or national security. (f) Fingerprints. (1) Fingerprints submitted in... identity to the individual or agency collecting his or her fingerprints under paragraph (f)(1) of this...
49 CFR 1552.3 - Flight training.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Except as provided in paragraph (k) of this section, the candidate's fingerprints, in accordance with... candidate poses a threat to aviation or national security. (f) Fingerprints. (1) Fingerprints submitted in... identity to the individual or agency collecting his or her fingerprints under paragraph (f)(1) of this...
49 CFR 1552.3 - Flight training.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Except as provided in paragraph (k) of this section, the candidate's fingerprints, in accordance with... candidate poses a threat to aviation or national security. (f) Fingerprints. (1) Fingerprints submitted in... identity to the individual or agency collecting his or her fingerprints under paragraph (f)(1) of this...
Missing data reconstruction using Gaussian mixture models for fingerprint images
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Yeole, Rushikesh D.; Rao, Shishir P.; Mulawka, Marzena; Troy, Mike; Reinecke, Gary
2016-05-01
Publisher's Note: This paper, originally published on 25 May 2016, was replaced with a revised version on 16 June 2016. If you downloaded the original PDF, but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. One of the most important areas in biometrics is matching partial fingerprints in fingerprint databases. Recently, significant progress has been made in designing fingerprint identification systems for missing fingerprint information. However, a dependable reconstruction of fingerprint images still remains challenging due to the complexity and the ill-posed nature of the problem. In this article, both binary and gray-level images are reconstructed. This paper also presents a new similarity score to evaluate the performance of the reconstructed binary image. The offered fingerprint image identification system can be automated and extended to numerous other security applications such as postmortem fingerprints, forensic science, investigations, artificial intelligence, robotics, all-access control, and financial security, as well as for the verification of firearm purchasers, driver license applicants, etc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bolme, David S; Tokola, Ryan A; Boehnen, Chris Bensing
Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive modelsmore » relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.« less
76 FR 36939 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... of 1934 to submit their fingerprints through a registered securities exchange or a national... accounts for the bulk of the fingerprint submissions. It is estimated that 4,939 respondents submit approximately 288,000 sets of fingerprints (consisting of 133,000 electronic fingerprints and 155,000...
Yassin, Ali A
2014-01-01
Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification.
Yassin, Ali A.
2014-01-01
Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification. PMID:27355051
Privacy Preserving Facial and Fingerprint Multi-biometric Authentication
NASA Astrophysics Data System (ADS)
Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man
The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.
Integrated fingerprinting in secure digital cinema projection
NASA Astrophysics Data System (ADS)
Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois
2001-12-01
This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.
Cheng, Yezeng; Larin, Kirill V
2006-12-20
Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.
NASA Astrophysics Data System (ADS)
Cheng, Yezeng; Larin, Kirill V.
2006-12-01
Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.
17 CFR 240.17f-2 - Fingerprinting of securities industry personnel.
Code of Federal Regulations, 2011 CFR
2011-04-01
... submit, or cause to be submitted, the fingerprints of such persons to the Attorney General of the United... state insurance department with respect to its sale of variable contracts. (iv) Illegible fingerprint... fingerprints acceptable to the Attorney General or its designee for identification and appropriate processing...
17 CFR 240.17f-2 - Fingerprinting of securities industry personnel.
Code of Federal Regulations, 2013 CFR
2013-04-01
... submit, or cause to be submitted, the fingerprints of such persons to the Attorney General of the United... state insurance department with respect to its sale of variable contracts. (iv) Illegible fingerprint... fingerprints acceptable to the Attorney General or its designee for identification and appropriate processing...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
17 CFR 240.17f-2 - Fingerprinting of securities industry personnel.
Code of Federal Regulations, 2014 CFR
2014-04-01
... submit, or cause to be submitted, the fingerprints of such persons to the Attorney General of the United... state insurance department with respect to its sale of variable contracts. (iv) Illegible fingerprint... fingerprints acceptable to the Attorney General or its designee for identification and appropriate processing...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
17 CFR 240.17f-2 - Fingerprinting of securities industry personnel.
Code of Federal Regulations, 2012 CFR
2012-04-01
... submit, or cause to be submitted, the fingerprints of such persons to the Attorney General of the United... state insurance department with respect to its sale of variable contracts. (iv) Illegible fingerprint... fingerprints acceptable to the Attorney General or its designee for identification and appropriate processing...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
17 CFR 240.17f-2 - Fingerprinting of securities industry personnel.
Code of Federal Regulations, 2010 CFR
2010-04-01
... submit, or cause to be submitted, the fingerprints of such persons to the Attorney General of the United... state insurance department with respect to its sale of variable contracts. (iv) Illegible fingerprint... fingerprints acceptable to the Attorney General or its designee for identification and appropriate processing...
Fingerprint multicast in secure video streaming.
Zhao, H Vicky; Liu, K J Ray
2006-01-01
Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
A network identity authentication system based on Fingerprint identification technology
NASA Astrophysics Data System (ADS)
Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan
2005-10-01
Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System
NASA Astrophysics Data System (ADS)
Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won
2009-12-01
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
NASA Astrophysics Data System (ADS)
Yang, Gongping; Zhou, Guang-Tong; Yin, Yilong; Yang, Xiukun
2010-12-01
A critical step in an automatic fingerprint recognition system is the segmentation of fingerprint images. Existing methods are usually designed to segment fingerprint images originated from a certain sensor. Thus their performances are significantly affected when dealing with fingerprints collected by different sensors. This work studies the sensor interoperability of fingerprint segmentation algorithms, which refers to the algorithm's ability to adapt to the raw fingerprints obtained from different sensors. We empirically analyze the sensor interoperability problem, and effectively address the issue by proposing a [InlineEquation not available: see fulltext.]-means based segmentation method called SKI. SKI clusters foreground and background blocks of a fingerprint image based on the [InlineEquation not available: see fulltext.]-means algorithm, where a fingerprint block is represented by a 3-dimensional feature vector consisting of block-wise coherence, mean, and variance (abbreviated as CMV). SKI also employs morphological postprocessing to achieve favorable segmentation results. We perform SKI on each fingerprint to ensure sensor interoperability. The interoperability and robustness of our method are validated by experiments performed on a number of fingerprint databases which are obtained from various sensors.
A fingerprint key binding algorithm based on vector quantization and error correction
NASA Astrophysics Data System (ADS)
Li, Liang; Wang, Qian; Lv, Ke; He, Ning
2012-04-01
In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains
NASA Astrophysics Data System (ADS)
Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao
2017-11-01
A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.
Laser speckle decorrelation for fingerprint acquisition
NASA Astrophysics Data System (ADS)
Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo
2012-09-01
Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases.
Optical security verification for blurred fingerprints
NASA Astrophysics Data System (ADS)
Soon, Boon Y.; Karim, Mohammad A.; Alam, Mohammad S.
1998-12-01
Optical fingerprint security verification is gaining popularity, as it has the potential to perform correlation at the speed of light. With advancement in optical security verification techniques, authentication process can be almost foolproof and reliable for financial transaction, banking, etc. In law enforcement, when a fingerprint is obtained from a crime scene, it may be blurred and can be an unhealthy candidate for correlation purposes. Therefore, the blurred fingerprint needs to be clarified before it is used for the correlation process. There are a several different types of blur, such as linear motion blur and defocus blur, induced by aberration of imaging system. In addition, we may or may not know the blur function. In this paper, we propose the non-singularity inverse filtering in frequency/power domain for deblurring known motion-induced blur in fingerprints. This filtering process will be incorporated with the pow spectrum subtraction technique, uniqueness comparison scheme, and the separated target and references planes method in the joint transform correlator. The proposed hardware implementation is a hybrid electronic-optical correlator system. The performance of the proposed system would be verified with computer simulation for both cases: with and without additive random noise corruption.
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...
Managing the Aviation Insider Threat
2010-12-01
World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal
Bailey, Melanie J; Bradshaw, Robert; Francese, Simona; Salter, Tara L; Costa, Catia; Ismail, Mahado; P Webb, Roger; Bosman, Ingrid; Wolff, Kim; de Puit, Marcel
2015-09-21
Latent fingerprints provide a potential route to the secure, high throughput and non-invasive detection of drugs of abuse. In this study we show for the first time that the excreted metabolites of drugs of abuse can be detected in fingerprints using ambient mass spectrometry. Fingerprints and oral fluid were taken from patients attending a drug and alcohol treatment service. Gas chromatography mass spectrometry (GC-MS) was used to test the oral fluid of patients for the presence of cocaine and benzoylecgonine. The corresponding fingerprints were analysed using Desorption Electrospray Ionization (DESI) which operates under ambient conditions and Ion Mobility Tandem Mass Spectrometry Matrix Assisted Laser Desorption Ionization (MALDI-IMS-MS/MS) and Secondary Ion Mass Spectrometry (SIMS). The detection of cocaine, benzoylecgonine (BZE) and methylecgonine (EME) in latent fingerprints using both DESI and MALDI showed good correlation with oral fluid testing. The sensitivity of SIMS was found to be insufficient for this application. These results provide exciting opportunities for the use of fingerprints as a new sampling medium for secure, non-invasive drug detection. The mass spectrometry techniques used here offer a high level of selectivity and consume only a small area of a single fingerprint, allowing repeat and high throughput analyses of a single sample.
SVM-Based Synthetic Fingerprint Discrimination Algorithm and Quantitative Optimization Strategy
Chen, Suhang; Chang, Sheng; Huang, Qijun; He, Jin; Wang, Hao; Huang, Qiangui
2014-01-01
Synthetic fingerprints are a potential threat to automatic fingerprint identification systems (AFISs). In this paper, we propose an algorithm to discriminate synthetic fingerprints from real ones. First, four typical characteristic factors—the ridge distance features, global gray features, frequency feature and Harris Corner feature—are extracted. Then, a support vector machine (SVM) is used to distinguish synthetic fingerprints from real fingerprints. The experiments demonstrate that this method can achieve a recognition accuracy rate of over 98% for two discrete synthetic fingerprint databases as well as a mixed database. Furthermore, a performance factor that can evaluate the SVM's accuracy and efficiency is presented, and a quantitative optimization strategy is established for the first time. After the optimization of our synthetic fingerprint discrimination task, the polynomial kernel with a training sample proportion of 5% is the optimized value when the minimum accuracy requirement is 95%. The radial basis function (RBF) kernel with a training sample proportion of 15% is a more suitable choice when the minimum accuracy requirement is 98%. PMID:25347063
8 CFR 264.1 - Registration and fingerprinting.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security, providing fingerprints, photographs, or submitting supplemental information or documentation. (ii... may be required and each change of material fact is a registration that is required under sections 262...
8 CFR 264.1 - Registration and fingerprinting.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security, providing fingerprints, photographs, or submitting supplemental information or documentation. (ii... may be required and each change of material fact is a registration that is required under sections 262...
8 CFR 264.1 - Registration and finger-printing.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security, providing fingerprints, photographs, or submitting supplemental information or documentation. (ii... may be required and each change of material fact is a registration that is required under sections 262...
48 CFR 1352.237-71 - Security processing requirements-low risk contracts.
Code of Federal Regulations, 2012 CFR
2012-10-01
... processed. The Sponsor will forward a completed Form OFI-86C, FD-258, Fingerprint Chart, and Credit Release... (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). (5) In addition, for.... Fingerprints and a Credit Release Authorization must be completed within three working days from start of work...
48 CFR 1352.237-71 - Security processing requirements-low risk contracts.
Code of Federal Regulations, 2014 CFR
2014-10-01
... processed. The Sponsor will forward a completed Form OFI-86C, FD-258, Fingerprint Chart, and Credit Release... (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). (5) In addition, for.... Fingerprints and a Credit Release Authorization must be completed within three working days from start of work...
48 CFR 1352.237-71 - Security processing requirements-low risk contracts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... processed. The Sponsor will forward a completed Form OFI-86C, FD-258, Fingerprint Chart, and Credit Release... (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). (5) In addition, for.... Fingerprints and a Credit Release Authorization must be completed within three working days from start of work...
48 CFR 1352.237-71 - Security processing requirements-low risk contracts.
Code of Federal Regulations, 2010 CFR
2010-10-01
... processed. The Sponsor will forward a completed Form OFI-86C, FD-258, Fingerprint Chart, and Credit Release... (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). (5) In addition, for.... Fingerprints and a Credit Release Authorization must be completed within three working days from start of work...
48 CFR 1352.237-71 - Security processing requirements-low risk contracts.
Code of Federal Regulations, 2013 CFR
2013-10-01
... processed. The Sponsor will forward a completed Form OFI-86C, FD-258, Fingerprint Chart, and Credit Release... (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). (5) In addition, for.... Fingerprints and a Credit Release Authorization must be completed within three working days from start of work...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... both temporary and permanent. Locations such as post offices can take secure fingerprints for purposes... large number of applicants might require fingerprints and identification checks, and that the Coast... interim rule and work with industry to come up with a better system for fingerprint and identification...
Alignment and bit extraction for secure fingerprint biometrics
NASA Astrophysics Data System (ADS)
Nagar, A.; Rane, S.; Vetro, A.
2010-01-01
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.
14 CFR 1274.928 - Foreign national employee investigative requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... completed applicant fingerprint card (Federal Bureau of Investigation Card FD-258) for each foreign national... facilities. The NASA Form 531 and fingerprint card may be obtained from the NASA Installation Security Office...
14 CFR 1274.928 - Foreign national employee investigative requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... completed applicant fingerprint card (Federal Bureau of Investigation Card FD-258) for each foreign national... facilities. The NASA Form 531 and fingerprint card may be obtained from the NASA Installation Security Office...
14 CFR 1274.928 - Foreign national employee investigative requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... completed applicant fingerprint card (Federal Bureau of Investigation Card FD-258) for each foreign national... facilities. The NASA Form 531 and fingerprint card may be obtained from the NASA Installation Security Office...
14 CFR 1274.928 - Foreign national employee investigative requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... completed applicant fingerprint card (Federal Bureau of Investigation Card FD-258) for each foreign national... facilities. The NASA Form 531 and fingerprint card may be obtained from the NASA Installation Security Office...
49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in 49 CFR 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in 49 CFR 1572.17, the fee required...
49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in 49 CFR 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in 49 CFR 1572.17, the fee required...
49 CFR 1572.11 - Applicant responsibilities for HME security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in 49 CFR 1572.9, in a... fingerprints and the information required in 49 CFR 1572.9, the fee described in 49 CFR 1572.503 must be...
49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in 49 CFR 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in 49 CFR 1572.17, the fee required...
49 CFR 1572.11 - Applicant responsibilities for HME security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in 49 CFR 1572.9, in a... fingerprints and the information required in 49 CFR 1572.9, the fee described in 49 CFR 1572.503 must be...
49 CFR 1572.11 - Applicant responsibilities for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in 49 CFR 1572.9, in a... fingerprints and the information required in 49 CFR 1572.9, the fee described in 49 CFR 1572.503 must be...
49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in 49 CFR 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in 49 CFR 1572.17, the fee required...
49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... from the United States. (e) Submission of fingerprints and information. (1) TWIC applicants must submit fingerprints and the information required in 49 CFR 1572.17, in a form acceptable to TSA, to obtain or renew a TWIC. (2) When submitting fingerprints and the information required in 49 CFR 1572.17, the fee required...
49 CFR 1572.11 - Applicant responsibilities for HME security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in 49 CFR 1572.9, in a... fingerprints and the information required in 49 CFR 1572.9, the fee described in 49 CFR 1572.503 must be...
49 CFR 1572.11 - Applicant responsibilities for HME security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... immigration status, and/or is ordered removed from the United States. (c) Submission of fingerprints and information. (1) An HME applicant must submit fingerprints and the information required in 49 CFR 1572.9, in a... fingerprints and the information required in 49 CFR 1572.9, the fee described in 49 CFR 1572.503 must be...
NASA Astrophysics Data System (ADS)
Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd
2016-11-01
Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.
14 CFR § 1274.928 - Foreign national employee investigative requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... completed applicant fingerprint card (Federal Bureau of Investigation Card FD-258) for each foreign national... facilities. The NASA Form 531 and fingerprint card may be obtained from the NASA Installation Security Office...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lopez, Juan; Liefer, Nathan C.; Busho, Colin R.
Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML)more » and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.« less
Quality and matching performance analysis of three-dimensional unraveled fingerprints
NASA Astrophysics Data System (ADS)
Wang, Yongchang; Hao, Qi; Fatehpuria, Abhishika; Hassebrook, Laurence G.; Lau, Daniel L.
2010-07-01
The use of fingerprints as a biometric is both the oldest mode of computer-aided personal identification and the most-relied-on technology in use today. However, current acquisition methods have some challenging and peculiar difficulties. For higher performance fingerprint data acquisition and verification, a novel noncontact 3-D fingerprint scanner is investigated, where both the detailed 3-D and albedo information of the finger is obtained. The obtained high-resolution 3-D prints are further converted into 3-D unraveled prints, to be compatible with traditional 2-D automatic fingerprint identification systems. As a result, many limitations imposed on conventional fingerprint capture and processing can be reduced by the unobtrusiveness of this approach and the extra depth information acquired. To compare the quality and matching performances of 3-D unraveled with traditional 2-D plain fingerprints, we collect both 3-D prints and their 2-D plain counterparts. The print quality and matching performances are evaluated and analyzed by using National Institute of Standard Technology fingerprint software. Experimental results show that the 3-D unraveled print outperforms the 2-D print in both quality and matching performances.
NASA Astrophysics Data System (ADS)
Mondini, Alessandro C.; Chang, Kang-Tsung; Chiang, Shou-Hao; Schlögel, Romy; Notarnicola, Claudia; Saito, Hitoshi
2017-12-01
We propose a framework to systematically generate event landslide inventory maps from satellite images in southern Taiwan, where landslides are frequent and abundant. The spectral information is used to assess the pixel land cover class membership probability through a Maximum Likelihood classifier trained with randomly generated synthetic land cover spectral fingerprints, which are obtained from an independent training images dataset. Pixels are classified as landslides when the calculated landslide class membership probability, weighted by a susceptibility model, is higher than membership probabilities of other classes. We generated synthetic fingerprints from two FORMOSAT-2 images acquired in 2009 and tested the procedure on two other images, one in 2005 and the other in 2009. We also obtained two landslide maps through manual interpretation. The agreement between the two sets of inventories is given by the Cohen's k coefficients of 0.62 and 0.64, respectively. This procedure can now classify a new FORMOSAT-2 image automatically facilitating the production of landslide inventory maps.
Code of Federal Regulations, 2014 CFR
2014-01-01
... licensee subject to the provisions of this subpart shall fingerprint each individual who is to be permitted... all collected fingerprints to the Commission for transmission to the FBI. The licensee shall use the... fingerprints will be used to secure a review of his or her criminal history record, and shall inform him or her...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-21
... coordinators in one of these airports, to submit personal information and fingerprints. TSA will use the applicant's information and fingerprints to conduct a security threat assessment. An applicant will not...
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Kiltz, Stefan; Krapyvskyy, Dmytro; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus
2011-11-01
A machine-assisted analysis of traces from crime scenes might be possible with the advent of new high-resolution non-destructive contact-less acquisition techniques for latent fingerprints. This requires reliable techniques for the automatic extraction of fingerprint features from latent and exemplar fingerprints for matching purposes using pattern recognition approaches. Therefore, we evaluate the NIST Biometric Image Software for the feature extraction and verification of contact-lessly acquired latent fingerprints to determine potential error rates. Our exemplary test setup includes 30 latent fingerprints from 5 people in two test sets that are acquired from different surfaces using a chromatic white light sensor. The first test set includes 20 fingerprints on two different surfaces. It is used to determine the feature extraction performance. The second test set includes one latent fingerprint on 10 different surfaces and an exemplar fingerprint to determine the verification performance. This utilized sensing technique does not require a physical or chemical visibility enhancement of the fingerprint residue, thus the original trace remains unaltered for further investigations. No particular feature extraction and verification techniques have been applied to such data, yet. Hence, we see the need for appropriate algorithms that are suitable to support forensic investigations.
Assignment of EC Numbers to Enzymatic Reactions with Reaction Difference Fingerprints
Hu, Qian-Nan; Zhu, Hui; Li, Xiaobing; Zhang, Manman; Deng, Zhe; Yang, Xiaoyan; Deng, Zixin
2012-01-01
The EC numbers represent enzymes and enzyme genes (genomic information), but they are also utilized as identifiers of enzymatic reactions (chemical information). In the present work (ECAssigner), our newly proposed reaction difference fingerprints (RDF) are applied to assign EC numbers to enzymatic reactions. The fingerprints of reactant molecules minus the fingerprints of product molecules will generate reaction difference fingerprints, which are then used to calculate reaction Euclidean distance, a reaction similarity measurement, of two reactions. The EC number of the most similar training reaction will be assigned to an input reaction. For 5120 balanced enzymatic reactions, the RDF with a fingerprint length at 3 obtained at the sub-subclass, subclass, and main class level with cross-validation accuracies of 83.1%, 86.7%, and 92.6% respectively. Compared with three published methods, ECAssigner is the first fully automatic server for EC number assignment. The EC assignment system (ECAssigner) is freely available via: http://cadd.whu.edu.cn/ecassigner/. PMID:23285222
Neural Network Design on the SRC-6 Reconfigurable Computer
2006-12-01
fingerprint identification. In this field, automatic identification methods are used to save time, especially for the purpose of fingerprint matching in...grid widths and lengths and therefore was useful in producing an accurate canvas with which to create sample training images. The added benefit of...tools available free of charge and readily accessible on the computer, it was simple to design bitmap data files visually on a canvas and then
Fingerprints selection for topological localization
NASA Astrophysics Data System (ADS)
Popov, Vladimir
2017-07-01
Problems of visual navigation are extensively studied in contemporary robotics. In particular, we can mention different problems of visual landmarks selection, the problem of selection of a minimal set of visual landmarks, selection of partially distinguishable guards, the problem of placement of visual landmarks. In this paper, we consider one-dimensional color panoramas. Such panoramas can be used for creating fingerprints. Fingerprints give us unique identifiers for visually distinct locations by recovering statistically significant features. Fingerprints can be used as visual landmarks for the solution of various problems of mobile robot navigation. In this paper, we consider a method for automatic generation of fingerprints. In particular, we consider the bounded Post correspondence problem and applications of the problem to consensus fingerprints and topological localization. We propose an efficient approach to solve the bounded Post correspondence problem. In particular, we use an explicit reduction from the decision version of the problem to the satisfiability problem. We present the results of computational experiments for different satisfiability algorithms. In robotic experiments, we consider the average accuracy of reaching of the target point for different lengths of routes and types of fingerprints.
Advanced fingerprint verification software
NASA Astrophysics Data System (ADS)
Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.
2016-05-01
We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru
2008-03-01
Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The function to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and Success in login" effective. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.
An investigation of fake fingerprint detection approaches
NASA Astrophysics Data System (ADS)
Ahmad, Asraful Syifaa'; Hassan, Rohayanti; Othman, Razib M.
2017-10-01
The most reliable biometrics technology, fingerprint recognition is widely used in terms of security due to its permanence and uniqueness. However, it is also vulnerable to the certain type of attacks including presenting fake fingerprints to the sensor which requires the development of new and efficient protection measures. Particularly, the aim is to identify the most recent literature related to the fake fingerprint recognition and only focus on software-based approaches. A systematic review is performed by analyzing 146 primary studies from the gross collection of 34 research papers to determine the taxonomy, approaches, online public databases, and limitations of the fake fingerprint. Fourteen software-based approaches have been briefly described, four limitations of fake fingerprint image were revealed and two known fake fingerprint databases were addressed briefly in this review. Therefore this work provides an overview of an insight into the current understanding of fake fingerprint recognition besides identifying future research possibilities.
Fingerprint Recognition with Identical Twin Fingerprints
Yang, Xin; Tian, Jie
2012-01-01
Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar. PMID:22558204
Fingerprint recognition with identical twin fingerprints.
Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie
2012-01-01
Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.
2014-09-30
fingerprint sensor etc. Secure application execution Trust established outwards With normal world apps With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...
12 CFR 1008.305 - Data security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Data security. 1008.305 Section 1008.305 Banks... § 1008.305 Data security. (a) To the extent that CSBS, AARMR, or their successors maintain the NMLSR..., contractors, or other persons who have access to loan originators' Social Security Numbers, fingerprints, or...
24 CFR 3400.305 - Data security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Data security. 3400.305 Section... security. (a) To the extent that CSBS, AARMR, or their successors, maintain the NMLSR, CSBS, AARMR, and... other persons who have access to loan originators' Social Security Numbers, fingerprints, or any credit...
24 CFR 3400.305 - Data security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Data security. 3400.305 Section... security. (a) To the extent that CSBS, AARMR, or their successors, maintain the NMLSR, CSBS, AARMR, and... other persons who have access to loan originators' Social Security Numbers, fingerprints, or any credit...
Capturing latent fingerprints from metallic painted surfaces using UV-VIS spectroscope
NASA Astrophysics Data System (ADS)
Makrushin, Andrey; Scheidat, Tobias; Vielhauer, Claus
2015-03-01
In digital crime scene forensics, contactless non-destructive detection and acquisition of latent fingerprints by means of optical devices such as a high-resolution digital camera, confocal microscope, or chromatic white-light sensor is the initial step prior to destructive chemical development. The applicability of an optical sensor to digitalize latent fingerprints primarily depends on reflection properties of a substrate. Metallic painted surfaces, for instance, pose a problem for conventional sensors which make use of visible light. Since metallic paint is a semi-transparent layer on top of the surface, visible light penetrates it and is reflected off of the metallic flakes randomly disposed in the paint. Fingerprint residues do not impede light beams making ridges invisible. Latent fingerprints can be revealed, however, using ultraviolet light which does not penetrate the paint. We apply a UV-VIS spectroscope that is capable of capturing images within the range from 163 to 844 nm using 2048 discrete levels. We empirically show that latent fingerprints left behind on metallic painted surfaces become clearly visible within the range from 205 to 385 nm. Our proposed streakiness score feature determining the proportion of a ridge-valley pattern in an image is applied for automatic assessment of a fingerprint's visibility and distinguishing between fingerprint and empty regions. The experiments are carried out with 100 fingerprint and 100 non-fingerprint samples.
Practical Pocket PC Application w/Biometric Security
NASA Technical Reports Server (NTRS)
Logan, Julian
2004-01-01
I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.
Scanning the pressure-induced distortion of fingerprints.
Mil'shtein, S; Doshi, U
2004-01-01
Fingerprint recognition technology is an important part of criminal investigations it is the basis of some security systems and an important tool of government operations such as the Immigration and Naturalization Services, registration procedures in the Armed Forces, and so forth. After the tragic events of September 11, 2001, the importance of reliable fingerprint recognition technology became even more obvious. In the current study, pressure-induced changes of distances between ridges of a fingerprint were measured. Using calibrated silicon pressure sensors we scanned the distribution of pressure across a finger pixel by pixel, and also generated maps of an average pressure distribution during fingerprinting. Emulating the fingerprinting procedure employed with widely used optical scanners, we found that on average the distance between ridges decreases by about 20% when a finger is positioned on a scanner. Controlled loading of a finger demonstrated that it is impossible to reproduce the same distribution of pressure across a given finger during repeated fingerprinting procedures.
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Hierarchical minutiae matching for fingerprint and palmprint identification.
Chen, Fanglin; Huang, Xiaolin; Zhou, Jie
2013-12-01
Fingerprints and palmprints are the most common authentic biometrics for personal identification, especially for forensic security. Previous research have been proposed to speed up the searching process in fingerprint and palmprint identification systems, such as those based on classification or indexing, in which the deterioration of identification accuracy is hard to avert. In this paper, a novel hierarchical minutiae matching algorithm for fingerprint and palmprint identification systems is proposed. This method decomposes the matching step into several stages and rejects many false fingerprints or palmprints on different stages, thus it can save much time while preserving a high identification rate. Experimental results show that the proposed algorithm can save almost 50% searching time compared with traditional methods and illustrate its effectiveness.
NASA Astrophysics Data System (ADS)
Lucena, P.; Gaona, I.; Moros, J.; Laserna, J. J.
2013-07-01
Detection of explosive-contaminated human fingerprints constitutes an analytical challenge of high significance in security issues and in forensic sciences. The use of a laser-induced breakdown spectroscopy (LIBS) sensor working at 31 m distance to the target, fitted with 2D scanning capabilities and designed for capturing spectral information from laser-induced plasmas of fingerprints is presented. Distribution chemical maps based on Na and CN emissions are used to locate and detect chloratite, DNT, TNT, RDX and PETN residues that have been deposited on the surface of aluminum and glass substrates. An effectiveness of 100% on fingerprints detection, regardless the substrate scanned, is reached. Environmental factors that affect the prevalence of the fingerprint LIBS response are discussed.
Method for modeling post-mortem biometric 3D fingerprints
NASA Astrophysics Data System (ADS)
Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.
2016-05-01
Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-10
... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buckner, Mark A; Bobrek, Miljko; Farquhar, Ethan
Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differentialmore » Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.« less
Code of Federal Regulations, 2014 CFR
2014-01-01
... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...
Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging
NASA Astrophysics Data System (ADS)
Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai
2015-08-01
Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.
Tamburro, Gabriella; Fiedler, Patrique; Stone, David; Haueisen, Jens; Comani, Silvia
2018-01-01
EEG may be affected by artefacts hindering the analysis of brain signals. Data-driven methods like independent component analysis (ICA) are successful approaches to remove artefacts from the EEG. However, the ICA-based methods developed so far are often affected by limitations, such as: the need for visual inspection of the separated independent components (subjectivity problem) and, in some cases, for the independent and simultaneous recording of the inspected artefacts to identify the artefactual independent components; a potentially heavy manipulation of the EEG signals; the use of linear classification methods; the use of simulated artefacts to validate the methods; no testing in dry electrode or high-density EEG datasets; applications limited to specific conditions and electrode layouts. Our fingerprint method automatically identifies EEG ICs containing eyeblinks, eye movements, myogenic artefacts and cardiac interference by evaluating 14 temporal, spatial, spectral, and statistical features composing the IC fingerprint. Sixty-two real EEG datasets containing cued artefacts are recorded with wet and dry electrodes (128 wet and 97 dry channels). For each artefact, 10 nonlinear SVM classifiers are trained on fingerprints of expert-classified ICs. Training groups include randomly chosen wet and dry datasets decomposed in 80 ICs. The classifiers are tested on the IC-fingerprints of different datasets decomposed into 20, 50, or 80 ICs. The SVM performance is assessed in terms of accuracy, False Omission Rate (FOR), Hit Rate (HR), False Alarm Rate (FAR), and sensitivity ( p ). For each artefact, the quality of the artefact-free EEG reconstructed using the classification of the best SVM is assessed by visual inspection and SNR. The best SVM classifier for each artefact type achieved average accuracy of 1 (eyeblink), 0.98 (cardiac interference), and 0.97 (eye movement and myogenic artefact). Average classification sensitivity (p) was 1 (eyeblink), 0.997 (myogenic artefact), 0.98 (eye movement), and 0.48 (cardiac interference). Average artefact reduction ranged from a maximum of 82% for eyeblinks to a minimum of 33% for cardiac interference, depending on the effectiveness of the proposed method and the amplitude of the removed artefact. The performance of the SVM classifiers did not depend on the electrode type, whereas it was better for lower decomposition levels (50 and 20 ICs). Apart from cardiac interference, SVM performance and average artefact reduction indicate that the fingerprint method has an excellent overall performance in the automatic detection of eyeblinks, eye movements and myogenic artefacts, which is comparable to that of existing methods. Being also independent from simultaneous artefact recording, electrode number, type and layout, and decomposition level, the proposed fingerprint method can have useful applications in clinical and experimental EEG settings.
Tamburro, Gabriella; Fiedler, Patrique; Stone, David; Haueisen, Jens
2018-01-01
Background EEG may be affected by artefacts hindering the analysis of brain signals. Data-driven methods like independent component analysis (ICA) are successful approaches to remove artefacts from the EEG. However, the ICA-based methods developed so far are often affected by limitations, such as: the need for visual inspection of the separated independent components (subjectivity problem) and, in some cases, for the independent and simultaneous recording of the inspected artefacts to identify the artefactual independent components; a potentially heavy manipulation of the EEG signals; the use of linear classification methods; the use of simulated artefacts to validate the methods; no testing in dry electrode or high-density EEG datasets; applications limited to specific conditions and electrode layouts. Methods Our fingerprint method automatically identifies EEG ICs containing eyeblinks, eye movements, myogenic artefacts and cardiac interference by evaluating 14 temporal, spatial, spectral, and statistical features composing the IC fingerprint. Sixty-two real EEG datasets containing cued artefacts are recorded with wet and dry electrodes (128 wet and 97 dry channels). For each artefact, 10 nonlinear SVM classifiers are trained on fingerprints of expert-classified ICs. Training groups include randomly chosen wet and dry datasets decomposed in 80 ICs. The classifiers are tested on the IC-fingerprints of different datasets decomposed into 20, 50, or 80 ICs. The SVM performance is assessed in terms of accuracy, False Omission Rate (FOR), Hit Rate (HR), False Alarm Rate (FAR), and sensitivity (p). For each artefact, the quality of the artefact-free EEG reconstructed using the classification of the best SVM is assessed by visual inspection and SNR. Results The best SVM classifier for each artefact type achieved average accuracy of 1 (eyeblink), 0.98 (cardiac interference), and 0.97 (eye movement and myogenic artefact). Average classification sensitivity (p) was 1 (eyeblink), 0.997 (myogenic artefact), 0.98 (eye movement), and 0.48 (cardiac interference). Average artefact reduction ranged from a maximum of 82% for eyeblinks to a minimum of 33% for cardiac interference, depending on the effectiveness of the proposed method and the amplitude of the removed artefact. The performance of the SVM classifiers did not depend on the electrode type, whereas it was better for lower decomposition levels (50 and 20 ICs). Discussion Apart from cardiac interference, SVM performance and average artefact reduction indicate that the fingerprint method has an excellent overall performance in the automatic detection of eyeblinks, eye movements and myogenic artefacts, which is comparable to that of existing methods. Being also independent from simultaneous artefact recording, electrode number, type and layout, and decomposition level, the proposed fingerprint method can have useful applications in clinical and experimental EEG settings. PMID:29492336
A framework of multitemplate ensemble for fingerprint verification
NASA Astrophysics Data System (ADS)
Yin, Yilong; Ning, Yanbin; Ren, Chunxiao; Liu, Li
2012-12-01
How to improve performance of an automatic fingerprint verification system (AFVS) is always a big challenge in biometric verification field. Recently, it becomes popular to improve the performance of AFVS using ensemble learning approach to fuse related information of fingerprints. In this article, we propose a novel framework of fingerprint verification which is based on the multitemplate ensemble method. This framework is consisted of three stages. In the first stage, enrollment stage, we adopt an effective template selection method to select those fingerprints which best represent a finger, and then, a polyhedron is created by the matching results of multiple template fingerprints and a virtual centroid of the polyhedron is given. In the second stage, verification stage, we measure the distance between the centroid of the polyhedron and a query image. In the final stage, a fusion rule is used to choose a proper distance from a distance set. The experimental results on the FVC2004 database prove the improvement on the effectiveness of the new framework in fingerprint verification. With a minutiae-based matching method, the average EER of four databases in FVC2004 drops from 10.85 to 0.88, and with a ridge-based matching method, the average EER of these four databases also decreases from 14.58 to 2.51.
Compact Microscope Imaging System Developed
NASA Technical Reports Server (NTRS)
McDowell, Mark
2001-01-01
The Compact Microscope Imaging System (CMIS) is a diagnostic tool with intelligent controls for use in space, industrial, medical, and security applications. The CMIS can be used in situ with a minimum amount of user intervention. This system, which was developed at the NASA Glenn Research Center, can scan, find areas of interest, focus, and acquire images automatically. Large numbers of multiple cell experiments require microscopy for in situ observations; this is only feasible with compact microscope systems. CMIS is a miniature machine vision system that combines intelligent image processing with remote control capabilities. The software also has a user-friendly interface that can be used independently of the hardware for post-experiment analysis. CMIS has potential commercial uses in the automated online inspection of precision parts, medical imaging, security industry (examination of currency in automated teller machines and fingerprint identification in secure entry locks), environmental industry (automated examination of soil/water samples), biomedical field (automated blood/cell analysis), and microscopy community. CMIS will improve research in several ways: It will expand the capabilities of MSD experiments utilizing microscope technology. It may be used in lunar and Martian experiments (Rover Robot). Because of its reduced size, it will enable experiments that were not feasible previously. It may be incorporated into existing shuttle orbiter and space station experiments, including glove-box-sized experiments as well as ground-based experiments.
Use of AFIS for linking scenes of crime.
Hefetz, Ido; Liptz, Yakir; Vaturi, Shaul; Attias, David
2016-05-01
Forensic intelligence can provide critical information in criminal investigations - the linkage of crime scenes. The Automatic Fingerprint Identification System (AFIS) is an example of a technological improvement that has advanced the entire forensic identification field to strive for new goals and achievements. In one example using AFIS, a series of burglaries into private apartments enabled a fingerprint examiner to search latent prints from different burglary scenes against an unsolved latent print database. Latent finger and palm prints coming from the same source were associated with over than 20 cases. Then, by forensic intelligence and profile analysis the offender's behavior could be anticipated. He was caught, identified, and arrested. It is recommended to perform an AFIS search of LT/UL prints against current crimes automatically as part of laboratory protocol and not by an examiner's discretion. This approach may link different crime scenes. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Zhao, Weichen; Sun, Zhuo; Kong, Song
2016-10-01
Wireless devices can be identified by the fingerprint extracted from the signal transmitted, which is useful in wireless communication security and other fields. This paper presents a method that extracts fingerprint based on phase noise of signal and multiple level wavelet decomposition. The phase of signal will be extracted first and then decomposed by multiple level wavelet decomposition. The statistic value of each wavelet coefficient vector is utilized for constructing fingerprint. Besides, the relationship between wavelet decomposition level and recognition accuracy is simulated. And advertised decomposition level is revealed as well. Compared with previous methods, our method is simpler and the accuracy of recognition remains high when Signal Noise Ratio (SNR) is low.
Security and matching of partial fingerprint recognition systems
NASA Astrophysics Data System (ADS)
Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.
2004-08-01
Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).
RSA Key Development Using Fingerprint Image on Text Message
NASA Astrophysics Data System (ADS)
Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti
2017-12-01
Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
On the Horizon: New Advances in Security Technology
ERIC Educational Resources Information Center
Gamble, Cheryl
2005-01-01
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shimizu, Y; Yoon, Y; Iwase, K
Purpose: We are trying to develop an image-searching technique to identify misfiled images in a picture archiving and communication system (PACS) server by using five biological fingerprints: the whole lung field, cardiac shadow, superior mediastinum, lung apex, and right lower lung. Each biological fingerprint in a chest radiograph includes distinctive anatomical structures to identify misfiled images. The whole lung field was less effective for evaluating the similarity between two images than the other biological fingerprints. This was mainly due to the variation in the positioning for chest radiographs. The purpose of this study is to develop new biological fingerprints thatmore » could reduce influence of differences in the positioning for chest radiography. Methods: Two hundred patients were selected randomly from our database (36,212 patients). These patients had two images each (current and previous images). Current images were used as the misfiled images in this study. A circumscribed rectangular area of the lung and the upper half of the rectangle were selected automatically as new biological fingerprints. These biological fingerprints were matched to all previous images in the database. The degrees of similarity between the two images were calculated for the same and different patients. The usefulness of new the biological fingerprints for automated patient recognition was examined in terms of receiver operating characteristic (ROC) analysis. Results: Area under the ROC curves (AUCs) for the circumscribed rectangle of the lung, upper half of the rectangle, and whole lung field were 0.980, 0.994, and 0.950, respectively. The new biological fingerprints showed better performance in identifying the patients correctly than the whole lung field. Conclusion: We have developed new biological fingerprints: circumscribed rectangle of the lung and upper half of the rectangle. These new biological fingerprints would be useful for automated patient identification system because they are less affected by positioning differences during imaging.« less
NASA Astrophysics Data System (ADS)
Imbalzano, Giulio; Anelli, Andrea; Giofré, Daniele; Klees, Sinja; Behler, Jörg; Ceriotti, Michele
2018-06-01
Machine learning of atomic-scale properties is revolutionizing molecular modeling, making it possible to evaluate inter-atomic potentials with first-principles accuracy, at a fraction of the costs. The accuracy, speed, and reliability of machine learning potentials, however, depend strongly on the way atomic configurations are represented, i.e., the choice of descriptors used as input for the machine learning method. The raw Cartesian coordinates are typically transformed in "fingerprints," or "symmetry functions," that are designed to encode, in addition to the structure, important properties of the potential energy surface like its invariances with respect to rotation, translation, and permutation of like atoms. Here we discuss automatic protocols to select a number of fingerprints out of a large pool of candidates, based on the correlations that are intrinsic to the training data. This procedure can greatly simplify the construction of neural network potentials that strike the best balance between accuracy and computational efficiency and has the potential to accelerate by orders of magnitude the evaluation of Gaussian approximation potentials based on the smooth overlap of atomic positions kernel. We present applications to the construction of neural network potentials for water and for an Al-Mg-Si alloy and to the prediction of the formation energies of small organic molecules using Gaussian process regression.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kakinuma, Ryutaru; Moriyama, Noriyuki
2009-02-01
Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. To overcome these problems, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The functions to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and "Success in login" effective. As a result, patients' private information is protected. We can share the screen of Web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with workstation. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.
Automatic Construction of Wi-Fi Radio Map Using Smartphones
NASA Astrophysics Data System (ADS)
Liu, Tao; Li, Qingquan; Zhang, Xing
2016-06-01
Indoor positioning could provide interesting services and applications. As one of the most popular indoor positioning methods, location fingerprinting determines the location of mobile users by matching the received signal strength (RSS) which is location dependent. However, fingerprinting-based indoor positioning requires calibration and updating of the fingerprints which is labor-intensive and time-consuming. In this paper, we propose a visual-based approach for the construction of radio map for anonymous indoor environments without any prior knowledge. This approach collects multi-sensors data, e.g. video, accelerometer, gyroscope, Wi-Fi signals, etc., when people (with smartphones) walks freely in indoor environments. Then, it uses the multi-sensor data to restore the trajectories of people based on an integrated structure from motion (SFM) and image matching method, and finally estimates location of sampling points on the trajectories and construct Wi-Fi radio map. Experiment results show that the average location error of the fingerprints is about 0.53 m.
Unsupervised Indoor Localization Based on Smartphone Sensors, iBeacon and Wi-Fi.
Chen, Jing; Zhang, Yi; Xue, Wei
2018-04-28
In this paper, we propose UILoc, an unsupervised indoor localization scheme that uses a combination of smartphone sensors, iBeacons and Wi-Fi fingerprints for reliable and accurate indoor localization with zero labor cost. Firstly, compared with the fingerprint-based method, the UILoc system can build a fingerprint database automatically without any site survey and the database will be applied in the fingerprint localization algorithm. Secondly, since the initial position is vital to the system, UILoc will provide the basic location estimation through the pedestrian dead reckoning (PDR) method. To provide accurate initial localization, this paper proposes an initial localization module, a weighted fusion algorithm combined with a k-nearest neighbors (KNN) algorithm and a least squares algorithm. In UILoc, we have also designed a reliable model to reduce the landmark correction error. Experimental results show that the UILoc can provide accurate positioning, the average localization error is about 1.1 m in the steady state, and the maximum error is 2.77 m.
Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents
2015-01-01
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
Reference point detection for camera-based fingerprint image based on wavelet transformation.
Khalil, Mohammed S
2015-04-30
Fingerprint recognition systems essentially require core-point detection prior to fingerprint matching. The core-point is used as a reference point to align the fingerprint with a template database. When processing a larger fingerprint database, it is necessary to consider the core-point during feature extraction. Numerous core-point detection methods are available and have been reported in the literature. However, these methods are generally applied to scanner-based images. Hence, this paper attempts to explore the feasibility of applying a core-point detection method to a fingerprint image obtained using a camera phone. The proposed method utilizes a discrete wavelet transform to extract the ridge information from a color image. The performance of proposed method is evaluated in terms of accuracy and consistency. These two indicators are calculated automatically by comparing the method's output with the defined core points. The proposed method is tested on two data sets, controlled and uncontrolled environment, collected from 13 different subjects. In the controlled environment, the proposed method achieved a detection rate 82.98%. In uncontrolled environment, the proposed method yield a detection rate of 78.21%. The proposed method yields promising results in a collected-image database. Moreover, the proposed method outperformed compare to existing method.
DWI-based neural fingerprinting technology: a preliminary study on stroke analysis.
Ye, Chenfei; Ma, Heather Ting; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo
2014-01-01
Stroke is a common neural disorder in neurology clinics. Magnetic resonance imaging (MRI) has become an important tool to assess the neural physiological changes under stroke, such as diffusion weighted imaging (DWI) and diffusion tensor imaging (DTI). Quantitative analysis of MRI images would help medical doctors to localize the stroke area in the diagnosis in terms of structural information and physiological characterization. However, current quantitative approaches can only provide localization of the disorder rather than measure physiological variation of subtypes of ischemic stroke. In the current study, we hypothesize that each kind of neural disorder would have its unique physiological characteristics, which could be reflected by DWI images on different gradients. Based on this hypothesis, a DWI-based neural fingerprinting technology was proposed to classify subtypes of ischemic stroke. The neural fingerprint was constructed by the signal intensity of the region of interest (ROI) on the DWI images under different gradients. The fingerprint derived from the manually drawn ROI could classify the subtypes with accuracy 100%. However, the classification accuracy was worse when using semiautomatic and automatic method in ROI segmentation. The preliminary results showed promising potential of DWI-based neural fingerprinting technology in stroke subtype classification. Further studies will be carried out for enhancing the fingerprinting accuracy and its application in other clinical practices.
NASA Astrophysics Data System (ADS)
Dsouza, Roshan I.; Zam, Azhar; Subhash, Hrebesh M.; Larin, Kirill V.; Leahy, Martin
2013-02-01
We describe a novel application of correlation mapping optical coherence tomography (cmOCT) for sub-surface fingerprint biometric identification. Fingerprint biometrics including automated fingerprint identification systems, are commonly used to recognise the fingerprint, since they constitute simple, effective and valuable physical evidence. Spoofing of biometric fingerprint devices can be easily done because of the limited information obtained from the surface topography. In order to overcome this limitation a potentially more secure source of information is required for biometric identification applications. In this study, we retrieve the microcirculation map of the subsurface fingertip by use of the cmOCT technique. To increase probing depth of the sub surface microcirculation, an optical clearing agent composed of 75% glycerol in aqueous solution was applied topically and kept in contact for 15 min. OCT intensity images were acquired from commercial research grade swept source OCT system (model OCT1300SS, Thorlabs Inc. USA). A 3D OCT scan of the fingertip was acquired over an area of 5x5 mm using 1024x1024 A-scans in approximately 70 s. The resulting volume was then processed using the cmOCT technique with a 7x7 kernel to provide a microcirculation map. We believe these results will demonstrate an enhanced security level over artificial fingertips. To the best of our knowledge, this is the first demonstration of imaging microcirculation map of the subsurface fingertip.
Generating One Biometric Feature from Another: Faces from Fingerprints
Ozkaya, Necla; Sagiroglu, Seref
2010-01-01
This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877
Optimization of illuminating system to detect optical properties inside a finger
NASA Astrophysics Data System (ADS)
Sano, Emiko; Shikai, Masahiro; Shiratsuki, Akihide; Maeda, Takuji; Matsushita, Masahito; Sasakawa, Koichi
2007-01-01
Biometrics performs personal authentication using individual bodily features including fingerprints, faces, etc. These technologies have been studied and developed for many years. In particular, fingerprint authentication has evolved over many years, and fingerprinting is currently one of world's most established biometric authentication techniques. Not long ago this technique was only used for personal identification in criminal investigations and high-security facilities. In recent years, however, various biometric authentication techniques have appeared in everyday applications. Even though providing great convenience, they have also produced a number of technical issues concerning operation. Generally, fingerprint authentication is comprised of a number of component technologies: (1) sensing technology for detecting the fingerprint pattern; (2) image processing technology for converting the captured pattern into feature data that can be used for verification; (3) verification technology for comparing the feature data with a reference and determining whether it matches. Current fingerprint authentication issues, revealed in research results, originate with fingerprint sensing technology. Sensing methods for detecting a person's fingerprint pattern for image processing are particularly important because they impact overall fingerprint authentication performance. The following are the current problems concerning sensing methods that occur in some cases: Some fingers whose fingerprints used to be difficult to detect by conventional sensors. Fingerprint patterns are easily affected by the finger's surface condition, such noise as discontinuities and thin spots can appear in fingerprint patterns obtained from wrinkled finger, sweaty finger, and so on. To address these problems, we proposed a novel fingerprint sensor based on new scientific knowledge. A characteristic of this new method is that obtained fingerprint patterns are not easily affected by the finger's surface condition because it detects the fingerprint pattern inside the finger using transmitted light. We examined optimization of illumination system of this novel fingerprint sensor to detect contrasty fingerprint pattern from wide area and to improve image processing at (2).
2012-06-01
23 5 TEST DESIGN ... research project, ORD will continue to focus on only the PCB inventory in the test zone and selected areas of the river as further defined in subsequent...1,000 500 50 25 5 TEST DESIGN This section of the report provides the detailed description of the experimental design and testing
Evaluation of fingerprint deformation using optical coherence tomography
NASA Astrophysics Data System (ADS)
Gutierrez da Costa, Henrique S.; Maxey, Jessica R.; Silva, Luciano; Ellerbee, Audrey K.
2014-02-01
Biometric identification systems have important applications to privacy and security. The most widely used of these, print identification, is based on imaging patterns present in the fingers, hands and feet that are formed by the ridges, valleys and pores of the skin. Most modern print sensors acquire images of the finger when pressed against a sensor surface. Unfortunately, this pressure may result in deformations, characterized by changes in the sizes and relative distances of the print patterns, and such changes have been shown to negatively affect the performance of fingerprint identification algorithms. Optical coherence tomography (OCT) is a novel imaging technique that is capable of imaging the subsurface of biological tissue. Hence, OCT may be used to obtain images of subdermal skin structures from which one can extract an internal fingerprint. The internal fingerprint is very similar in structure to the commonly used external fingerprint and is of increasing interest in investigations of identify fraud. We proposed and tested metrics based on measurements calculated from external and internal fingerprints to evaluate the amount of deformation of the skin. Such metrics were used to test hypotheses about the differences of deformation between the internal and external images, variations with the type of finger and location inside the fingerprint.
De Martino, Federico; Gentile, Francesco; Esposito, Fabrizio; Balsi, Marco; Di Salle, Francesco; Goebel, Rainer; Formisano, Elia
2007-01-01
We present a general method for the classification of independent components (ICs) extracted from functional MRI (fMRI) data sets. The method consists of two steps. In the first step, each fMRI-IC is associated with an IC-fingerprint, i.e., a representation of the component in a multidimensional space of parameters. These parameters are post hoc estimates of global properties of the ICs and are largely independent of a specific experimental design and stimulus timing. In the second step a machine learning algorithm automatically separates the IC-fingerprints into six general classes after preliminary training performed on a small subset of expert-labeled components. We illustrate this approach in a multisubject fMRI study employing visual structure-from-motion stimuli encoding faces and control random shapes. We show that: (1) IC-fingerprints are a valuable tool for the inspection, characterization and selection of fMRI-ICs and (2) automatic classifications of fMRI-ICs in new subjects present a high correspondence with those obtained by expert visual inspection of the components. Importantly, our classification procedure highlights several neurophysiologically interesting processes. The most intriguing of which is reflected, with high intra- and inter-subject reproducibility, in one IC exhibiting a transiently task-related activation in the 'face' region of the primary sensorimotor cortex. This suggests that in addition to or as part of the mirror system, somatotopic regions of the sensorimotor cortex are involved in disambiguating the perception of a moving body part. Finally, we show that the same classification algorithm can be successfully applied, without re-training, to fMRI collected using acquisition parameters, stimulation modality and timing considerably different from those used for training.
Expertise with unfamiliar objects is flexible to changes in task but not changes in class
Tangen, Jason M.
2017-01-01
Perceptual expertise is notoriously specific and bound by familiarity; generalizing to novel or unfamiliar images, objects, identities, and categories often comes at some cost to performance. In forensic and security settings, however, examiners are faced with the task of discriminating unfamiliar images of unfamiliar objects within their general domain of expertise (e.g., fingerprints, faces, or firearms). The job of a fingerprint expert, for instance, is to decide whether two unfamiliar fingerprint images were left by the same unfamiliar finger (e.g., Smith’s left thumb), or two different unfamiliar fingers (e.g., Smith and Jones’s left thumb). Little is known about the limits of this kind of perceptual expertise. Here, we examine fingerprint experts’ and novices’ ability to distinguish fingerprints compared to inverted faces in two different tasks. Inverted face images serve as an ideal comparison because they vary naturally between and within identities, as do fingerprints, and people tend to be less accurate or more novice-like at distinguishing faces when they are presented in an inverted or unfamiliar orientation. In Experiment 1, fingerprint experts outperformed novices in locating categorical fingerprint outliers (i.e., a loop pattern in an array of whorls), but not inverted face outliers (i.e., an inverted male face in an array of inverted female faces). In Experiment 2, fingerprint experts were more accurate than novices at discriminating matching and mismatching fingerprints that were presented very briefly, but not so for inverted faces. Our data show that perceptual expertise with fingerprints can be flexible to changing task demands, but there can also be abrupt limits: fingerprint expertise did not generalize to an unfamiliar class of stimuli. We interpret these findings as evidence that perceptual expertise with unfamiliar objects is highly constrained by one’s experience. PMID:28574998
An Improved EKG-Based Key Agreement Scheme for Body Area Networks
NASA Astrophysics Data System (ADS)
Ali, Aftab; Khan, Farrukh Aslam
Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.
Security aspects in teleradiology workflow
NASA Astrophysics Data System (ADS)
Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter
2000-05-01
The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.
Viswanathan, P; Krishna, P Venkata
2014-05-01
Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.
Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows
2013-09-01
bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamlet, Jason; Pierson, Lyndon; Bauer, Todd
Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.
Automatic Detection of Sand Ripple Features in Sidescan Sonar Imagery
2014-07-09
Among the features used in forensic scientific fingerprint analysis are terminations or bifurcations of print ridges. Sidescan sonar imagery of ripple...always be pathological cases. The size of the blocks of pixels used in determining the ripple wavelength is evident in the output images on the right in
Intelligent Facial Recognition Systems: Technology advancements for security applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beer, C.L.
1993-07-01
Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less
Biometric template transformation: a security analysis
NASA Astrophysics Data System (ADS)
Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.
2010-01-01
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC.
These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…
SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security
2016-03-01
SPARCHS: SYMBIOTIC , POLYMORPHIC, AUTOMATIC, RESILIENT, CLEAN-SLATE, HOST SECURITY COLUMBIA UNIVERSITY MARCH 2016 FINAL... SYMBIOTIC , POLYMORPHIC, AUTOTOMIC, RESILIENT, CLEAN-SLATE, HOST SECURITY 5a. CONTRACT NUMBER N/A 5b. GRANT NUMBER FA8750-10-2-0253 5c. PROGRAM...17 4.2.3 SYMBIOTIC EMBEDDED MACHINES
NASA Astrophysics Data System (ADS)
Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter
2000-05-01
We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.
Method for combined biometric and chemical analysis of human fingerprints.
Staymates, Jessica L; Orandi, Shahram; Staymates, Matthew E; Gillen, Greg
This paper describes a method for combining direct chemical analysis of latent fingerprints with subsequent biometric analysis within a single sample. The method described here uses ion mobility spectrometry (IMS) as a chemical detection method for explosives and narcotics trace contamination. A collection swab coated with a high-temperature adhesive has been developed to lift latent fingerprints from various surfaces. The swab is then directly inserted into an IMS instrument for a quick chemical analysis. After the IMS analysis, the lifted print remains intact for subsequent biometric scanning and analysis using matching algorithms. Several samples of explosive-laden fingerprints were successfully lifted and the explosives detected with IMS. Following explosive detection, the lifted fingerprints remained of sufficient quality for positive match scores using a prepared gallery consisting of 60 fingerprints. Based on our results ( n = 1200), there was no significant decrease in the quality of the lifted print post IMS analysis. In fact, for a small subset of lifted prints, the quality was improved after IMS analysis. The described method can be readily applied to domestic criminal investigations, transportation security, terrorist and bombing threats, and military in-theatre settings.
Information Operations & Security
2012-03-05
Fred B. Schneider, Cornell The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders ...Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited. Digital Multimedia Anti...fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and
2015-09-17
Exploitation of Unintentional Information Leakage from Inte- grated Circuits”. Ph.D. dissertation, ECE, AFIT, Wright- Patt AFB, OH, 2011. 16. Cobb, W. E...Ph.D. dissertation, ECE, AFIT, Wright- Patt AFB, OH, 2014. 48. Ramsey, B. W., Temple, M. A., and Mullins, B. E. PHY Foundation for Multi-Factor...dissertation, ECE, AFIT, Wright- Patt AFB, OH, 2012. 132 51. Reising, D. R., Temple, M. A., and Oxley, M. E. Gabor-Based RF-DNA Fingerprinting for
A Clock Fingerprints-Based Approach for Wireless Transmitter Identification
NASA Astrophysics Data System (ADS)
Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan
Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.
Stone, David B.; Tamburro, Gabriella; Fiedler, Patrique; Haueisen, Jens; Comani, Silvia
2018-01-01
Data contamination due to physiological artifacts such as those generated by eyeblinks, eye movements, and muscle activity continues to be a central concern in the acquisition and analysis of electroencephalographic (EEG) data. This issue is further compounded in EEG sports science applications where the presence of artifacts is notoriously difficult to control because behaviors that generate these interferences are often the behaviors under investigation. Therefore, there is a need to develop effective and efficient methods to identify physiological artifacts in EEG recordings during sports applications so that they can be isolated from cerebral activity related to the activities of interest. We have developed an EEG artifact detection model, the Fingerprint Method, which identifies different spatial, temporal, spectral, and statistical features indicative of physiological artifacts and uses these features to automatically classify artifactual independent components in EEG based on a machine leaning approach. Here, we optimized our method using artifact-rich training data and a procedure to determine which features were best suited to identify eyeblinks, eye movements, and muscle artifacts. We then applied our model to an experimental dataset collected during endurance cycling. Results reveal that unique sets of features are suitable for the detection of distinct types of artifacts and that the Optimized Fingerprint Method was able to correctly identify over 90% of the artifactual components with physiological origin present in the experimental data. These results represent a significant advancement in the search for effective means to address artifact contamination in EEG sports science applications. PMID:29618975
Stone, David B; Tamburro, Gabriella; Fiedler, Patrique; Haueisen, Jens; Comani, Silvia
2018-01-01
Data contamination due to physiological artifacts such as those generated by eyeblinks, eye movements, and muscle activity continues to be a central concern in the acquisition and analysis of electroencephalographic (EEG) data. This issue is further compounded in EEG sports science applications where the presence of artifacts is notoriously difficult to control because behaviors that generate these interferences are often the behaviors under investigation. Therefore, there is a need to develop effective and efficient methods to identify physiological artifacts in EEG recordings during sports applications so that they can be isolated from cerebral activity related to the activities of interest. We have developed an EEG artifact detection model, the Fingerprint Method, which identifies different spatial, temporal, spectral, and statistical features indicative of physiological artifacts and uses these features to automatically classify artifactual independent components in EEG based on a machine leaning approach. Here, we optimized our method using artifact-rich training data and a procedure to determine which features were best suited to identify eyeblinks, eye movements, and muscle artifacts. We then applied our model to an experimental dataset collected during endurance cycling. Results reveal that unique sets of features are suitable for the detection of distinct types of artifacts and that the Optimized Fingerprint Method was able to correctly identify over 90% of the artifactual components with physiological origin present in the experimental data. These results represent a significant advancement in the search for effective means to address artifact contamination in EEG sports science applications.
Real time biometric surveillance with gait recognition
NASA Astrophysics Data System (ADS)
Mohapatra, Subasish; Swain, Anisha; Das, Manaswini; Mohanty, Subhadarshini
2018-04-01
Bio metric surveillance has become indispensable for every system in the recent years. The contribution of bio metric authentication, identification, and screening purposes are widely used in various domains for preventing unauthorized access. A large amount of data needs to be updated, segregated and safeguarded from malicious software and misuse. Bio metrics is the intrinsic characteristics of each individual. Recently fingerprints, iris, passwords, unique keys, and cards are commonly used for authentication purposes. These methods have various issues related to security and confidentiality. These systems are not yet automated to provide the safety and security. The gait recognition system is the alternative for overcoming the drawbacks of the recent bio metric based authentication systems. Gait recognition is newer as it hasn't been implemented in the real-world scenario so far. This is an un-intrusive system that requires no knowledge or co-operation of the subject. Gait is a unique behavioral characteristic of every human being which is hard to imitate. The walking style of an individual teamed with the orientation of joints in the skeletal structure and inclinations between them imparts the unique characteristic. A person can alter one's own external appearance but not skeletal structure. These are real-time, automatic systems that can even process low-resolution images and video frames. In this paper, we have proposed a gait recognition system and compared the performance with conventional bio metric identification systems.
Optical coherence tomography used for internal biometrics
NASA Astrophysics Data System (ADS)
Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel
2007-06-01
Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.
1992-10-16
the DNA Fingerprint Laboratory. The Los Angeles Police Department and its former Chief, Daryl Gates for permitting a secret unit, the ...authorized to change information in. Conclusions Where angels fear .... Of all the reasons for compartmentation for which the level of evaluation...database, and a security label attribute is associated with data in each tuple in a relation. The range and distribution of security levels may
Contactless optical scanning of fingerprints with 180 degrees view.
Palma, J; Liessner, C; Mil'shtein, S
2006-01-01
Fingerprint recognition technology is an integral part of criminal investigations. It is the basis for the design of numerous security systems in both the private and public sectors. In a recent study emulating the fingerprinting procedure with widely used optical scanners, it was found that, on average, the distance between ridges decreases about 20% when a finger is positioned on a scanner. Using calibrated silicon pressure sensors, the authors scanned the distribution of pressure across a finger, pixel by pixel, and also generated maps of the average pressure distribution during fingerprinting. Controlled loading of a finger demonstrated that it is impossible to reproduce the same distribution of pressure across a given finger during repeated fingerprinting procedures. Based on this study, a novel method of scanning the fingerprint with more than a 180 degrees view was developed. Using a camera rotated around the finger, small slices of the entire image of the finger were acquired. Equal sized slices of the image were processed with a special program assembling a more than 180 degrees view of the finger. Comparison of two images of the same fingerprint, namely the registered and actual images, could be performed by a new algorithm based on the symmetry of the correlation function. The novel method is the first contactless optical scanning technique to view 180 degrees of a fingerprint without moving the finger. In a machine which is under design, it is expected that the full view of one finger would be acquired in about a second.
A humming retrieval system based on music fingerprint
NASA Astrophysics Data System (ADS)
Han, Xingkai; Cao, Baiyu
2011-10-01
In this paper, we proposed an improved music information retrieval method utilizing the music fingerprint. The goal of this method is to represent the music with compressed musical information. Based on the selected MIDI files, which are generated automatically as our music target database, we evaluate the accuracy, effectiveness, and efficiency of this method. In this research we not only extract the feature sequence, which can represent the file effectively, from the query and melody database, but also make it possible for retrieving the results in an innovative way. We investigate on the influence of noise to the performance of our system. As experimental result shows, the retrieval accuracy arriving at up to91% without noise is pretty well
17 CFR 145.5 - Disclosure of nonpublic records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... national defense or foreign policy, and (2) are in fact properly classified pursuant to such executive... number, social security number, date and place of birth, fingerprints and, in appropriate cases, the...
17 CFR 145.5 - Disclosure of nonpublic records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... national defense or foreign policy, and (2) are in fact properly classified pursuant to such executive... number, social security number, date and place of birth, fingerprints and, in appropriate cases, the...
Hamlet, Jason; Pierson, Lyndon; Bauer, Todd
2018-06-25
Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.
Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729
Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.
Nanoscale diffusive memristor crossbars as physical unclonable functions.
Zhang, R; Jiang, H; Wang, Z R; Lin, P; Zhuo, Y; Holcomb, D; Zhang, D H; Yang, J J; Xia, Q
2018-02-08
Physical unclonable functions have emerged as promising hardware security primitives for device authentication and key generation in the era of the Internet of Things. Herein, we report novel physical unclonable functions built upon the crossbars of nanoscale diffusive memristors that translate the stochastic distribution of Ag clusters in a SiO 2 matrix into a random binary bitmap that serves as a device fingerprint. The random dispersion of Ag led to an uneven number of clusters at each cross-point, which in turn resulted in a stochastic ability to switch in the Ag:SiO 2 diffusive memristors in an array. The randomness of the dispersion was a barrier to fingerprint cloning and the unique fingerprints of each device were persistent after fabrication. Using an optimized fabrication procedure, we maximized the randomness and achieved an inter-class Hamming distance of 50.68%. We also discovered that the bits were not flipping after over 10 4 s at 400 K, suggesting superior reliability of our physical unclonable functions. In addition, our diffusive memristor-based physical unclonable functions were easy to fabricate and did not require complicated post-processing for digitization and thus, provide new opportunities in hardware security applications.
Automatic violence detection in digital movies
NASA Astrophysics Data System (ADS)
Fischer, Stephan
1996-11-01
Research on computer-based recognition of violence is scant. We are working on the automatic recognition of violence in digital movies, a first step towards the goal of a computer- assisted system capable of protecting children against TV programs containing a great deal of violence. In the video domain a collision detection and a model-mapping to locate human figures are run, while the creation and comparison of fingerprints to find certain events are run int he audio domain. This article centers on the recognition of fist- fights in the video domain and on the recognition of shots, explosions and cries in the audio domain.
Fingerprint Liveness Detection in the Presence of Capable Intruders.
Sequeira, Ana F; Cardoso, Jaime S
2015-06-19
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.
Fingerprint Liveness Detection in the Presence of Capable Intruders
Sequeira, Ana F.; Cardoso, Jaime S.
2015-01-01
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491
NASA Astrophysics Data System (ADS)
West, Matthew J.; Went, Michael J.
2009-01-01
The application of powders to fingerprints has long been established as an effective and reliable method for developing latent fingerprints. Fingerprints developed in situ at a crime scene routinely undergo lifting with specialist tapes and are then stored in evidence bags to allow secure transit and also to preserve the chain of evidence. In a previous study we have shown that exogenous material within a fingerprint can be detected using Raman spectroscopy following development with powders and lifting with adhesive tapes. Other reports have detailed the use of Raman spectroscopy to the detection of drugs of abuse in latent fingerprints including cyanoacrylate-fumed fingerprints. This study involves the application of Raman spectroscopy for the analysis of drugs of abuse in latent fingerprints for fingerprints that had been treated with powders and also subsequently lifted with adhesive tapes. Samples of seized ecstasy, cocaine, ketamine and amphetamine were supplied by East Sussex Police and by the TICTAC unit at St. Georges Hospital Tooting. Contaminated fingerprints were deposited on clean glass slides. The application of aluminium or iron based powders to contaminated fingerprints did not interfere with the Raman spectra obtained for the contaminants. Contaminated fingerprints developed with powders and then lifted with lifting tapes were also examined. The combination of these two techniques did not interfere with the successful analysis. The lifting process was repeated using hinge lifters. As the hinge lifters exhibited strong Raman bands the spectroscopic analysis was more complex and an increase in the number of exposures to the detector allowed for improved clarification. Spectral subtraction was performed to remove peaks due to the hinge lifters using OMNIC software. Raman spectra of developed and lifted fingerprints recorded through evidence bags were obtained and it was found that the detection process was not compromised. Although the application of powders did not interfere with the detection process the time taken to locate the contaminant was increased due to the physical presence of more material within the fingerprint.
West, Matthew J; Went, Michael J
2009-01-01
The application of powders to fingerprints has long been established as an effective and reliable method for developing latent fingerprints. Fingerprints developed in situ at a crime scene routinely undergo lifting with specialist tapes and are then stored in evidence bags to allow secure transit and also to preserve the chain of evidence. In a previous study we have shown that exogenous material within a fingerprint can be detected using Raman spectroscopy following development with powders and lifting with adhesive tapes. Other reports have detailed the use of Raman spectroscopy to the detection of drugs of abuse in latent fingerprints including cyanoacrylate-fumed fingerprints. This study involves the application of Raman spectroscopy for the analysis of drugs of abuse in latent fingerprints for fingerprints that had been treated with powders and also subsequently lifted with adhesive tapes. Samples of seized ecstasy, cocaine, ketamine and amphetamine were supplied by East Sussex Police and by the TICTAC unit at St. Georges Hospital Tooting. Contaminated fingerprints were deposited on clean glass slides. The application of aluminium or iron based powders to contaminated fingerprints did not interfere with the Raman spectra obtained for the contaminants. Contaminated fingerprints developed with powders and then lifted with lifting tapes were also examined. The combination of these two techniques did not interfere with the successful analysis. The lifting process was repeated using hinge lifters. As the hinge lifters exhibited strong Raman bands the spectroscopic analysis was more complex and an increase in the number of exposures to the detector allowed for improved clarification. Spectral subtraction was performed to remove peaks due to the hinge lifters using OMNIC software. Raman spectra of developed and lifted fingerprints recorded through evidence bags were obtained and it was found that the detection process was not compromised. Although the application of powders did not interfere with the detection process the time taken to locate the contaminant was increased due to the physical presence of more material within the fingerprint.
Background Investigations and Clearances
You may need to complete certain security forms and report for identity proofing and fingerprinting before you can begin work at EPA. The following document contain specific instructions and information to help guide you through the process:
NASA Astrophysics Data System (ADS)
Noyes, Ben F.; Mokaberi, Babak; Mandoy, Ram; Pate, Alex; Huijgen, Ralph; McBurney, Mike; Chen, Owen
2017-03-01
Reducing overlay error via an accurate APC feedback system is one of the main challenges in high volume production of the current and future nodes in the semiconductor industry. The overlay feedback system directly affects the number of dies meeting overlay specification and the number of layers requiring dedicated exposure tools through the fabrication flow. Increasing the former number and reducing the latter number is beneficial for the overall efficiency and yield of the fabrication process. An overlay feedback system requires accurate determination of the overlay error, or fingerprint, on exposed wafers in order to determine corrections to be automatically and dynamically applied to the exposure of future wafers. Since current and future nodes require correction per exposure (CPE), the resolution of the overlay fingerprint must be high enough to accommodate CPE in the overlay feedback system, or overlay control module (OCM). Determining a high resolution fingerprint from measured data requires extremely dense overlay sampling that takes a significant amount of measurement time. For static corrections this is acceptable, but in an automated dynamic correction system this method creates extreme bottlenecks for the throughput of said system as new lots have to wait until the previous lot is measured. One solution is using a less dense overlay sampling scheme and employing computationally up-sampled data to a dense fingerprint. That method uses a global fingerprint model over the entire wafer; measured localized overlay errors are therefore not always represented in its up-sampled output. This paper will discuss a hybrid system shown in Fig. 1 that combines a computationally up-sampled fingerprint with the measured data to more accurately capture the actual fingerprint, including local overlay errors. Such a hybrid system is shown to result in reduced modelled residuals while determining the fingerprint, and better on-product overlay performance.
United States Homeland Security and National Biometric Identification
2002-04-09
security number. Biometrics is the use of unique individual traits such as fingerprints, iris eye patterns, voice recognition, and facial recognition to...technology to control access onto their military bases using a Defense Manpower Management Command developed software application. FACIAL Facial recognition systems...installed facial recognition systems in conjunction with a series of 200 cameras to fight street crime and identify terrorists. The cameras, which are
West, Matthew J; Went, Michael J
2008-01-15
The application of powders to fingerprints has long been established as an effective and reliable method for developing latent fingerprints. The powders adhere to the ridge pattern of the fingerprint only, thus allowing the image to be visualised. Fingerprints developed in situ at a crime scene routinely undergo lifting with specialist tapes to facilitate subsequent laboratory analysis. As with all recovered evidence these samples would be stored in evidence bags to allow secure transit from the scene to the laboratory and also to preserve the chain of evidence. In this paper, the application of Raman spectroscopy for the analysis of exogenous material in latent fingerprints is reported for contaminated fingerprints that had been treated with powders and also subsequently lifted with adhesive tapes. A selection of over the counter (OTC) analgesics were used as samples for the analysis and contaminated fingerprints were deposited on clean glass slides. The application of aluminium or iron based powders to contaminated fingerprints did not interfere with the Raman spectra obtained for the contaminants. In most cases background fluorescence attributed to the sebaceous content of the latent fingerprint was reduced by the application of the powder thus reducing spectral interference. Contaminated fingerprints developed with powders and then lifted with lifting tapes were also examined. The combination of these two techniques did not interfere with the successful analysis of exogenous contaminants by Raman spectroscopy. The lifting process was repeated using hinge lifters. As the hinge lifters exhibited strong Raman bands the spectroscopic analysis was more complex and an increase in the number of exposures to the detector allowed for improved clarification. Raman spectra of developed and lifted fingerprints recorded through evidence bags were obtained and it was found that the detection process was not compromised in any way. Although the application of powders did not interfere with the detection process the time taken to locate the contaminant was increased due to the physical presence of more material within the fingerprint. The presence of interfering Raman bands from lifting tapes is another potential complication. This, however, could be removed by spectral subtraction or by the choice of lifting tapes that have only weak Raman bands.
Automatic high-throughput screening of colloidal crystals using machine learning
NASA Astrophysics Data System (ADS)
Spellings, Matthew; Glotzer, Sharon C.
Recent improvements in hardware and software have united to pose an interesting problem for computational scientists studying self-assembly of particles into crystal structures: while studies covering large swathes of parameter space can be dispatched at once using modern supercomputers and parallel architectures, identifying the different regions of a phase diagram is often a serial task completed by hand. While analytic methods exist to distinguish some simple structures, they can be difficult to apply, and automatic identification of more complex structures is still lacking. In this talk we describe one method to create numerical ``fingerprints'' of local order and use them to analyze a study of complex ordered structures. We can use these methods as first steps toward automatic exploration of parameter space and, more broadly, the strategic design of new materials.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morellas, Vassilios; Johnson, Andrew; Johnston, Chris
2006-07-01
Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff andmore » landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)« less
76 FR 66326 - Meeting of the Compact Council for the National Crime Prevention and Privacy Compact
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-26
... discussion are expected to include: (1) Changes to the Security and Management Control Outsourcing Standards; (2) National Fingerprint File (NFF) State Audit Criteria Changes; and (3) Guiding principle documents...
ERIC Educational Resources Information Center
Vail, Kathleen
1995-01-01
Biometrics (hand geometry, iris and retina scanners, voice and facial recognition, signature dynamics, facial thermography, and fingerprint readers) identifies people based on physical characteristics. Administrators worried about kidnapping, vandalism, theft, and violent intruders might welcome these security measures when they become more…
Cortes-Ciriano, Isidro
2016-01-01
Assessing compound toxicity at early stages of the drug discovery process is a crucial task to dismiss drug candidates likely to fail in clinical trials. Screening drug candidates against structural alerts, i.e. chemical fragments associated to a toxicological response prior or after being metabolized (bioactivation), has proved a valuable approach for this task. During the last decades, diverse algorithms have been proposed for the automatic derivation of structural alerts from categorical toxicity data sets. Here, the python library bioalerts is presented, which comprises functionalities for the automatic derivation of structural alerts from categorical (dichotomous), e.g. toxic/non-toxic, and continuous bioactivity data sets, e.g. [Formula: see text] or [Formula: see text] values. The library bioalerts relies on the RDKit implementation of the circular Morgan fingerprint algorithm to compute chemical substructures, which are derived by considering radial atom neighbourhoods of increasing bond radius. In addition to the derivation of structural alerts, bioalerts provides functionalities for the calculation of unhashed (keyed) Morgan fingerprints, which can be used in predictive bioactivity modelling with the advantage of allowing for a chemically meaningful deconvolution of the chemical space. Finally, bioalerts provides functionalities for the easy visualization of the derived structural alerts.
Automatic poisson peak harvesting for high throughput protein identification.
Breen, E J; Hopwood, F G; Williams, K L; Wilkins, M R
2000-06-01
High throughput identification of proteins by peptide mass fingerprinting requires an efficient means of picking peaks from mass spectra. Here, we report the development of a peak harvester to automatically pick monoisotopic peaks from spectra generated on matrix-assisted laser desorption/ionisation time of flight (MALDI-TOF) mass spectrometers. The peak harvester uses advanced mathematical morphology and watershed algorithms to first process spectra to stick representations. Subsequently, Poisson modelling is applied to determine which peak in an isotopically resolved group represents the monoisotopic mass of a peptide. We illustrate the features of the peak harvester with mass spectra of standard peptides, digests of gel-separated bovine serum albumin, and with Escherictia coli proteins prepared by two-dimensional polyacrylamide gel electrophoresis. In all cases, the peak harvester proved effective in its ability to pick similar monoisotopic peaks as an experienced human operator, and also proved effective in the identification of monoisotopic masses in cases where isotopic distributions of peptides were overlapping. The peak harvester can be operated in an interactive mode, or can be completely automated and linked through to peptide mass fingerprinting protein identification tools to achieve high throughput automated protein identification.
Flexible Energy Scheduling Tool for Integrating Variable Generation | Grid
, security-constrained economic dispatch, and automatic generation control programs. DOWNLOAD PAPER Electric commitment, security-constrained economic dispatch, and automatic generation control sub-models. Each sub resolutions and operating strategies can be explored. FESTIV produces not only economic metrics but also
Automatic Target Recognition Based on Cross-Plot
Wong, Kelvin Kian Loong; Abbott, Derek
2011-01-01
Automatic target recognition that relies on rapid feature extraction of real-time target from photo-realistic imaging will enable efficient identification of target patterns. To achieve this objective, Cross-plots of binary patterns are explored as potential signatures for the observed target by high-speed capture of the crucial spatial features using minimal computational resources. Target recognition was implemented based on the proposed pattern recognition concept and tested rigorously for its precision and recall performance. We conclude that Cross-plotting is able to produce a digital fingerprint of a target that correlates efficiently and effectively to signatures of patterns having its identity in a target repository. PMID:21980508
Security Primitives for Reconfigurable Hardware-Based Systems
2010-05-01
work, we propose security primitives using ideas centered around the notion of “moats and drawbridges .” The primitives encompass four design properties...Santa Bar- bara, CA 93106; email: sherwood@cs.ucsb.edu; R. Kastner, Department of Computer Science and Engineering , University of California, San...fingerprint reader), the other to control the ethernet IP core—and an AES encryption engine used by both of the processor cores. These cores are all implemented
Hospital Security and Force Protection: A Guide to Ensuring Patient and Employee Safety
2006-04-28
leader and set up training camps for his recruits. Through these experiences, Osama Bin Laden was able to obtain money , weapons, and develop connections...options to deter counterfeits . Hospital Security 50 Membership within community collaboratives or community-based organizations provides excellent...iris or fingerprints scans are resistant to theft and counterfeit , assuring access to only authorized personnel. Many theme parks are utilizing this
A Robust Crowdsourcing-Based Indoor Localization System.
Zhou, Baoding; Li, Qingquan; Mao, Qingzhou; Tu, Wei
2017-04-14
WiFi fingerprinting-based indoor localization has been widely used due to its simplicity and can be implemented on the smartphones. The major drawback of WiFi fingerprinting is that the radio map construction is very labor-intensive and time-consuming. Another drawback of WiFi fingerprinting is the Received Signal Strength (RSS) variance problem, caused by environmental changes and device diversity. RSS variance severely degrades the localization accuracy. In this paper, we propose a robust crowdsourcing-based indoor localization system (RCILS). RCILS can automatically construct the radio map using crowdsourcing data collected by smartphones. RCILS abstracts the indoor map as the semantics graph in which the edges are the possible user paths and the vertexes are the location where users may take special activities. RCILS extracts the activity sequence contained in the trajectories by activity detection and pedestrian dead-reckoning. Based on the semantics graph and activity sequence, crowdsourcing trajectories can be located and a radio map is constructed based on the localization results. For the RSS variance problem, RCILS uses the trajectory fingerprint model for indoor localization. During online localization, RCILS obtains an RSS sequence and realizes localization by matching the RSS sequence with the radio map. To evaluate RCILS, we apply RCILS in an office building. Experiment results demonstrate the efficiency and robustness of RCILS.
A Robust Crowdsourcing-Based Indoor Localization System
Zhou, Baoding; Li, Qingquan; Mao, Qingzhou; Tu, Wei
2017-01-01
WiFi fingerprinting-based indoor localization has been widely used due to its simplicity and can be implemented on the smartphones. The major drawback of WiFi fingerprinting is that the radio map construction is very labor-intensive and time-consuming. Another drawback of WiFi fingerprinting is the Received Signal Strength (RSS) variance problem, caused by environmental changes and device diversity. RSS variance severely degrades the localization accuracy. In this paper, we propose a robust crowdsourcing-based indoor localization system (RCILS). RCILS can automatically construct the radio map using crowdsourcing data collected by smartphones. RCILS abstracts the indoor map as the semantics graph in which the edges are the possible user paths and the vertexes are the location where users may take special activities. RCILS extracts the activity sequence contained in the trajectories by activity detection and pedestrian dead-reckoning. Based on the semantics graph and activity sequence, crowdsourcing trajectories can be located and a radio map is constructed based on the localization results. For the RSS variance problem, RCILS uses the trajectory fingerprint model for indoor localization. During online localization, RCILS obtains an RSS sequence and realizes localization by matching the RSS sequence with the radio map. To evaluate RCILS, we apply RCILS in an office building. Experiment results demonstrate the efficiency and robustness of RCILS. PMID:28420108
Office of Command Security Total Quality Management Plan
1989-07-01
outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.
Biometrics can help protect and safeguard.
Oakes, Shaun
2017-06-01
Shaun Oakes, managing director at ievo, a north-east England-based manufacturer of biometric fingerprint readers, argues that growing use of biometrics technology can improve security and afford better protection to premises, valuable items, and people, across an ever-busier NHS.
17 CFR 147.3 - General requirement of open meetings; grounds upon which meetings may be closed.
Code of Federal Regulations, 2012 CFR
2012-04-01
... national defense or foreign policy, and (ii) are in fact properly classified pursuant to such Executive... number, social security number, date and place of birth, fingerprints and, in appropriate cases, the...
17 CFR 147.3 - General requirement of open meetings; grounds upon which meetings may be closed.
Code of Federal Regulations, 2011 CFR
2011-04-01
... national defense or foreign policy, and (ii) are in fact properly classified pursuant to such Executive... number, social security number, date and place of birth, fingerprints and, in appropriate cases, the...
17 CFR 147.3 - General requirement of open meetings; grounds upon which meetings may be closed.
Code of Federal Regulations, 2014 CFR
2014-04-01
... in the interests of national defense or foreign policy, and (ii) are in fact properly classified... number, social security number, date and place of birth, fingerprints and, in appropriate cases, the...
46 CFR 63.01-3 - Scope and applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY... automatic auxiliary boilers, automatic heating boilers, automatic waste heat boilers, donkey boilers... control systems) used for the generation of steam and/or oxidation of ordinary waste materials and garbage...
46 CFR 63.01-3 - Scope and applicability.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY... automatic auxiliary boilers, automatic heating boilers, automatic waste heat boilers, donkey boilers... control systems) used for the generation of steam and/or oxidation of ordinary waste materials and garbage...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strait, R.S.; Wagner, E.E.
1994-07-01
The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less
Performance Assessment Method for a Forged Fingerprint Detection Algorithm
NASA Astrophysics Data System (ADS)
Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.
Security seal. [Patent application
Gobeli, G.W.
1981-11-17
Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.
Gobeli, Garth W.
1985-01-01
Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.
Yu, Yong-Jie; Xia, Qiao-Ling; Wang, Sheng; Wang, Bing; Xie, Fu-Wei; Zhang, Xiao-Bing; Ma, Yun-Ming; Wu, Hai-Long
2014-09-12
Peak detection and background drift correction (BDC) are the key stages in using chemometric methods to analyze chromatographic fingerprints of complex samples. This study developed a novel chemometric strategy for simultaneous automatic chromatographic peak detection and BDC. A robust statistical method was used for intelligent estimation of instrumental noise level coupled with first-order derivative of chromatographic signal to automatically extract chromatographic peaks in the data. A local curve-fitting strategy was then employed for BDC. Simulated and real liquid chromatographic data were designed with various kinds of background drift and degree of overlapped chromatographic peaks to verify the performance of the proposed strategy. The underlying chromatographic peaks can be automatically detected and reasonably integrated by this strategy. Meanwhile, chromatograms with BDC can be precisely obtained. The proposed method was used to analyze a complex gas chromatography dataset that monitored quality changes in plant extracts during storage procedure. Copyright © 2014 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Darlow, Luke N.; Akhoury, Sharat S.; Connan, James
2015-02-01
Standard surface fingerprint scanners are vulnerable to counterfeiting attacks and also failure due to skin damage and distortion. Thus a high security and damage resistant means of fingerprint acquisition is needed, providing scope for new approaches and technologies. Optical Coherence Tomography (OCT) is a high resolution imaging technology that can be used to image the human fingertip and allow for the extraction of a subsurface fingerprint. Being robust toward spoofing and damage, the subsurface fingerprint is an attractive solution. However, the nature of the OCT scanning process induces speckle: a correlative and multiplicative noise. Six speckle reducing filters for the digital enhancement of OCT fingertip scans have been evaluated. The optimized Bayesian non-local means algorithm improved the structural similarity between processed and reference images by 34%, increased the signal-to-noise ratio, and yielded the most promising visual results. An adaptive wavelet approach, originally designed for ultrasound imaging, and a speckle reducing anisotropic diffusion approach also yielded promising results. A reformulation of these in future work, with an OCT-speckle specific model, may improve their performance.
Lv, Shidong; Wu, Yuanshuang; Zhou, Jiangsheng; Lian, Ming; Li, Changwen; Xu, Yongquan; Liu, Shunhang; Wang, Chao; Meng, Qingxiong
2014-01-01
The quality of tea is presently evaluated by the sensory assessment of professional tea tasters, however, this approach is both inconsistent and inaccurate. A more standardized and efficient method is urgently needed to objectively evaluate tea quality. In this study, the chemical fingerprint of 7 different Dayi Pu-erh tea brands and 3 different Ya'an tea brands on the market were analyzed using fully automatic headspace solid-phase microextraction (HS-SPME) combined with gas chromatography-mass spectrometry (GC–MS). A total of 78 volatiles were separated, among 75 volatiles were identified by GC–MS in seven Dayi Pu-erh teas, and the major chemical components included methoxyphenolic compounds, hydrocarbons, and alcohol compounds, such as 1,2,3-trimethoxybenzene, 1,2,4-trimethoxybenzene, 2,6,10,14-tetramethyl-pentadecane, linalool and its oxides, α-terpineol, and phytol. The overlapping ratio of peaks (ORP) of the chromatogram in the seven Dayi Pu-erh tea samples was greater than 89.55%, whereas the ORP of Ya'an tea samples was less than 79.10%. The similarity and differences of the Dayi Pu-erh tea samples were also characterized using correlation coefficient similarity and principal component analysis (PCA). The results showed that the correlation coefficient of similarity of the seven Dayi Pu-erh tea samples was greater than 0.820 and was gathered in a specific area, which showed that samples from different brands were basically the same, despite have some slightly differences of chemical indexes was found. These results showed that the GC-MS fingerprint combined with the PCA approach can be used as an effective tool for the quality assessment and control of Pu-erh tea. PMID:25551231
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... collection supports the implementation of section 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272..., mental health defects history, and criminal history; as well as fingerprints. TSA is amending the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-27
... the implementation of sec. 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272, 396, Oct. 26... history, and criminal history; and fingerprints. In addition, 49 CFR part 1572 requires States to maintain...
Automatic Learning of Fine Operating Rules for Online Power System Security Control.
Sun, Hongbin; Zhao, Feng; Wang, Hao; Wang, Kang; Jiang, Weiyong; Guo, Qinglai; Zhang, Boming; Wehenkel, Louis
2016-08-01
Fine operating rules for security control and an automatic system for their online discovery were developed to adapt to the development of smart grids. The automatic system uses the real-time system state to determine critical flowgates, and then a continuation power flow-based security analysis is used to compute the initial transfer capability of critical flowgates. Next, the system applies the Monte Carlo simulations to expected short-term operating condition changes, feature selection, and a linear least squares fitting of the fine operating rules. The proposed system was validated both on an academic test system and on a provincial power system in China. The results indicated that the derived rules provide accuracy and good interpretability and are suitable for real-time power system security control. The use of high-performance computing systems enables these fine operating rules to be refreshed online every 15 min.
The charging security study of electric vehicle charging spot based on automatic testing platform
NASA Astrophysics Data System (ADS)
Li, Yulan; Yang, Zhangli; Zhu, Bin; Ran, Shengyi
2018-03-01
With the increasing of charging spots, the testing of charging security and interoperability becomes more and more urgent and important. In this paper, an interface simulator for ac charging test is designed, the automatic testing platform for electric vehicle charging spots is set up and used to test and analyze the abnormal state during the charging process. On the platform, the charging security and interoperability of ac charging spots and IC-CPD can be checked efficiently, the test report can be generated automatically with No artificial reading error. From the test results, the main reason why the charging spot is not qualified is that the power supply cannot be cut off in the prescribed time when the charging anomaly occurs.
Using a fingerprint recognition system in a vaccine trial to avoid misclassification
2007-01-01
Abstract Problem The potential for misidentification of trial participants, leading to misclassification, is a threat to the integrity of randomized controlled trials. The correct identification of study subjects in large trials over prolonged periods is of vital importance to those conducting clinical trials. Currently used means of identifying study participants, such as identity cards and records of name, address, name of household head and demographic characteristics, require large numbers of well-trained personnel, and still leave room for uncertainty. Approach We used fingerprint recognition technology for the identification of trial participants. This technology is already widely used in security and commercial contexts but not so far in clinical trials. Local setting A phase 2 cholera vaccine trial in SonLa, Viet Nam. Relevant changes An optical sensor was used to scan fingerprints. The fingerprint template of each participant was used to verify his or her identity during each of eight follow-up visits. Lessons learned A system consisting of a laptop computer and sensor is small in size, requires minimal training and on average six seconds for scanning and recognition. All participants’ identities were verified in the trial. Fingerprint recognition should become the standard technology for identification of participants in field trials. Fears exist, however, regarding the potential for invasion of privacy. It will therefore be necessary to convince not only trial participants but also investigators that templates of fingerprints stored in databases are less likely to be subject to abuse than currently used information databases. PMID:17242760
46 CFR 161.002-9 - Automatic fire detecting system, power supply.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 6 2011-10-01 2011-10-01 false Automatic fire detecting system, power supply. 161.002-9 Section 161.002-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT...-9 Automatic fire detecting system, power supply. The power supply for an automatic fire detecting...
46 CFR 161.002-9 - Automatic fire detecting system, power supply.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 6 2010-10-01 2010-10-01 false Automatic fire detecting system, power supply. 161.002-9 Section 161.002-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT...-9 Automatic fire detecting system, power supply. The power supply for an automatic fire detecting...
Threats and Challenges in Reconfigurable Hardware Security
2008-07-01
Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...g e F P G A MemoryMemory Codec A/DD/A F P G A B o a rd System Developers Avnet, Digilent, NuHorizons Application Development Stage Deployment...Rohatgi, and B . Sunar. Trojan detection using IC fingerprinting. In Proceedings of IEEE Symposium on Security and Privacy, 2007. [3] K. Austin. Data
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
... implementation of section 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272, 396, Oct. 26, 2001), which... history, and criminal history; as well as fingerprints. TSA is amending the application to collect...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-22
... the implementation of sec. 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272, 396, Oct. 26... history; and fingerprints. In addition, 49 CFR part 1572 requires States to maintain a copy of the driver...
[The genetic fingerprints file in France: between security and freedom].
Manaouil, C; Gignon, M; Werbrouck, A; Jarde, O
2008-01-01
In France, the French National File Automated with Genetic fingerprints (FNAEG) is a bank automated by genetic data which is used in penal domain. It facilitates search of the authors of malpractices, or the missing people. Since 1998, it has enabled to resolve numerous criminal cases. An extension of the field of application has been observed. It is a confidential register which is subjected to numerous controls. Nevertheless, private character of the data and its functioning (criminal character of the refusal of taking, periods of answer, and problem of data's conservation) explain the important contesting of associations worried about the respect of personal freedoms.
NASA Astrophysics Data System (ADS)
Möller, Thomas; Bellin, Knut; Creutzburg, Reiner
2015-03-01
The aim of this paper is to show the recent progress in the design and prototypical development of a software suite Copra Breeder* for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small and medium-sized enterprises.
Ranjit, Suman; Dvornikov, Alexander; Stakic, Milka; Hong, Suk-Hyun; Levi, Moshe; Evans, Ronald M.; Gratton, Enrico
2015-01-01
In this paper we have used second harmonic generation (SHG) and phasor approach to auto fluorescence lifetime imaging (FLIM) to obtain fingerprints of different collagens and then used these fingerprints to observe bone marrow fibrosis in the mouse femur. This is a label free approach towards fast automatable detection of fibrosis in tissue samples. FLIM has previously been used as a method of contrast in different tissues and in this paper phasor approach to FLIM is used to separate collagen I from collagen III, the markers of fibrosis, the largest groups of disorders that are often without any effective therapy. Often characterized by an increase in collagen content of the corresponding tissue, the samples are usually visualized by histochemical staining, which is pathologist dependent and cannot be automated. PMID:26293987
78 FR 32417 - Intent To Request Renewal From OMB of One Current Public Collection of Information...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... Officer, Office of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South... technological collection techniques or other forms of information technology. Information Collection Requirement... provide fingerprints and undergo a criminal history records check. The program implements authorities set...
Resource Sharing in a Network of Personal Computers.
1982-12-01
magnetic card, or a more secure identifier such as a machine-read fingerprint or voiceprint. Security and Protection 57 (3) (R, key) (5) (RB’ B, key) (B...operations are invoked via messages, a program and its terminal can easily be located on separate machines. In Spice, an interface process called Canvas ...request of a process. In Canvas , a process can only subdivide windows that it already has. On the other hand, the window manager treats the screen as a
Multiple-stage pure phase encoding with biometric information
NASA Astrophysics Data System (ADS)
Chen, Wen
2018-01-01
In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.
Code of Federal Regulations, 2013 CFR
2013-10-01
... control means a function of an automatic control system to restrict operation to a specified operating... automatic or manual control. Safety trip control system means a manually or automatically operated system... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Terms Used...
Code of Federal Regulations, 2010 CFR
2010-10-01
... control means a function of an automatic control system to restrict operation to a specified operating... automatic or manual control. Safety trip control system means a manually or automatically operated system... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Terms Used...
Code of Federal Regulations, 2012 CFR
2012-10-01
... control means a function of an automatic control system to restrict operation to a specified operating... automatic or manual control. Safety trip control system means a manually or automatically operated system... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Terms Used...
Code of Federal Regulations, 2014 CFR
2014-10-01
... control means a function of an automatic control system to restrict operation to a specified operating... automatic or manual control. Safety trip control system means a manually or automatically operated system... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Terms Used...
Code of Federal Regulations, 2011 CFR
2011-10-01
... control means a function of an automatic control system to restrict operation to a specified operating... automatic or manual control. Safety trip control system means a manually or automatically operated system... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Terms Used...
NASA Astrophysics Data System (ADS)
Armando, Alessandro; Giunchiglia, Enrico; Ponta, Serena Elisa
We present an approach to the formal specification and automatic analysis of business processes under authorization constraints based on the action language \\cal{C}. The use of \\cal{C} allows for a natural and concise modeling of the business process and the associated security policy and for the automatic analysis of the resulting specification by using the Causal Calculator (CCALC). Our approach improves upon previous work by greatly simplifying the specification step while retaining the ability to perform a fully automatic analysis. To illustrate the effectiveness of the approach we describe its application to a version of a business process taken from the banking domain and use CCALC to determine resource allocation plans complying with the security policy.
Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness
2016-06-01
within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
NASA Astrophysics Data System (ADS)
Tao, Kai; Li, Jing; Sampalli, Srinivas
Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
17 CFR 242.600 - NMS security designation and definitions.
Code of Federal Regulations, 2012 CFR
2012-04-01
...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...
2007-06-01
short period of time. When web search organizations canvas the web looking for sites to catalog, they will discover your systems and create registry... Fingerprint & DNA Databases, INTERPOL & National Law Enforcement Communication Systems, Firearms Registration Records, Drivers License, Birth
New and Improved: Security Goes High-Tech.
ERIC Educational Resources Information Center
Gamble, Cheryl
2002-01-01
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
2010-01-01
from the sensor) as a second-tier authentication is problematic because the monitored data are often pathological (i.e. revealing disease symptoms...Standards and Technology, March 2006. 17. Tan B and Schuckers S. Liveness detection for fingerprint scanners based on the statistics of wavelet signal
Unsupervised automated high throughput phenotyping of RNAi time-lapse movies.
Failmezger, Henrik; Fröhlich, Holger; Tresch, Achim
2013-10-04
Gene perturbation experiments in combination with fluorescence time-lapse cell imaging are a powerful tool in reverse genetics. High content applications require tools for the automated processing of the large amounts of data. These tools include in general several image processing steps, the extraction of morphological descriptors, and the grouping of cells into phenotype classes according to their descriptors. This phenotyping can be applied in a supervised or an unsupervised manner. Unsupervised methods are suitable for the discovery of formerly unknown phenotypes, which are expected to occur in high-throughput RNAi time-lapse screens. We developed an unsupervised phenotyping approach based on Hidden Markov Models (HMMs) with multivariate Gaussian emissions for the detection of knockdown-specific phenotypes in RNAi time-lapse movies. The automated detection of abnormal cell morphologies allows us to assign a phenotypic fingerprint to each gene knockdown. By applying our method to the Mitocheck database, we show that a phenotypic fingerprint is indicative of a gene's function. Our fully unsupervised HMM-based phenotyping is able to automatically identify cell morphologies that are specific for a certain knockdown. Beyond the identification of genes whose knockdown affects cell morphology, phenotypic fingerprints can be used to find modules of functionally related genes.
46 CFR 58.25-30 - Automatic restart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... auxiliary steering gear and each power actuating system must restart automatically when electrical power is... 46 Shipping 2 2014-10-01 2014-10-01 false Automatic restart. 58.25-30 Section 58.25-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY...
46 CFR 58.25-30 - Automatic restart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... auxiliary steering gear and each power actuating system must restart automatically when electrical power is... 46 Shipping 2 2013-10-01 2013-10-01 false Automatic restart. 58.25-30 Section 58.25-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY...
46 CFR 58.25-30 - Automatic restart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... auxiliary steering gear and each power actuating system must restart automatically when electrical power is... 46 Shipping 2 2012-10-01 2012-10-01 false Automatic restart. 58.25-30 Section 58.25-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY...
46 CFR 58.25-30 - Automatic restart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... auxiliary steering gear and each power actuating system must restart automatically when electrical power is... 46 Shipping 2 2011-10-01 2011-10-01 false Automatic restart. 58.25-30 Section 58.25-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY...
46 CFR 58.25-30 - Automatic restart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... auxiliary steering gear and each power actuating system must restart automatically when electrical power is... 46 Shipping 2 2010-10-01 2010-10-01 false Automatic restart. 58.25-30 Section 58.25-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY...
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
A novel secret sharing with two users based on joint transform correlator and compressive sensing
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Chi, Yingying
2018-05-01
Recently, joint transform correlator (JTC) has been widely applied to image encryption and authentication. This paper presents a novel secret sharing scheme with two users based on JTC. Two users must be present during the decryption that the system has high security and reliability. In the scheme, two users use their fingerprints to encrypt plaintext, and they can decrypt only if both of them provide the fingerprints which are successfully authenticated. The linear relationship between the plaintext and ciphertext is broken using the compressive sensing, which can resist existing attacks on JTC. The results of the theoretical analysis and numerical simulation confirm the validity of the system.
Keitel, Anne; Gross, Joachim
2016-06-01
The human brain can be parcellated into diverse anatomical areas. We investigated whether rhythmic brain activity in these areas is characteristic and can be used for automatic classification. To this end, resting-state MEG data of 22 healthy adults was analysed. Power spectra of 1-s long data segments for atlas-defined brain areas were clustered into spectral profiles ("fingerprints"), using k-means and Gaussian mixture (GM) modelling. We demonstrate that individual areas can be identified from these spectral profiles with high accuracy. Our results suggest that each brain area engages in different spectral modes that are characteristic for individual areas. Clustering of brain areas according to similarity of spectral profiles reveals well-known brain networks. Furthermore, we demonstrate task-specific modulations of auditory spectral profiles during auditory processing. These findings have important implications for the classification of regional spectral activity and allow for novel approaches in neuroimaging and neurostimulation in health and disease.
46 CFR 15.816 - Automatic radar plotting aids (ARPAs).
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Automatic radar plotting aids (ARPAs). 15.816 Section 15.816 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Computations § 15.816 Automatic radar plotting aids (ARPAs). Every person in the required...
36 CFR 1260.56 - What are NARA considerations when implementing automatic declassification?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false What are NARA considerations when implementing automatic declassification? 1260.56 Section 1260.56 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Automatic Declassification §...
NASA Astrophysics Data System (ADS)
Lazariev, A.; Allouche, A.-R.; Aubert-Frécon, M.; Fauvelle, F.; Piotto, M.; Elbayed, K.; Namer, I.-J.; van Ormondt, D.; Graveron-Demilly, D.
2011-11-01
High-resolution magic angle spinning (HRMAS) nuclear magnetic resonance (NMR) is playing an increasingly important role for diagnosis. This technique enables setting up metabolite profiles of ex vivo pathological and healthy tissue. The need to monitor diseases and pharmaceutical follow-up requires an automatic quantitation of HRMAS 1H signals. However, for several metabolites, the values of chemical shifts of proton groups may slightly differ according to the micro-environment in the tissue or cells, in particular to its pH. This hampers the accurate estimation of the metabolite concentrations mainly when using quantitation algorithms based on a metabolite basis set: the metabolite fingerprints are not correct anymore. In this work, we propose an accurate method coupling quantum mechanical simulations and quantitation algorithms to handle basis-set changes. The proposed algorithm automatically corrects mismatches between the signals of the simulated basis set and the signal under analysis by maximizing the normalized cross-correlation between the mentioned signals. Optimized chemical shift values of the metabolites are obtained. This method, QM-QUEST, provides more robust fitting while limiting user involvement and respects the correct fingerprints of metabolites. Its efficiency is demonstrated by accurately quantitating 33 signals from tissue samples of human brains with oligodendroglioma, obtained at 11.7 tesla. The corresponding chemical shift changes of several metabolites within the series are also analyzed.
10 CFR 25.27 - Reopening of cases in which requests for access authorizations are canceled.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorizations are canceled. 25.27 Section 25.27 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.27 Reopening of cases in which requests for access authorizations are canceled. (a) In... cases were previously canceled, new fingerprint cards (FD-257) in duplicate and a new Security...
32 CFR Appendix C to Part 86 - State Information
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...
Fingerprinting Software Defined Networks and Controllers
2015-03-01
24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined
32 CFR Appendix C to Part 86 - State Information
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-07
... also consistent with New York's General Business Law, which, among other things, requires SROs in New... designee for evaluation and use, in accordance with applicable law, in enhancing the security of the... of fingerprint based criminal records is permitted only when authorized by law. Numerous federal and...
Fingerprints in Place of Passwords: A Study of Technology Adoption in the Nursing Profession
ERIC Educational Resources Information Center
Francisco, James R.
2010-01-01
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Evaluating authentication options for mobile health applications in younger and older adults
Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G.; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Objective Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Methodology Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). Results A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability. PMID:29300736
Evaluating authentication options for mobile health applications in younger and older adults.
Grindrod, Kelly; Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability.
Automatic Network Fingerprinting through Single-Node Motifs
Echtermeyer, Christoph; da Fontoura Costa, Luciano; Rodrigues, Francisco A.; Kaiser, Marcus
2011-01-01
Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs—a combination of local network features. One technique to identify single node-motifs has been presented by Costa et al. (L. D. F. Costa, F. A. Rodrigues, C. C. Hilgetag, and M. Kaiser, Europhys. Lett., 87, 1, 2009). Here, we first suggest improvements to the method including how its parameters can be determined automatically. Such automatic routines make high-throughput studies of many networks feasible. Second, the new routines are validated in different network-series. Third, we provide an example of how the method can be used to analyse network time-series. In conclusion, we provide a robust method for systematically discovering and classifying characteristic nodes of a network. In contrast to classical motif analysis, our approach can identify individual components (here: nodes) that are specific to a network. Such special nodes, as hubs before, might be found to play critical roles in real-world networks. PMID:21297963
20 CFR 225.56 - Automatic recomputation.
Code of Federal Regulations, 2011 CFR
2011-04-01
... if a recomputation of the PIA is necessary. When a recomputation is called for due to a change in the reported railroad or social security earnings, the Board processes it automatically. Increased benefits...
20 CFR 225.56 - Automatic recomputation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... if a recomputation of the PIA is necessary. When a recomputation is called for due to a change in the reported railroad or social security earnings, the Board processes it automatically. Increased benefits...
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
22 CFR 308.10 - Security of records systems-manual and automated.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security of records systems-manual and automated... Security of records systems—manual and automated. The head of the agency has the responsibility of... destruction of manual and automatic record systems. These security safeguards shall apply to all systems in...
Code of Federal Regulations, 2010 CFR
2010-10-01
... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
2012-03-13
aspects associated with the use of fingerprinting. Another form of physical biometrics is facial recognition . ― Facial recognition unlike other...have originated back to the early 1960s. ―One of the leading pioneers in facial recognition biometrics was Woodrow W. Bledsoe who developed a...identified match. There are several advantages associated with Facial recognition . It is highly reliable, used extensively in security systems, and
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 2 2012-10-01 2012-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Tests and Inspections of Fired Thermal Fluid Heaters § 61.30-20 Automatic control and safety tests. Operational tests and check...
Moros, J; Serrano, J; Gallego, F J; Macías, J; Laserna, J J
2013-06-15
During recent years laser-induced breakdown spectroscopy (LIBS) has been considered one of the techniques with larger ability for trace detection of explosives. However, despite of the high sensitivity exhibited for this application, LIBS suffers from a limited selectivity due to difficulties in assigning the molecular origin of the spectral emissions observed. This circumstance makes the recognition of fingerprints a latent challenging problem. In the present manuscript the sorting of six explosives (chloratite, ammonal, DNT, TNT, RDX and PETN) against a broad list of potential harmless interferents (butter, fuel oil, hand cream, olive oil, …), all of them in the form of fingerprints deposited on the surfaces of objects for courier services, has been carried out. When LIBS information is processed through a multi-stage architecture algorithm built from a suitable combination of 3 learning classifiers, an unknown fingerprint may be labeled into a particular class. Neural network classifiers trained by the Levenberg-Marquardt rule were decided within 3D scatter plots projected onto the subspace of the most useful features extracted from the LIBS spectra. Experimental results demonstrate that the presented algorithm sorts fingerprints according to their hazardous character, although its spectral information is virtually identical in appearance, with rates of false negatives and false positives not beyond of 10%. These reported achievements mean a step forward in the technology readiness level of LIBS for this complex application related to defense, homeland security and force protection. Copyright © 2013 Elsevier B.V. All rights reserved.
Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations
NASA Technical Reports Server (NTRS)
Donohue, John T.; Critchfield, Anna R.
2000-01-01
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
NASA Astrophysics Data System (ADS)
Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie
Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.
Yang, Tianxi; Guo, Xiaoyu; Wang, Hui; Fu, Shuyue; Wen, Ying; Yang, Haifeng
2015-06-15
New developments in the fields of human healthcare and social security call for the exploration of an easy and on-field method to detect drug-related biomarkers. In this paper, Au nanoparticles dotted magnetic nanocomposites (AMN) modified with inositol hexakisphosphate (IP6) were used as surface-enhanced Raman scattering (SERS) substrate to quickly monitor trace drug-related biomarkers in saliva and to on-site screen a trace drug biomarker in fingerprints. Due to inducing with an external magnet, such substrate presented a huge SERS activity, which has met the sensitivity requirement for assay to detect the drug biomarkers in saliva from the U.S. Substance Abuse and Mental Health Services Administration, and also the limit of detection for drug biomarker in fingerprint reached 100 nM. In addition, this AMN-based SERS assay was successfully conducted using a portable Raman spectrometer, which could be used to on-site and accurately differentiate between the smokers and drug addicts in near future. Copyright © 2015 Elsevier B.V. All rights reserved.
Improving Land Armaments: Lessons from the Balkans. The U.S. Army Effort (Abbreviated)
2004-09-01
NATO multinational force deployments ADF Automatic Direction Finder ADOCS Automated Deep Operations Coordination System ; a LAN system for...Management Information Systems TACSAT Tactical Satellite (for communications) Tactical circuit/message switch Automatic telephone switch used to... automatic crypto secured; the Netherlands’ automated tactical radio relay/telephone system that serves all HQs from corps to brigade ZOS Zone of
6 CFR 13.41 - Stay pending appeal.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Stay pending appeal. 13.41 Section 13.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.41 Stay pending appeal. (a) An Initial Decision is stayed automatically pending disposition of a...
Analysis of key technologies for virtual instruments metrology
NASA Astrophysics Data System (ADS)
Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang
2008-12-01
Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.
Cloud Fingerprinting: Using Clock Skews To Determine Co Location Of Virtual Machines
2016-09-01
DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Cloud computing has quickly revolutionized computing practices of organizations, to include the Department of... Cloud computing has quickly revolutionized computing practices of organizations, to in- clude the Department of Defense. However, security concerns...vi Table of Contents 1 Introduction 1 1.1 Proliferation of Cloud Computing . . . . . . . . . . . . . . . . . . 1 1.2 Problem Statement
Using Differential Evolution to Optimize Learning from Signals and Enhance Network Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harmer, Paul K; Temple, Michael A; Buckner, Mark A
2011-01-01
Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorizedWAP access and mprove network security. This is done using Differential Evolution (DE) to optimize the performance of a Learning from Signals (LFS) classifier implemented with RF Distinct Native Attribute (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identicalmore » classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DEoptimized LFS classifier with TD features is uperior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.« less
Multimodal biometric digital watermarking on immigrant visas for homeland security
NASA Astrophysics Data System (ADS)
Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.
2004-08-01
Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.
Neuroimaging techniques for memory detection: scientific, ethical, and legal issues.
Meegan, Daniel V
2008-01-01
There is considerable interest in the use of neuroimaging techniques for forensic purposes. Memory detection techniques, including the well-publicized Brain Fingerprinting technique (Brain Fingerprinting Laboratories, Inc., Seattle WA), exploit the fact that the brain responds differently to sensory stimuli to which it has been exposed before. When a stimulus is specifically associated with a crime, the resulting brain activity should differentiate between someone who was present at the crime and someone who was not. This article reviews the scientific literature on three such techniques: priming, old/new, and P300 effects. The forensic potential of these techniques is evaluated based on four criteria: specificity, automaticity, encoding flexibility, and longevity. This article concludes that none of the techniques are devoid of forensic potential, although much research is yet to be done. Ethical issues, including rights to privacy and against self-incrimination, are discussed. A discussion of legal issues concludes that current memory detection techniques do not yet meet United States standards of legal admissibility.
Fabrication of SERS swab for direct detection of trace explosives in fingerprints.
Gong, Zhengjun; Du, Hongjie; Cheng, Fansheng; Wang, Cong; Wang, Canchen; Fan, Meikun
2014-12-24
Swab sampling is of great importance in surface contamination analysis. A cotton swab (cotton Q-tip) was successfully transformed into surface-enhanced Raman scattering (SERS) substrate (SERS Q-tip) through a bottom-up strategy, where Ag NPs were first self-assembled onto the Q-tip followed by in situ growing. The capability for direct swab detection of Raman probe Nile Blue A (NBA) and a primary explosive marker 2,4-dinitrotoluene (2,4-DNT) using the SERS Q-tip was explored. It was found that at optimum conditions, a femotogram of NBA on glass surface could be swab-detected. The lowest detectable amount for 2,4-DNT is only ∼1.2 ng/cm(2) (total amount of 5 ng) on glass surface, 2 orders of magnitude more sensitive than similar surface analysis achieved with infrared technique, and comparable even with that obtained by ion mobility spectrometry-mass spectrometry. Finally, 2,4-DNT left on fingerprints was also analyzed. It was found that SERS signal of 2,4-DNT from 27th fingerprint after touching 2,4-DNT powder can still be clearly identified by swabbing with the SERS Q-tip. We believe this is the first direct SERS swabbing test of explosives on fingerprint on glass. Considering its relative long shelf life (>30 d), the SERS Q-tip may find great potential in future homeland security applications when combined with portable Raman spectrometers.
20 CFR 404.285 - Recomputations performed automatically.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Recomputations performed automatically. 404.285 Section 404.285 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Recomputing Your Primary Insurance Amount...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing for Automatic Auxiliary Boilers § 61.35-1 General. (a) All automatic... equipment must be tested and inspected to verify their proper design, construction, installation, and...
Fingerprint verification on medical image reporting system.
Chen, Yen-Cheng; Chen, Liang-Kuang; Tsai, Ming-Dar; Chiu, Hou-Chang; Chiu, Jainn-Shiun; Chong, Chee-Fah
2008-03-01
The healthcare industry is recently going through extensive changes, through adoption of robust, interoperable healthcare information technology by means of electronic medical records (EMR). However, a major concern of EMR is adequate confidentiality of the individual records being managed electronically. Multiple access points over an open network like the Internet increases possible patient data interception. The obligation is on healthcare providers to procure information security solutions that do not hamper patient care while still providing the confidentiality of patient information. Medical images are also part of the EMR which need to be protected from unauthorized users. This study integrates the techniques of fingerprint verification, DICOM object, digital signature and digital envelope in order to ensure that access to the hospital Picture Archiving and Communication System (PACS) or radiology information system (RIS) is only by certified parties.
Drechsler, Axel; Helling, Tobias; Steinfartz, Sebastian
2015-01-01
Capture–mark–recapture (CMR) approaches are the backbone of many studies in population ecology to gain insight on the life cycle, migration, habitat use, and demography of target species. The reliable and repeatable recognition of an individual throughout its lifetime is the basic requirement of a CMR study. Although invasive techniques are available to mark individuals permanently, noninvasive methods for individual recognition mainly rest on photographic identification of external body markings, which are unique at the individual level. The re-identification of an individual based on comparing shape patterns of photographs by eye is commonly used. Automated processes for photographic re-identification have been recently established, but their performance in large datasets (i.e., > 1000 individuals) has rarely been tested thoroughly. Here, we evaluated the performance of the program AMPHIDENT, an automatic algorithm to identify individuals on the basis of ventral spot patterns in the great crested newt (Triturus cristatus) versus the genotypic fingerprint of individuals based on highly polymorphic microsatellite loci using GENECAP. Between 2008 and 2010, we captured, sampled and photographed adult newts and calculated for 1648 samples/photographs recapture rates for both approaches. Recapture rates differed slightly with 8.34% for GENECAP and 9.83% for AMPHIDENT. With an estimated rate of 2% false rejections (FRR) and 0.00% false acceptances (FAR), AMPHIDENT proved to be a highly reliable algorithm for CMR studies of large datasets. We conclude that the application of automatic recognition software of individual photographs can be a rather powerful and reliable tool in noninvasive CMR studies for a large number of individuals. Because the cross-correlation of standardized shape patterns is generally applicable to any pattern that provides enough information, this algorithm is capable of becoming a single application with broad use in CMR studies for many species. PMID:25628871
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...
System security in the space flight operations center
NASA Technical Reports Server (NTRS)
Wagner, David A.
1988-01-01
The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Requirements § 63.15-7 Alarms. (a) An audible alarm must automatically sound when a flame safety system shutdown occurs. A visible indicator must indicate that the shutdown was caused by the flame safety system...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Requirements § 63.15-7 Alarms. (a) An audible alarm must automatically sound when a flame safety system shutdown occurs. A visible indicator must indicate that the shutdown was caused by the flame safety system...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Requirements § 63.15-7 Alarms. (a) An audible alarm must automatically sound when a flame safety system shutdown occurs. A visible indicator must indicate that the shutdown was caused by the flame safety system...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Requirements § 63.15-7 Alarms. (a) An audible alarm must automatically sound when a flame safety system shutdown occurs. A visible indicator must indicate that the shutdown was caused by the flame safety system...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Requirements § 63.15-7 Alarms. (a) An audible alarm must automatically sound when a flame safety system shutdown occurs. A visible indicator must indicate that the shutdown was caused by the flame safety system...
Scanning Seismic Intrusion Detector
NASA Technical Reports Server (NTRS)
Lee, R. D.
1982-01-01
Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Application. 95.30-1 Section 95.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems, Details § 95.30-1 Application. Automatic sprinkler systems shall...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Application. 95.30-1 Section 95.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems, Details § 95.30-1 Application. Automatic sprinkler systems shall...
46 CFR 193.30-1 - Application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Application. 193.30-1 Section 193.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems § 193.30-1 Application. Automatic sprinkling systems shall comply with...
46 CFR 193.30-1 - Application.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Application. 193.30-1 Section 193.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems § 193.30-1 Application. Automatic sprinkling systems shall comply with...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Application. 95.30-1 Section 95.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems, Details § 95.30-1 Application. Automatic sprinkler systems shall...
46 CFR 193.30-1 - Application.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Application. 193.30-1 Section 193.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems § 193.30-1 Application. Automatic sprinkling systems shall comply with...
46 CFR 193.30-1 - Application.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Application. 193.30-1 Section 193.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems § 193.30-1 Application. Automatic sprinkling systems shall comply with...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Application. 95.30-1 Section 95.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems, Details § 95.30-1 Application. Automatic sprinkler systems shall...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Application. 95.30-1 Section 95.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems, Details § 95.30-1 Application. Automatic sprinkler systems shall...
46 CFR 193.30-1 - Application.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Application. 193.30-1 Section 193.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkler Systems § 193.30-1 Application. Automatic sprinkling systems shall comply with...
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
System Control for the Transitional DCS. Appendices.
1978-12-01
the deployment of the AN/TTC-39 circuit switch. This is a hybrid analog/digital switch providing the following services: o Non- secure analog telephone...service. o Non- secure 16 Kb/s digital telephone service. o Secure 16 Kb/s digital telephone service with automatic key distribution and end to end... security . o Analog circuits to support current inventory 50 Kb/sec and 9.6 Kb/sec secure digital communications. In the deployment model for this study
MAC, A System for Automatically IPR Identification, Collection and Distribution
NASA Astrophysics Data System (ADS)
Serrão, Carlos
Controlling Intellectual Property Rights (IPR) in the Digital World is a very hard challenge. The facility to create multiple bit-by-bit identical copies from original IPR works creates the opportunities for digital piracy. One of the most affected industries by this fact is the Music Industry. The Music Industry has supported huge losses during the last few years due to this fact. Moreover, this fact is also affecting the way that music rights collecting and distributing societies are operating to assure a correct music IPR identification, collection and distribution. In this article a system for automating this IPR identification, collection and distribution is presented and described. This system makes usage of advanced automatic audio identification system based on audio fingerprinting technology. This paper will present the details of the system and present a use-case scenario where this system is being used.
Security enhancement of optical encryption based on biometric array keys
NASA Astrophysics Data System (ADS)
Yan, Aimin; Wei, Yang; Zhang, Jingtao
2018-07-01
A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.
Legitimate data in remote monitoring.
Schilling, J D
2009-01-01
An approach for ensuring legitimate data transfers of an individual within a remote healthcare solution. Biometric traits and networking are discussed for clarification of the approach. In this approach, a biometric solution is identified as a fingerprint scanner for use in a personal area network of the patient's home. Secure data exchange is acknowledged as a potential weakness in the transferring of patient data within this network. Some options are discussed to ensure security of data for the review by the caregiver. Example approaches regarding legitimacy are identified using a pulse oximeter [1], a blood pressure meter, and a weight scale as the remote patient devices in the remote healthcare solution.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... Proposed Rule Change Amending NYSE Rule 1000 To Increase the Price Threshold for Those Securities... threshold for those securities ineligible for automatic executions from $1,000.00 or more to $10,000.00 or...). Specifically, the Exchange believes that increasing the dollar threshold for high-priced securities would...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-5 Zoning. (a) The automatic sprinkling system shall be divided into separate... more than 250 sprinkler heads. (c) The sprinkling zone may cover more than one deck, in which case, the...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-5 Zoning. (a) The automatic sprinkling system shall be divided into separate... more than 250 sprinkler heads. (c) The sprinkling zone may cover more than one deck, in which case, the...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-5 Zoning. (a) The automatic sprinkling system shall be divided into separate... more than 250 sprinkler heads. (c) The sprinkling zone may cover more than one deck, in which case, the...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-5 Zoning. (a) The automatic sprinkling system shall be divided into separate... more than 250 sprinkler heads. (c) The sprinkling zone may cover more than one deck, in which case, the...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-5 Zoning. (a) The automatic sprinkling system shall be divided into separate... more than 250 sprinkler heads. (c) The sprinkling zone may cover more than one deck, in which case, the...
DOT National Transportation Integrated Search
1998-05-01
Recent technological advances in computer hardware, software, and image processing have led to the development of automated license plate reading equipment. This equipment has primarily been developed for enforcement and security applications, such a...
46 CFR 153.980 - Isolation of automatic closing valves.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Isolation of automatic closing valves. 153.980 Section 153.980 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo...
46 CFR 153.980 - Isolation of automatic closing valves.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Isolation of automatic closing valves. 153.980 Section 153.980 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo...
46 CFR 153.980 - Isolation of automatic closing valves.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Isolation of automatic closing valves. 153.980 Section 153.980 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo...
46 CFR 153.980 - Isolation of automatic closing valves.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Isolation of automatic closing valves. 153.980 Section 153.980 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo...
46 CFR 153.980 - Isolation of automatic closing valves.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Isolation of automatic closing valves. 153.980 Section 153.980 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-30 Piping. (a) All piping, valves, and fittings of ferrous materials shall be... piping, valves, fittings, and sprinkler heads shall be securely supported, and, where necessary...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-30 Piping. (a) All piping, valves, and fittings of ferrous materials shall be... piping, valves, fittings, and sprinkler heads shall be securely supported, and, where necessary...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-30 Piping. (a) All piping, valves, and fittings of ferrous materials shall be... piping, valves, fittings, and sprinkler heads shall be securely supported, and, where necessary...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-30 Piping. (a) All piping, valves, and fittings of ferrous materials shall be... piping, valves, fittings, and sprinkler heads shall be securely supported, and, where necessary...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-30 Piping. (a) All piping, valves, and fittings of ferrous materials shall be... piping, valves, fittings, and sprinkler heads shall be securely supported, and, where necessary...
33 CFR 105.260 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance systems to detect unauthorized entry or movement within restricted areas; (7) Directing the parking...
33 CFR 105.260 - Security measures for restricted areas.
Code of Federal Regulations, 2011 CFR
2011-07-01
...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance systems to detect unauthorized entry or movement within restricted areas; (7) Directing the parking...
Innovation and stasis: technology and race in Mark Twain's Pudd'nhead Wilson.
Current, Cynthia A
2009-01-01
Mark Twain's Pudd'nhead Wilson demonstrates how technologies of identification attempt to counter how bodies evolve beyond previous constraints—in particular, the constraints of racial classification. Twain develops accounts of subjectivity and racial classification that cover an extraordinary breadth of genealogy, biology, and law, while still invoking elements of randomness and chance. The key to such combinations of fixity and emergence in human identity is the technology of fingerprinting. Twain's speculative engagement with fingerprinting creates a system and medium to classify and secure particular forms of identity, leading to the reassertion of racial values already inherent in science and technology, law, and commerce. Fingerprinting represents the direction that technologies of identity would seek to employ: a movement away from direct visual observation of bodies, whose emergence and change over time make them difficult to categorize, to reliance on archives of information that are increasingly removed from the contexts of meaning and emergence those bodies inhabit; this reflects "one drop" politics, as race becomes increasingly difficult to define visually. The archive itself, then, becomes infected with the spectacular vitality of, and the speculation and risk within, nineteenth-century biological and cultural determinism.
A Model Based Security Testing Method for Protocol Implementation
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163
A model based security testing method for protocol implementation.
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
Hand veins feature extraction using DT-CNNS
NASA Astrophysics Data System (ADS)
Malki, Suleyman; Spaanenburg, Lambert
2007-05-01
As the identification process is based on the unique patterns of the users, biometrics technologies are expected to provide highly secure authentication systems. The existing systems using fingerprints or retina patterns are, however, very vulnerable. One's fingerprints are accessible as soon as the person touches a surface, while a high resolution camera easily captures the retina pattern. Thus, both patterns can easily be "stolen" and forged. Beside, technical considerations decrease the usability for these methods. Due to the direct contact with the finger, the sensor gets dirty, which decreases the authentication success ratio. Aligning the eye with a camera to capture the retina pattern gives uncomfortable feeling. On the other hand, vein patterns of either a palm of the hand or a single finger offer stable, unique and repeatable biometrics features. A fingerprint-based identification system using Cellular Neural Networks has already been proposed by Gao. His system covers all stages of a typical fingerprint verification procedure from Image Preprocessing to Feature Matching. This paper performs a critical review of the individual algorithmic steps. Notably, the operation of False Feature Elimination is applied only once instead of 3 times. Furthermore, the number of iterations is limited to 1 for all used templates. Hence, the computational need of the feedback contribution is removed. Consequently the computational effort is drastically reduced without a notable chance in quality. This allows a full integration of the detection mechanism. The system is prototyped on a Xilinx Virtex II Pro P30 FPGA.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Purpose. 63.01-1 Section 63.01-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Provisions § 63.01-1 Purpose. This part specifies the minimum requirements for safety for each automatic auxiliary...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 2 2013-10-01 2013-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 2 2014-10-01 2014-10-01 false Purpose. 63.01-1 Section 63.01-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Provisions § 63.01-1 Purpose. This part specifies the minimum requirements for safety for each automatic auxiliary...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 2 2013-10-01 2013-10-01 false Purpose. 63.01-1 Section 63.01-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Provisions § 63.01-1 Purpose. This part specifies the minimum requirements for safety for each automatic auxiliary...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 2 2012-10-01 2012-10-01 false Purpose. 63.01-1 Section 63.01-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Provisions § 63.01-1 Purpose. This part specifies the minimum requirements for safety for each automatic auxiliary...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 2 2014-10-01 2014-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 2 2011-10-01 2011-10-01 false Purpose. 63.01-1 Section 63.01-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS General Provisions § 63.01-1 Purpose. This part specifies the minimum requirements for safety for each automatic auxiliary...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 2 2011-10-01 2011-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
20 CFR 404.273 - When are automatic cost-of-living increases effective?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When are automatic cost-of-living increases effective? 404.273 Section 404.273 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Cost-Of-Living Increases...
20 CFR 404.271 - When automatic cost-of-living increases apply.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When automatic cost-of-living increases apply. 404.271 Section 404.271 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Cost-Of-Living Increases § 404...
46 CFR 34.30-1 - Application-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Application-TB/ALL. 34.30-1 Section 34.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Automatic Sprinkler Systems, Details § 34.30-1 Application—TB/ALL. Automatic sprinkler systems shall comply with NFPA 13-1996...
46 CFR 34.30-1 - Application-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Application-TB/ALL. 34.30-1 Section 34.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Automatic Sprinkler Systems, Details § 34.30-1 Application—TB/ALL. Automatic sprinkler systems shall comply with NFPA 13-1996...
46 CFR 34.30-1 - Application-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Application-TB/ALL. 34.30-1 Section 34.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Automatic Sprinkler Systems, Details § 34.30-1 Application—TB/ALL. Automatic sprinkler systems shall comply with NFPA 13-1996...
46 CFR 34.30-1 - Application-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Application-TB/ALL. 34.30-1 Section 34.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Automatic Sprinkler Systems, Details § 34.30-1 Application—TB/ALL. Automatic sprinkler systems shall comply with NFPA 13-1996...
46 CFR 34.30-1 - Application-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Application-TB/ALL. 34.30-1 Section 34.30-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Automatic Sprinkler Systems, Details § 34.30-1 Application—TB/ALL. Automatic sprinkler systems shall comply with NFPA 13-1996...
Automatic DNA Diagnosis for 1D Gel Electrophoresis Images using Bio-image Processing Technique.
Intarapanich, Apichart; Kaewkamnerd, Saowaluck; Shaw, Philip J; Ukosakit, Kittipat; Tragoonrung, Somvong; Tongsima, Sissades
2015-01-01
DNA gel electrophoresis is a molecular biology technique for separating different sizes of DNA fragments. Applications of DNA gel electrophoresis include DNA fingerprinting (genetic diagnosis), size estimation of DNA, and DNA separation for Southern blotting. Accurate interpretation of DNA banding patterns from electrophoretic images can be laborious and error prone when a large number of bands are interrogated manually. Although many bio-imaging techniques have been proposed, none of them can fully automate the typing of DNA owing to the complexities of migration patterns typically obtained. We developed an image-processing tool that automatically calls genotypes from DNA gel electrophoresis images. The image processing workflow comprises three main steps: 1) lane segmentation, 2) extraction of DNA bands and 3) band genotyping classification. The tool was originally intended to facilitate large-scale genotyping analysis of sugarcane cultivars. We tested the proposed tool on 10 gel images (433 cultivars) obtained from polyacrylamide gel electrophoresis (PAGE) of PCR amplicons for detecting intron length polymorphisms (ILP) on one locus of the sugarcanes. These gel images demonstrated many challenges in automated lane/band segmentation in image processing including lane distortion, band deformity, high degree of noise in the background, and bands that are very close together (doublets). Using the proposed bio-imaging workflow, lanes and DNA bands contained within are properly segmented, even for adjacent bands with aberrant migration that cannot be separated by conventional techniques. The software, called GELect, automatically performs genotype calling on each lane by comparing with an all-banding reference, which was created by clustering the existing bands into the non-redundant set of reference bands. The automated genotype calling results were verified by independent manual typing by molecular biologists. This work presents an automated genotyping tool from DNA gel electrophoresis images, called GELect, which was written in Java and made available through the imageJ framework. With a novel automated image processing workflow, the tool can accurately segment lanes from a gel matrix, intelligently extract distorted and even doublet bands that are difficult to identify by existing image processing tools. Consequently, genotyping from DNA gel electrophoresis can be performed automatically allowing users to efficiently conduct large scale DNA fingerprinting via DNA gel electrophoresis. The software is freely available from http://www.biotec.or.th/gi/tools/gelect.
Automatic Response to Intrusion
2002-10-01
Computing Corporation Sidewinder Firewall [18] SRI EMERALD Basic Security Module (BSM) and EMERALD File Transfer Protocol (FTP) Monitors...the same event TCP Wrappers [24] Internet Security Systems RealSecure [31] SRI EMERALD IDIP monitor NAI Labs Generic Software Wrappers Prototype...included EMERALD , NetRadar, NAI Labs UNIX wrappers, ARGuE, MPOG, NetRadar, CyberCop Server, Gauntlet, RealSecure, and the Cyber Command System
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-04
... Liquidity Adding Rebate for Securities Priced Under One Dollar April 28, 2010. Pursuant to Section 19(b)(1... securities priced under one dollar. The text of the proposed rule change is available on the Exchange's Web... Schedule to adjust the liquidity adding rebate for securities priced under one dollar in both the Automatic...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... executions in securities priced at least one dollar in the Exchange's Automatic Execution Mode of order... securities priced at least one dollar in AutoEx. Third, SR-NSX-2012-06 amended the rebate tiers applicable to order executions in securities priced at least one dollar in the Exchange's Order Delivery Mode of order...
Paiva, Joana S.; Dias, Duarte
2017-01-01
In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a smart object that automatically adapts its configuration to the user). A hardware proof-of-concept implementation is presented as an annex to this paper. PMID:28719614
Paiva, Joana S; Dias, Duarte; Cunha, João P S
2017-01-01
In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a smart object that automatically adapts its configuration to the user). A hardware proof-of-concept implementation is presented as an annex to this paper.
A High Speed Finger-Print Optical Scanning Method
2000-01-01
biometrics technologies for authentication, from the view point of convenience and higher security, dactyloscopy is by far the best, much better than the...sensing technologies using static capacitance, thermal or optical detection, the optical detection is by far with the most potential to meet the...present time due to the low resolution of the inherent nature of thermal imaging technique. Besides, this method is easily influenced by environmental
The design of automatic software testing module for civil aviation information system
NASA Astrophysics Data System (ADS)
Qi, Qi; Sun, Yang
2018-05-01
In this paper, the practical innovation design is carried out according to the urgent needs of the automatic testing module of civil aviation information system. Firstly, the background and significance of the automatic testing module of civil aviation information system is expounded, and the current research status of automatic testing module and the advantages and disadvantages of related software are analyzed. Then, from the three aspects of macro demand, module functional requirement and module nonfunctional demand, we further study the needs of automatic testing module of civil aviation information system. Finally, from the four aspects of module structure, module core function, database and security, we have made an innovative plan for the automatic testing module of civil aviation information system.
Piezoelectric micromachined ultrasonic transducers for fingerprint sensing
NASA Astrophysics Data System (ADS)
Lu, Yipeng
Fingerprint identification is the most prevalent biometric technology due to its uniqueness, universality and convenience. Over the past two decades, a variety of physical mechanisms have been exploited to capture an electronic image of a human fingerprint. Among these, capacitive fingerprint sensors are the ones most widely used in consumer electronics because they are fabricated using conventional complementary metal oxide semiconductor (CMOS) integrated circuit technology. However, capacitive fingerprint sensors are extremely sensitive to finger contamination and moisture. This thesis will introduce an ultrasonic fingerprint sensor using a PMUT array, which offers a potential solution to this problem. In addition, it has the potential to increase security, as it allows images to be collected at various depths beneath the epidermis, providing images of the sub-surface dermis layer and blood vessels. Firstly, PMUT sensitivity is maximized by optimizing the layer stack and electrode design, and the coupling coefficient is doubled via series transduction. Moreover, a broadband PMUT with 97% fractional bandwidth is achieved by utilizing a thinner structure excited at two adjacent mechanical vibration modes with overlapping bandwidth. In addition, we proposed waveguide PMUTs, which function to direct acoustic waves, confine acoustic energy, and provide mechanical protection for the PMUT array. Furthermore, PMUT arrays were fabricated with different processes to form the membrane, including front-side etching with a patterned sacrificial layer, front-side etching with additional anchor, cavity SOI wafers and eutectic bonding. Additionally, eutectic bonding allows the PMUT to be integrated with CMOS circuits. PMUTs were characterized in the mechanical, electrical and acoustic domains. Using transmit beamforming, a narrow acoustic beam was achieved, and high-resolution (sub-100 microm) and short-range (~1 mm) pulse-echo ultrasonic imaging was demonstrated using a steel phantom. Finally, a novel ultrasonic fingerprint sensor was demonstrated using a 24x8 array of 22 MHz PMUTs with 100 microm pitch, fully integrated with 180 nm CMOS circuitry through eutectic wafer bonding. Each PMUT is directly bonded to a dedicated CMOS receive amplifier, minimizing electrical parasitics and eliminating the need for through-silicon vias. Pulse-echo imaging of a 1D steel grating is demonstrated using electronic scanning of a 20x8 sub-array, resulting in 300 mV maximum received amplitude and 5:1 contrast ratio. Because the small size of this array limits the maximum image size, mechanical scanning was used to image a 2D PDMS fingerprint phantom (10 mm by 8 mm) at a 1.2 mm distance from the array.
Improving automatic peptide mass fingerprint protein identification by combining many peak sets.
Rögnvaldsson, Thorsteinn; Häkkinen, Jari; Lindberg, Claes; Marko-Varga, György; Potthast, Frank; Samuelsson, Jim
2004-08-05
An automated peak picking strategy is presented where several peak sets with different signal-to-noise levels are combined to form a more reliable statement on the protein identity. The strategy is compared against both manual peak picking and industry standard automated peak picking on a set of mass spectra obtained after tryptic in gel digestion of 2D-gel samples from human fetal fibroblasts. The set of spectra contain samples ranging from strong to weak spectra, and the proposed multiple-scale method is shown to be much better on weak spectra than the industry standard method and a human operator, and equal in performance to these on strong and medium strong spectra. It is also demonstrated that peak sets selected by a human operator display a considerable variability and that it is impossible to speak of a single "true" peak set for a given spectrum. The described multiple-scale strategy both avoids time-consuming parameter tuning and exceeds the human operator in protein identification efficiency. The strategy therefore promises reliable automated user-independent protein identification using peptide mass fingerprints.
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
46 CFR 112.01-10 - Automatic emergency lighting and power system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Automatic emergency lighting and power system. 112.01-10 Section 112.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Definitions of Emergency Lighting and Power Systems § 112.01-10...
An Intelligent Fingerprint-Biometric Image Scrambling Scheme
NASA Astrophysics Data System (ADS)
Khan, Muhammad Khurram; Zhang, Jiashu
To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.
NASA Astrophysics Data System (ADS)
Emge, Darren K.; Adalı, Tülay
2014-06-01
As the availability and use of imaging methodologies continues to increase, there is a fundamental need to jointly analyze data that is collected from multiple modalities. This analysis is further complicated when, the size or resolution of the images differ, implying that the observation lengths of each of modality can be highly varying. To address this expanding landscape, we introduce the multiset singular value decomposition (MSVD), which can perform a joint analysis on any number of modalities regardless of their individual observation lengths. Through simulations, the inter modal relationships across the different modalities which are revealed by the MSVD are shown. We apply the MSVD to forensic fingerprint analysis, showing that MSVD joint analysis successfully identifies relevant similarities for further analysis, significantly reducing the processing time required. This reduction, takes this technique from a laboratory method to a useful forensic tool with applications across the law enforcement and security regimes.
Multilayer Statistical Intrusion Detection in Wireless Networks
NASA Astrophysics Data System (ADS)
Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine
2008-12-01
The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.
Supersensitive fingerprinting of explosives by chemically modified nanosensors arrays.
Lichtenstein, Amir; Havivi, Ehud; Shacham, Ronen; Hahamy, Ehud; Leibovich, Ronit; Pevzner, Alexander; Krivitsky, Vadim; Davivi, Guy; Presman, Igor; Elnathan, Roey; Engel, Yoni; Flaxer, Eli; Patolsky, Fernando
2014-06-24
The capability to detect traces of explosives sensitively, selectively and rapidly could be of great benefit for applications relating to civilian national security and military needs. Here, we show that, when chemically modified in a multiplexed mode, nanoelectrical devices arrays enable the supersensitive discriminative detection of explosive species. The fingerprinting of explosives is achieved by pattern recognizing the inherent kinetics, and thermodynamics, of interaction between the chemically modified nanosensors array and the molecular analytes under test. This platform allows for the rapid detection of explosives, from air collected samples, down to the parts-per-quadrillion concentration range, and represents the first nanotechnology-inspired demonstration on the selective supersensitive detection of explosives, including the nitro- and peroxide-derivatives, on a single electronic platform. Furthermore, the ultrahigh sensitivity displayed by our platform may allow the remote detection of various explosives, a task unachieved by existing detection technologies.
Supersensitive fingerprinting of explosives by chemically modified nanosensors arrays
NASA Astrophysics Data System (ADS)
Lichtenstein, Amir; Havivi, Ehud; Shacham, Ronen; Hahamy, Ehud; Leibovich, Ronit; Pevzner, Alexander; Krivitsky, Vadim; Davivi, Guy; Presman, Igor; Elnathan, Roey; Engel, Yoni; Flaxer, Eli; Patolsky, Fernando
2014-06-01
The capability to detect traces of explosives sensitively, selectively and rapidly could be of great benefit for applications relating to civilian national security and military needs. Here, we show that, when chemically modified in a multiplexed mode, nanoelectrical devices arrays enable the supersensitive discriminative detection of explosive species. The fingerprinting of explosives is achieved by pattern recognizing the inherent kinetics, and thermodynamics, of interaction between the chemically modified nanosensors array and the molecular analytes under test. This platform allows for the rapid detection of explosives, from air collected samples, down to the parts-per-quadrillion concentration range, and represents the first nanotechnology-inspired demonstration on the selective supersensitive detection of explosives, including the nitro- and peroxide-derivatives, on a single electronic platform. Furthermore, the ultrahigh sensitivity displayed by our platform may allow the remote detection of various explosives, a task unachieved by existing detection technologies.
Automatic differential analysis of NMR experiments in complex samples.
Margueritte, Laure; Markov, Petar; Chiron, Lionel; Starck, Jean-Philippe; Vonthron-Sénécheau, Catherine; Bourjot, Mélanie; Delsuc, Marc-André
2018-06-01
Liquid state nuclear magnetic resonance (NMR) is a powerful tool for the analysis of complex mixtures of unknown molecules. This capacity has been used in many analytical approaches: metabolomics, identification of active compounds in natural extracts, and characterization of species, and such studies require the acquisition of many diverse NMR measurements on series of samples. Although acquisition can easily be performed automatically, the number of NMR experiments involved in these studies increases very rapidly, and this data avalanche requires to resort to automatic processing and analysis. We present here a program that allows the autonomous, unsupervised processing of a large corpus of 1D, 2D, and diffusion-ordered spectroscopy experiments from a series of samples acquired in different conditions. The program provides all the signal processing steps, as well as peak-picking and bucketing of 1D and 2D spectra, the program and its components are fully available. In an experiment mimicking the search of a bioactive species in a natural extract, we use it for the automatic detection of small amounts of artemisinin added to a series of plant extracts and for the generation of the spectral fingerprint of this molecule. This program called Plasmodesma is a novel tool that should be useful to decipher complex mixtures, particularly in the discovery of biologically active natural products from plants extracts but can also in drug discovery or metabolomics studies. Copyright © 2017 John Wiley & Sons, Ltd.
78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... system for Nebraska to permit the conversion of all debtor social security and taxpayer identification... automatically convert social security numbers and taxpayer identification numbers into ten number unique... certified central filing systems is available through the Internet on the GIPSA Web site ( http://www.gipsa...
Automatic Web-based Calibration of Network-Capable Shipboard Sensors
2007-09-01
Server, Java , Applet, and Servlet . 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...49 b. Sensor Applet...........................................................................49 3. Java Servlet ...Table 1. Required System Environment Variables for Java Servlet Development. ......25 Table 2. Payload Data Format of the POST Requests from
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Percentage of Automatic Increases in Primary Insurance Amounts Since 1978 VI Appendix VI to Subpart C of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts...
46 CFR 76.25-15 - Pumps and water supply.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 3 2011-10-01 2011-10-01 false Pumps and water supply. 76.25-15 Section 76.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Automatic Sprinkling System, Details § 76.25-15 Pumps and water supply. (a) An automatically controlled pump shall be provided to supply the...
Chen, Junhua; Zhou, Shungui; Wen, Junlin
2015-01-07
Concatenated logic circuits operating as a biocomputing keypad-lock security system with an automatic reset function have been successfully constructed on the basis of toehold-mediated strand displacement and three-way-DNA-junction architecture. In comparison with previously reported keypad locks, the distinctive advantage of the proposed security system is that it can be reset and cycled spontaneously a large number of times without an external stimulus, thus making practical applications possible. By the use of a split-G-quadruplex DNAzyme as the signal reporter, the output of the keypad lock can be recognized readily by the naked eye. The "lock" is opened only when the inputs are introduced in an exact order. This requirement provides defense against illegal invasion to protect information at the molecular scale. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Ver-i-Fus: an integrated access control and information monitoring and management system
NASA Astrophysics Data System (ADS)
Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.
1997-01-01
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.
Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K
2011-09-01
Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.
New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm
NASA Astrophysics Data System (ADS)
Hoomod, Haider K.; Radi, A. M.
2018-05-01
The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.
System steganalysis with automatic fingerprint extraction
Sloan, Tom; Hernandez-Castro, Julio; Isasi, Pedro
2018-01-01
This paper tries to tackle the modern challenge of practical steganalysis over large data by presenting a novel approach whose aim is to perform with perfect accuracy and in a completely automatic manner. The objective is to detect changes introduced by the steganographic process in those data objects, including signatures related to the tools being used. Our approach achieves this by first extracting reliable regularities by analyzing pairs of modified and unmodified data objects; then, combines these findings by creating general patterns present on data used for training. Finally, we construct a Naive Bayes model that is used to perform classification, and operates on attributes extracted using the aforementioned patterns. This technique has been be applied for different steganographic tools that operate in media files of several types. We are able to replicate or improve on a number or previously published results, but more importantly, we in addition present new steganalytic findings over a number of popular tools that had no previous known attacks. PMID:29694366
HIPAA-compliant automatic monitoring system for RIS-integrated PACS operation
NASA Astrophysics Data System (ADS)
Jin, Jin; Zhang, Jianguo; Chen, Xiaomeng; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Feng, Jie; Sheng, Liwei; Huang, H. K.
2006-03-01
As a governmental regulation, Health Insurance Portability and Accountability Act (HIPAA) was issued to protect the privacy of health information that identifies individuals who are living or deceased. HIPAA requires security services supporting implementation features: Access control; Audit controls; Authorization control; Data authentication; and Entity authentication. These controls, which proposed in HIPAA Security Standards, are Audit trails here. Audit trails can be used for surveillance purposes, to detect when interesting events might be happening that warrant further investigation. Or they can be used forensically, after the detection of a security breach, to determine what went wrong and who or what was at fault. In order to provide security control services and to achieve the high and continuous availability, we design the HIPAA-Compliant Automatic Monitoring System for RIS-Integrated PACS operation. The system consists of two parts: monitoring agents running in each PACS component computer and a Monitor Server running in a remote computer. Monitoring agents are deployed on all computer nodes in RIS-Integrated PACS system to collect the Audit trail messages defined by the Supplement 95 of the DICOM standard: Audit Trail Messages. Then the Monitor Server gathers all audit messages and processes them to provide security information in three levels: system resources, PACS/RIS applications, and users/patients data accessing. Now the RIS-Integrated PACS managers can monitor and control the entire RIS-Integrated PACS operation through web service provided by the Monitor Server. This paper presents the design of a HIPAA-compliant automatic monitoring system for RIS-Integrated PACS Operation, and gives the preliminary results performed by this monitoring system on a clinical RIS-integrated PACS.
Source Fingerprinting in Adobe PDF Files
2013-12-01
targeted, opportunistic attacks [2]. Figures from F -Secure for 2008–2010 indicate that anywhere from 28–61% of targeted attacks involved PDF exploits...digit byte offset into the file, a five-digit generation number, and either the character ‘ f ’ or ‘n’, indicating whether the object defined on that line...Walk through a path, extracting n-grams from files and associating # them with the directory that contains them. E.g., the file # ./my_docs/ foo
Utilizing the Digital Fingerprint Methodology for Secure Key Generation
2010-03-01
circuits. 2.2.2. Arbiter PUF 2.2.1 Arbiter PUF Description Figure 3 represents the arbiter PUF circuitry designed by Suh and Devadas [4]. The D latch...Reliability The results of Suh and Devadas ‟s experiments on the arbiter PUF circuit showed that when the arbiter circuit output was measured for the...and Devada pointed out that this low percentage was the result of not laying out their circuit symmetrically as it appears in the idealized
3 CFR - Providing Stability and Security for Medicare Reimbursements
Code of Federal Regulations, 2011 CFR
2011-01-01
... 3 The President 1 2011-01-01 2011-01-01 false Providing Stability and Security for Medicare... Beneficiaries and Pension Relief Act of 2010”, which averts a 21.3 percent reduction in the Medicare physician... contractors to automatically reprocess, to the extent feasible, any claims reflecting the 21.3 percent fee...
Speech Processing and Recognition (SPaRe)
2011-01-01
results in the areas of automatic speech recognition (ASR), speech processing, machine translation (MT), natural language processing ( NLP ), and...Processing ( NLP ), Information Retrieval (IR) 16. SECURITY CLASSIFICATION OF: UNCLASSIFED 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...Figure 9, the IOC was only expected to provide document submission and search; automatic speech recognition (ASR) for English, Spanish, Arabic , and
Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security
NASA Astrophysics Data System (ADS)
Choudhury, Debesh
2016-04-01
We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.
NASA Astrophysics Data System (ADS)
White, Jonathan; Panda, Brajendra
A major concern for computer system security is the threat from malicious insiders who target and abuse critical data items in the system. In this paper, we propose a solution to enable automatic identification of critical data items in a database by way of data dependency relationships. This identification of critical data items is necessary because insider threats often target mission critical data in order to accomplish malicious tasks. Unfortunately, currently available systems fail to address this problem in a comprehensive manner. It is more difficult for non-experts to identify these critical data items because of their lack of familiarity and due to the fact that data systems are constantly changing. By identifying the critical data items automatically, security engineers will be better prepared to protect what is critical to the mission of the organization and also have the ability to focus their security efforts on these critical data items. We have developed an algorithm that scans the database logs and forms a directed graph showing which items influence a large number of other items and at what frequency this influence occurs. This graph is traversed to reveal the data items which have a large influence throughout the database system by using a novel metric based formula. These items are critical to the system because if they are maliciously altered or stolen, the malicious alterations will spread throughout the system, delaying recovery and causing a much more malignant effect. As these items have significant influence, they are deemed to be critical and worthy of extra security measures. Our proposal is not intended to replace existing intrusion detection systems, but rather is intended to complement current and future technologies. Our proposal has never been performed before, and our experimental results have shown that it is very effective in revealing critical data items automatically.
Malkassian, Anthony; Nerini, David; van Dijk, Mark A; Thyssen, Melilotus; Mante, Claude; Gregori, Gerald
2011-04-01
Analytical flow cytometry (FCM) is well suited for the analysis of phytoplankton communities in fresh and sea waters. The measurement of light scatter and autofluorescence properties of particles by FCM provides optical fingerprints, which enables different phytoplankton groups to be separated. A submersible version of the CytoSense flow cytometer (the CytoSub) has been designed for in situ autonomous sampling and analysis, making it possible to monitor phytoplankton at a short temporal scale and obtain accurate information about its dynamics. For data analysis, a manual clustering is usually performed a posteriori: data are displayed on histograms and scatterplots, and group discrimination is made by drawing and combining regions (gating). The purpose of this study is to provide greater objectivity in the data analysis by applying a nonmanual and consistent method to automatically discriminate clusters of particles. In other words, we seek for partitioning methods based on the optical fingerprints of each particle. As the CytoSense is able to record the full pulse shape for each variable, it quickly generates a large and complex dataset to analyze. The shape, length, and area of each curve were chosen as descriptors for the analysis. To test the developed method, numerical experiments were performed on simulated curves. Then, the method was applied and validated on phytoplankton cultures data. Promising results have been obtained with a mixture of various species whose optical fingerprints overlapped considerably and could not be accurately separated using manual gating. Copyright © 2011 International Society for Advancement of Cytometry.
Methodological approach to crime scene investigation: the dangers of technology
NASA Astrophysics Data System (ADS)
Barnett, Peter D.
1997-02-01
The visitor to any modern forensic science laboratory is confronted with equipment and processes that did not exist even 10 years ago: thermocyclers to allow genetic typing of nanogram amounts of DNA isolated from a few spermatozoa; scanning electron microscopes that can nearly automatically detect submicrometer sized particles of molten lead, barium and antimony produced by the discharge of a firearm and deposited on the hands of the shooter; and computers that can compare an image of a latent fingerprint with millions of fingerprints stored in the computer memory. Analysis of populations of physical evidence has permitted statistically minded forensic scientists to use Bayesian inference to draw conclusions based on a priori assumptions which are often poorly understood, irrelevant, or misleading. National commissions who are studying quality control in DNA analysis propose that people with barely relevant graduate degrees and little forensic science experience be placed in charge of forensic DNA laboratories. It is undeniable that high- tech has reversed some miscarriages of justice by establishing the innocence of a number of people who were imprisoned for years for crimes that they did not commit. However, this papers deals with the dangers of technology in criminal investigations.
Revisiting Gaussian Process Regression Modeling for Localization in Wireless Sensor Networks
Richter, Philipp; Toledano-Ayala, Manuel
2015-01-01
Signal strength-based positioning in wireless sensor networks is a key technology for seamless, ubiquitous localization, especially in areas where Global Navigation Satellite System (GNSS) signals propagate poorly. To enable wireless local area network (WLAN) location fingerprinting in larger areas while maintaining accuracy, methods to reduce the effort of radio map creation must be consolidated and automatized. Gaussian process regression has been applied to overcome this issue, also with auspicious results, but the fit of the model was never thoroughly assessed. Instead, most studies trained a readily available model, relying on the zero mean and squared exponential covariance function, without further scrutinization. This paper studies the Gaussian process regression model selection for WLAN fingerprinting in indoor and outdoor environments. We train several models for indoor/outdoor- and combined areas; we evaluate them quantitatively and compare them by means of adequate model measures, hence assessing the fit of these models directly. To illuminate the quality of the model fit, the residuals of the proposed model are investigated, as well. Comparative experiments on the positioning performance verify and conclude the model selection. In this way, we show that the standard model is not the most appropriate, discuss alternatives and present our best candidate. PMID:26370996
How CBO Estimates Automatic Stabilizers
2015-11-01
the economy. Most types of revenues—mainly personal, corporate, and social insurance taxes —are sensitive to the business cycle and account for most of...Medicare taxes for self-employed people, taxes on production and imports, and unemployment insurance taxes . Those six categories account for the bulk of...federal tax revenues.6 Individual taxes account for most of the automatic stabilizers from revenues, followed by Social Security plus Medicare
Self-actuating grapple automatically engages and releases loads from overhead cranes
NASA Technical Reports Server (NTRS)
Froehlich, J. A.; Karastas, G. A.
1966-01-01
Two-piece grapple mechanism consisting of a lift knob secured to the load and a grapple member connected to the crane or lift automatically disengages the load from the overhead lifting device when the load contacts the ground. The key feature is the sliding collar under the lift knob which enables the grapple latch to be stripped off over the lift knob.
Automatic Generation of Rasch-Calibrated Items: Figural Matrices Test GEOM and Endless-Loops Test EC
ERIC Educational Resources Information Center
Arendasy, Martin
2005-01-01
The future of test construction for certain psychological ability domains that can be analyzed well in a structured manner may lie--at the very least for reasons of test security--in the field of automatic item generation. In this context, a question that has not been explicitly addressed is whether it is possible to embed an item response theory…
Combating Terrorism Technology Support Office 2006 Review
2006-01-01
emplaced beyond the control point, activated manually or automatically , with warning lights and an audible alarm to alert innocent pedestrians. The...throughout a vehicle. When a tamper event is detected, SERVANT automatically records sensor data and surveillance video and sends an alert to the security...exposure to organophosphate nerve agents, botulinum toxin, cyanide, and carbon monoxide and will be packaged into a portable , lightweight, mobile hand
ORNL`s war on crime, technically speaking
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiques, P.
This paper describes research being carried out by the Center for Applied Science and Technology for Law Enforcement (CASTLE), at Oak Ridge National Laboratory. This program works on projects which are solvable, affordable, and outside the scope of the private sector. Examples are presented of work related to: the lifetime of childrens fingerprints compared to adults; the development of ways of providing cooler body armor; digital enhancement technology applied to security-camera images from crime scenes; victim identification by skeletal reconstruction for use by forensic anthropologists.
Collusion issue in video watermarking
NASA Astrophysics Data System (ADS)
Doerr, Gwenael; Dugelay, Jean-Luc
2005-03-01
Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However, fifteen years after its infancy, it is still viewed as a young technology and digital watermarking is far from being introduced in Digital Right Management (DRM) frameworks. A possible explanation is that the research community has so far mainly focused on the robustness of the embedded watermark and has almost ignored security aspects. For IP protection applications such as fingerprinting and copyright protection, the watermark should provide means to ensure some kind of trust in a non secure environment. To this end, security against attacks from malicious users has to be considered. This paper will focus on collusion attacks to evaluate security in the context of video watermarking. In particular, security pitfalls will be exhibited when frame-by-frame embedding strategies are enforced for video watermarking. Two alternative strategies will be surveyed: either eavesdropping the watermarking channel to identify some redundant hidden structure, or jamming the watermarking channel to wash out the embedded watermark signal. Finally, the need for a new brand of watermarking schemes will be highlighted if the watermark is to be released in a hostile environment, which is typically the case for IP protection applications.
Transparent Proxy for Secure E-Mail
NASA Astrophysics Data System (ADS)
Michalák, Juraj; Hudec, Ladislav
2010-05-01
The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.
Director, Operational Test and Evaluation FY 2004 Annual Report
2004-01-01
HIGH) Space Based Radar (SBR) Sensor Fuzed Weapon (SFW) P3I (CBU-97/B) Small Diameter Bomb (SDB) Secure Mobile Anti-Jam Reliable Tactical Terminal...detection, identification, and sampling capability for both fixed-site and mobile operations. The system must automatically detect and identify up to ten...staffing within the Services. SYSTEM DESCRIPTION AND MISSION The Services envision JCAD as a hand-held device that automatically detects, identifies, and
Certified In-lined Reference Monitoring on .NET
2006-06-01
Introduction Language -based approaches to computer security have employed two major strategies for enforcing security policies over untrusted programs. • Low...automatically verify IRM’s using a static type-checker. Mobile (MOnitorable BIL with Effects) is an exten- sion of BIL (Baby Intermediate Language ) [15], a...AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES Proceedings of the 2006 Programming Languages and
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-12
... and higher in the Automatic Execution mode of order interaction (``AutoEx'') \\3\\. In addition, the... Rule 11.13(b). \\4\\ Id. AutoEx Take Fee for Securities Priced One Dollar and Higher For orders in securities priced one dollar and above that take liquidity in AutoEx, the proposed rule change lowers the...
Liyanage, Thakshila; Rael, Ashur; Shaffer, Sidney; Zaidi, Shozaf; Goodpaster, John V; Sardar, Rajesh
2018-04-30
Apart from high sensitivity and selectivity of surface-enhanced Raman scattering (SERS)-based trace explosive detection, efficient sampling of explosive residue from real world surfaces is very important for homeland security applications. Herein, we demonstrate an entirely new SERS nanosensor fabrication approach. The SERS nanosensor was prepared by self-assembling chemically synthesized gold triangular nanoprisms (Au TNPs), which we show display strong electromagnetic field enhancements at the sharp tips and edges, onto a pressure-sensitive flexible adhesive film. Our SERS nanosensor provides excellent SERS activity (enhancement factor = ∼6.0 × 106) and limit of detection (as low as 56 parts-per-quadrillions) with high selectivity by chemometric analyses among three commonly military high explosives (TNT, RDX, and PETN). Furthermore, the SERS nanosensors present excellent reproducibility (<4.0% relative standard deviation at 1.0 μM concentration) and unprecedentedly high stability with a "shelf life" of at least 5 months. Finally, TNT and PETN were analyzed and quantified by transferring solid explosive residues from fingerprints left on solid surfaces to the SERS nanosensor. Taken together, the demonstrated sensitivity, selectivity, and reliability of the measurements as well as with the excellent shelf life of our SERS nanosensors obviate the need for complicated sample processing steps required for other analytical techniques, and thus these nanosensors have tremendous potential not only in the field of measurement science but also for homeland security applications to combat acts of terror and military threats.
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
NASA Astrophysics Data System (ADS)
Une, Masashi; Otsuka, Akira; Imai, Hideki
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
On Hunting Animals of the Biometric Menagerie for Online Signature.
Houmani, Nesma; Garcia-Salicetti, Sonia
2016-01-01
Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.
ERIC Educational Resources Information Center
Stump, William P.
1983-01-01
An integrated electronic system combines individual monitoring and control functions into one economical unit that earns a rapid payback by automatically managing and controlling energy usage, building systems, and security and maintenance tasks. (MLF)
About machine-readable travel documents
NASA Astrophysics Data System (ADS)
Vaudenay, S.; Vuagnoux, M.
2007-07-01
Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.
NASA Astrophysics Data System (ADS)
Darlow, Luke Nicholas; Connan, James
2015-11-01
Surface fingerprint scanners are limited to a two-dimensional representation of the fingerprint topography, and thus, are vulnerable to fingerprint damage, distortion, and counterfeiting. Optical coherence tomography (OCT) scanners are able to image (in three dimensions) the internal structure of the fingertip skin. Techniques for obtaining the internal fingerprint from OCT scans have since been developed. This research presents an internal fingerprint extraction algorithm designed to extract high-quality internal fingerprints from touchless OCT fingertip scans. Furthermore, it serves as a correlation study between surface and internal fingerprints. Provided the scanned region contains sufficient fingerprint information, correlation to the surface topography is shown to be good (74% have true matches). The cross-correlation of internal fingerprints (96% have true matches) is substantial that internal fingerprints can constitute a fingerprint database. The internal fingerprints' performance was also compared to the performance of cropped surface counterparts, to eliminate bias owing to information level present, showing that the internal fingerprints' performance is superior 63.6% of the time.
NASA Technical Reports Server (NTRS)
Mulhall, B. D. L.
1980-01-01
The results of this effort are presented in a manner for use by both the AIDS 3 Operational and Economic Feasibility subtasks as well as the Development of Alternative subtask. The approach taken was to identify the major functions that appear in AIDS 3 and then to determine which technologies would be needed for support. The technologies were then examined from the point of view of reliability, throughput, security, availability, cost and possible future trends. Whenever possible graphs are given to indicate projected costs of rapidly changing technologies.
Shaheen, E; Mowafy, B; Politis, C; Jacobs, R
2017-12-01
Previous research proposed the use of the mandibular midline neurovascular canal structures as a forensic finger print. In their observer study, an average correct identification of 95% was reached which triggered this study. To present a semi-automatic computer recognition approach to replace the observers and to validate the accuracy of this newly proposed method. Imaging data from Computer Tomography (CT) and Cone Beam Computer Tomography (CBCT) of mandibles scanned at two different moments were collected to simulate an AM and PM situation where the first scan presented AM and the second scan was used to simulate PM. Ten cases with 20 scans were used to build a classifier which relies on voxel based matching and results with classification into one of two groups: "Unmatched" and "Matched". This protocol was then tested using five other scans out of the database. Unpaired t-testing was applied and accuracy of the computerized approach was determined. A significant difference was found between the "Unmatched" and "Matched" classes with means of 0.41 and 0.86 respectively. Furthermore, the testing phase showed an accuracy of 100%. The validation of this method pushes this protocol further to a fully automatic identification procedure for victim identification based on the mandibular midline canals structures only in cases with available AM and PM CBCT/CT data.
Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas
2016-08-01
The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-31
... automatic distribution to the deceased's estate or next-of- kin. VA's authority under title 38, United..., Parking, Penalties, Privacy, Reporting and recordkeeping requirements, Seals and insignia, Security...
An evaluation of authentication methods for smartphone based on users’ preferences
NASA Astrophysics Data System (ADS)
Sari, P. K.; Ratnasari, G. S.; Prasetio, A.
2016-04-01
This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.
Watermarking textures in video games
NASA Astrophysics Data System (ADS)
Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin
2014-02-01
Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.
2014-07-31
began declining before partial sequestration, which has only worsened the problem. When automatic budget cuts took effect in April 2013 for three...structures, including the BUR force, the 2002 Force, the QDR force, and the sequestration force. Table 1 (Appendix A) contains a comparison of these...to address those same security challenges. Under the BCA, automatic reductions of the caps on Government-wide discretionary funding (sequestration
NASA Astrophysics Data System (ADS)
Liu, Weiqi; Huang, Peng; Peng, Jinye; Fan, Jianping; Zeng, Guihua
2018-02-01
For supporting practical quantum key distribution (QKD), it is critical to stabilize the physical parameters of signals, e.g., the intensity, phase, and polarization of the laser signals, so that such QKD systems can achieve better performance and practical security. In this paper, an approach is developed by integrating a support vector regression (SVR) model to optimize the performance and practical security of the QKD system. First, a SVR model is learned to precisely predict the time-along evolutions of the physical parameters of signals. Second, such predicted time-along evolutions are employed as feedback to control the QKD system for achieving the optimal performance and practical security. Finally, our proposed approach is exemplified by using the intensity evolution of laser light and a local oscillator pulse in the Gaussian modulated coherent state QKD system. Our experimental results have demonstrated three significant benefits of our SVR-based approach: (1) it can allow the QKD system to achieve optimal performance and practical security, (2) it does not require any additional resources and any real-time monitoring module to support automatic prediction of the time-along evolutions of the physical parameters of signals, and (3) it is applicable to any measurable physical parameter of signals in the practical QKD system.
NASA Astrophysics Data System (ADS)
Topping, David O.; Allan, James; Rami Alfarra, M.; Aumont, Bernard
2017-06-01
Our ability to model the chemical and thermodynamic processes that lead to secondary organic aerosol (SOA) formation is thought to be hampered by the complexity of the system. While there are fundamental models now available that can simulate the tens of thousands of reactions thought to take place, validation against experiments is highly challenging. Techniques capable of identifying individual molecules such as chromatography are generally only capable of quantifying a subset of the material present, making it unsuitable for a carbon budget analysis. Integrative analytical methods such as the Aerosol Mass Spectrometer (AMS) are capable of quantifying all mass, but because of their inability to isolate individual molecules, comparisons have been limited to simple data products such as total organic mass and the O : C ratio. More detailed comparisons could be made if more of the mass spectral information could be used, but because a discrete inversion of AMS data is not possible, this activity requires a system of predicting mass spectra based on molecular composition. In this proof-of-concept study, the ability to train supervised methods to predict electron impact ionisation (EI) mass spectra for the AMS is evaluated. Supervised Training Regression for the Arbitrary Prediction of Spectra (STRAPS) is not built from first principles. A methodology is constructed whereby the presence of specific mass-to-charge ratio (m/z) channels is fitted as a function of molecular structure before the relative peak height for each channel is similarly fitted using a range of regression methods. The widely used AMS mass spectral database is used as a basis for this, using unit mass resolution spectra of laboratory standards. Key to the fitting process is choice of structural information, or molecular fingerprint. Our approach relies on using supervised methods to automatically optimise the relationship between spectral characteristics and these molecular fingerprints. Therefore, any internal mechanisms or instrument features impacting on fragmentation are implicitly accounted for in the fitted model. Whilst one might expect a collection of keys specifically designed according to EI fragmentation principles to offer a robust basis, the suitability of a range of commonly available fingerprints is evaluated. Using available fingerprints in isolation, initial results suggest the generic public MACCS
fingerprints provide the most accurate trained model when combined with both decision trees and random forests, with median cosine angles of 0.94-0.97 between modelled and measured spectra. There is some sensitivity to choice of fingerprint, but most sensitivity is in choice of regression technique. Support vector machines perform the worst, with median values of 0.78-0.85 and lower ranges approaching 0.4, depending on the fingerprint used. More detailed analysis of modelled versus mass spectra demonstrates important composition-dependent sensitivities on a compound-by-compound basis. This is further demonstrated when we apply the trained methods to a model α-pinene SOA system, using output from the GECKO-A model. This shows that use of a generic fingerprint referred to as FP4
and one designed for vapour pressure predictions (Nanoolal
) gives plausible mass spectra, whilst the use of the MACCS keys in isolation performs poorly in this application, demonstrating the need for evaluating model performance against other SOA systems rather than existing laboratory databases on single compounds. Given the limited number of compounds used within the AMS training dataset, it is difficult to prescribe which combination of approach would lead to a robust generic model across all expected compositions. Nonetheless, the study demonstrates the use of a methodology that would be improved with more training data, fingerprints designed explicitly for fragmentation mechanisms occurring within the AMS, and data from additional mixed systems for further validation. To facilitate further development of the method, including application to other instruments, the model code for re-training is provided via a public Github and Zenodo software repository.
Chen, Chi-Jim; Pai, Tun-Wen; Cheng, Mox
2015-01-01
A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS), successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM), based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates. PMID:25835186
Bridging the gap: from biometrics to forensics.
Jain, Anil K; Ross, Arun
2015-08-05
Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.
Quantum Cascade Laser (QCL) based sensor for the detection of explosive compounds
NASA Astrophysics Data System (ADS)
Normand, Erwan; Howieson, Iain; McCulloch, Michael; Black, Paul
2006-09-01
Following Cascade Technologies first success at using Quantum Cascade Lasers (QCL) for trace gas detection in the continuous emission monitoring market, the core technology platform is now being developed towards homeland security applications. This paper will highlight the potential of QCL based trace gas sensor for detecting vapours of explosives. Furthermore we will present results that let foresee the use of such technologies at addressing security gaps for protection against terrorism in infrastructures where high throughput screening of individuals or items is required. Preliminary measurements have shown that rapid identification, or fingerprinting, of explosive is achievable in 10ms at extrapolated sensitivities in the sub-part per billion range. The experiments were carried out with support form the Home Office Scientific Development Branch (HOSDB) in the UK and were focused at selecting a variety of explosive compounds and showing their detection using a novel sniffer platform system based on the use of quantum cascade lasers. Preliminary studies on the technology have indicated that direct fingerprinting (detection - identification) of explosive compounds such as NG and tagging agents such as EGDN by sniffing surrounding ambient air is achievable. Furthermore these studies have also indicated that detection of such compounds on packaging used to ship the sealed compounds is possible, making this platform a strong contender for detection through cross contamination on material that have been in contact with each other. Additionally, it was also possible to detect breakdown products associated with sample material NG providing a further capability that could be exploited to enhance the detection and identification of explosive compounds.
Bridging the gap: from biometrics to forensics
Jain, Anil K.; Ross, Arun
2015-01-01
Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. PMID:26101280
WEDDS: The WITS Encrypted Data Delivery System
NASA Technical Reports Server (NTRS)
Norris, J.; Backes, P.
1999-01-01
WEDDS, the WITS Encrypted Data Delivery System, is a framework for supporting distributed mission operations by automatically transferring sensitive mission data in a secure and efficient manner to and from remote mission participants over the internet.
Code of Federal Regulations, 2011 CFR
2011-10-01
... subsystem, system, or vessel to determine the least critical consequence. (b) All automatic control, remote control, safety control, and alarm systems must be failsafe. ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Reliability and Safety...
On Hunting Animals of the Biometric Menagerie for Online Signature
Houmani, Nesma; Garcia-Salicetti, Sonia
2016-01-01
Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining
2015-03-01
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
2014-01-24
8, Automatic Particle Counter, cleanliness, free water, Diesel 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT none 18. NUMBER OF...aircraft, or up to 10 mg/L for product used as a diesel product for ground use (1). Free water contamination (droplets) may appear as fine droplets or...published several methods and test procedures for the calibration and use of automatic particle counters. The transition of this technology to the fuel
NASA Astrophysics Data System (ADS)
Aggarwal, Kashish; Dagar, Nidhi; Sethi, Shikha; Tiwari, Shobhit; Kumar, Arun
2011-12-01
We have designed a security system using MATLAB. The system uses the optimum components and is very useful in tracking visitors to our homes, offices and other meeting places. The system works in two modes: Automatic Mode & Manual Mode. In the Automatic Mode, the snapshot of the person standing outside is taken with the help of a webcam and it is then compared with the set of predefined pictures in the database and if matched, the door is opened automatically. In the Manual Mode, the live preview is sent to the laptop screen and is recorded according to user's commands. The door is opened, and then date, time and recording is saved in the database.
Automatic Pedestrian Crossing Detection and Impairment Analysis Based on Mobile Mapping System
NASA Astrophysics Data System (ADS)
Liu, X.; Zhang, Y.; Li, Q.
2017-09-01
Pedestrian crossing, as an important part of transportation infrastructures, serves to secure pedestrians' lives and possessions and keep traffic flow in order. As a prominent feature in the street scene, detection of pedestrian crossing contributes to 3D road marking reconstruction and diminishing the adverse impact of outliers in 3D street scene reconstruction. Since pedestrian crossing is subject to wearing and tearing from heavy traffic flow, it is of great imperative to monitor its status quo. On this account, an approach of automatic pedestrian crossing detection using images from vehicle-based Mobile Mapping System is put forward and its defilement and impairment are analyzed in this paper. Firstly, pedestrian crossing classifier is trained with low recall rate. Then initial detections are refined by utilizing projection filtering, contour information analysis, and monocular vision. Finally, a pedestrian crossing detection and analysis system with high recall rate, precision and robustness will be achieved. This system works for pedestrian crossing detection under different situations and light conditions. It can recognize defiled and impaired crossings automatically in the meanwhile, which facilitates monitoring and maintenance of traffic facilities, so as to reduce potential traffic safety problems and secure lives and property.
NASA Automatic Information Security Handbook
NASA Technical Reports Server (NTRS)
1993-01-01
This handbook details the Automated Information Security (AIS) management process for NASA. Automated information system security is becoming an increasingly important issue for all NASA managers and with rapid advancements in computer and network technologies and the demanding nature of space exploration and space research have made NASA increasingly dependent on automated systems to store, process, and transmit vast amounts of mission support information, hence the need for AIS systems and management. This handbook provides the consistent policies, procedures, and guidance to assure that an aggressive and effective AIS programs is developed, implemented, and sustained at all NASA organizations and NASA support contractors.
Longitudinal study of fingerprint recognition.
Yoon, Soweon; Jain, Anil K
2015-07-14
Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject's age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis.
Longitudinal study of fingerprint recognition
Yoon, Soweon; Jain, Anil K.
2015-01-01
Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject’s age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis. PMID:26124106
Three-dimensional fingerprint recognition by using convolution neural network
NASA Astrophysics Data System (ADS)
Tian, Qianyu; Gao, Nan; Zhang, Zonghua
2018-01-01
With the development of science and technology and the improvement of social information, fingerprint recognition technology has become a hot research direction and been widely applied in many actual fields because of its feasibility and reliability. The traditional two-dimensional (2D) fingerprint recognition method relies on matching feature points. This method is not only time-consuming, but also lost three-dimensional (3D) information of fingerprint, with the fingerprint rotation, scaling, damage and other issues, a serious decline in robustness. To solve these problems, 3D fingerprint has been used to recognize human being. Because it is a new research field, there are still lots of challenging problems in 3D fingerprint recognition. This paper presents a new 3D fingerprint recognition method by using a convolution neural network (CNN). By combining 2D fingerprint and fingerprint depth map into CNN, and then through another CNN feature fusion, the characteristics of the fusion complete 3D fingerprint recognition after classification. This method not only can preserve 3D information of fingerprints, but also solves the problem of CNN input. Moreover, the recognition process is simpler than traditional feature point matching algorithm. 3D fingerprint recognition rate by using CNN is compared with other fingerprint recognition algorithms. The experimental results show that the proposed 3D fingerprint recognition method has good recognition rate and robustness.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.
An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configurationmore » in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.« less
NASA Astrophysics Data System (ADS)
Kwak, G.; Kim, K.; Park, Y.
2014-02-01
As the maritime boundary delimitation is important for the purpose of securing marine resources, in addition to the aspect of maritime security, interest in maritime boundary delimitation to help national benefits are increasing over the world. In Korea, the importance of maritime boundary delimitation with the neighbouring countries is also increasing in practice. The quantity of obtainable marine resources depending on maritime boundary acts as an important factor for maritime boundary delimitation. Accordingly, a study is required to calculate quantity of our obtainable marine resources depending on maritime boundary delimitation. This study intends to calculate obtainable marine resources depending on various maritime boundary scenarios insisted by several countries. It mainly aims at developing a GIS-based automation system to be utilized for decision making of the maritime boundary delimitation. For this target, it has designed a module using spatial analysis technique to automatically calculate profit and loss waters area of each country upon maritime boundary and another module to estimate economic profits and losses obtained by each country using the calculated waters area and pricing information of the marine resources. By linking both the designed modules, it has implemented an automatic economic profit and loss calculation system for the GIS-based maritime boundary delimitation. The system developed from this study automatically calculate quantity of the obtainable marine resources of a country for the maritime boundary to be added and created in the future. Thus, it is expected to support decision making for the maritime boundary negotiators.
Wavelet-based associative memory
NASA Astrophysics Data System (ADS)
Jones, Katharine J.
2004-04-01
Faces provide important characteristics of a person"s identification. In security checks, face recognition still remains the method in continuous use despite other approaches (i.e. fingerprints, voice recognition, pupil contraction, DNA scanners). With an associative memory, the output data is recalled directly using the input data. This can be achieved with a Nonlinear Holographic Associative Memory (NHAM). This approach can also distinguish between strongly correlated images and images that are partially or totally enclosed by others. Adaptive wavelet lifting has been used for Content-Based Image Retrieval. In this paper, adaptive wavelet lifting will be applied to face recognition to achieve an associative memory.
Finger vein recognition using local line binary pattern.
Rosdi, Bakhtiar Affendi; Shing, Chai Wuh; Suandi, Shahrel Azmin
2011-01-01
In this paper, a personal verification method using finger vein is presented. Finger vein can be considered more secured compared to other hands based biometric traits such as fingerprint and palm print because the features are inside the human body. In the proposed method, a new texture descriptor called local line binary pattern (LLBP) is utilized as feature extraction technique. The neighbourhood shape in LLBP is a straight line, unlike in local binary pattern (LBP) which is a square shape. Experimental results show that the proposed method using LLBP has better performance than the previous methods using LBP and local derivative pattern (LDP).
Straightforward fabrication of black nano silica dusting powder for latent fingerprint imaging
NASA Astrophysics Data System (ADS)
Komalasari, Isna; Krismastuti, Fransiska Sri Herwahyu; Elishian, Christine; Handayani, Eka Mardika; Nugraha, Willy Cahya; Ketrin, Rosi
2017-11-01
Imaging of latent fingerprint pattern (aka fingermark) is one of the most important and accurate detection methods in forensic investigation because of the characteristic of individual fingerprint. This detection technique relies on the mechanical adherence of fingerprint powder to the moisture and oily component of the skin left on the surface. The particle size of fingerprint powder is one of the critical parameter to obtain excellent fingerprint image. This study develops a simple, cheap and straightforward method to fabricate Nano size black dusting fingerprint powder based on Nano silica and applies the powder to visualize latent fingerprint. The nanostructured silica was prepared from tetraethoxysilane (TEOS) and then modified with Nano carbon, methylene blue and sodium acetate to color the powder. Finally, as a proof-of-principle, the ability of this black Nano silica dusting powder to image latent fingerprint is successfully demonstrated and the results show that this fingerprint powder provides clearer fingerprint pattern compared to the commercial one highlighting the potential application of the nanostructured silica in forensic science.
A fingerprint classification algorithm based on combination of local and global information
NASA Astrophysics Data System (ADS)
Liu, Chongjin; Fu, Xiang; Bian, Junjie; Feng, Jufu
2011-12-01
Fingerprint recognition is one of the most important technologies in biometric identification and has been wildly applied in commercial and forensic areas. Fingerprint classification, as the fundamental procedure in fingerprint recognition, can sharply decrease the quantity for fingerprint matching and improve the efficiency of fingerprint recognition. Most fingerprint classification algorithms are based on the number and position of singular points. Because the singular points detecting method only considers the local information commonly, the classification algorithms are sensitive to noise. In this paper, we propose a novel fingerprint classification algorithm combining the local and global information of fingerprint. Firstly we use local information to detect singular points and measure their quality considering orientation structure and image texture in adjacent areas. Furthermore the global orientation model is adopted to measure the reliability of singular points group. Finally the local quality and global reliability is weighted to classify fingerprint. Experiments demonstrate the accuracy and effectivity of our algorithm especially for the poor quality fingerprint images.
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Secure web-based invocation of large-scale plasma simulation codes
NASA Astrophysics Data System (ADS)
Dimitrov, D. A.; Busby, R.; Exby, J.; Bruhwiler, D. L.; Cary, J. R.
2004-12-01
We present our design and initial implementation of a web-based system for running, both in parallel and serial, Particle-In-Cell (PIC) codes for plasma simulations with automatic post processing and generation of visual diagnostics.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Systems Having an Automatically Connected Storage Battery as the Sole Emergency Power Source § 112.30-1 General. This subpart contains requirements applicable to emergency power installations having...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Systems Having an Automatically Connected Storage Battery as the Sole Emergency Power Source § 112.30-1 General. This subpart contains requirements applicable to emergency power installations having...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Systems Having an Automatically Connected Storage Battery as the Sole Emergency Power Source § 112.30-1 General. This subpart contains requirements applicable to emergency power installations having...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Systems Having an Automatically Connected Storage Battery as the Sole Emergency Power Source § 112.30-1 General. This subpart contains requirements applicable to emergency power installations having...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING EMERGENCY LIGHTING AND POWER SYSTEMS Emergency Systems Having an Automatically Connected Storage Battery as the Sole Emergency Power Source § 112.30-1 General. This subpart contains requirements applicable to emergency power installations having...
Automatic locking orthotic knee device
NASA Technical Reports Server (NTRS)
Weddendorf, Bruce C. (Inventor)
1993-01-01
An articulated tang in clevis joint for incorporation in newly manufactured conventional strap-on orthotic knee devices or for replacing such joints in conventional strap-on orthotic knee devices is discussed. The instant tang in clevis joint allows the user the freedom to extend and bend the knee normally when no load (weight) is applied to the knee and to automatically lock the knee when the user transfers weight to the knee, thus preventing a damaged knee from bending uncontrollably when weight is applied to the knee. The tang in clevis joint of the present invention includes first and second clevis plates, a tang assembly and a spacer plate secured between the clevis plates. Each clevis plate includes a bevelled serrated upper section. A bevelled shoe is secured to the tank in close proximity to the bevelled serrated upper section of the clevis plates. A coiled spring mounted within an oblong bore of the tang normally urges the shoes secured to the tang out of engagement with the serrated upper section of each clevic plate to allow rotation of the tang relative to the clevis plate. When weight is applied to the joint, the load compresses the coiled spring, the serrations on each clevis plate dig into the bevelled shoes secured to the tang to prevent relative movement between the tang and clevis plates. A shoulder is provided on the tang and the spacer plate to prevent overextension of the joint.
An automatic detection software for differential reflection spectroscopy
NASA Astrophysics Data System (ADS)
Yuksel, Seniha Esen; Dubroca, Thierry; Hummel, Rolf E.; Gader, Paul D.
2012-06-01
Recent terrorist attacks have sprung a need for a large scale explosive detector. Our group has developed differential reflection spectroscopy which can detect explosive residue on surfaces such as parcel, cargo and luggage. In short, broad band ultra-violet and visible light is shone onto a material (such as a parcel) moving on a conveyor belt. Upon reflection off the surface, the light intensity is recorded with a spectrograph (spectrometer in combination with a CCD camera). This reflected light intensity is then subtracted and normalized with the next data point collected, resulting in differential reflection spectra in the 200-500 nm range. Explosives show spectral finger-prints at specific wavelengths, for example, the spectrum of 2,4,6, trinitrotoluene (TNT) shows an absorption edge at 420 nm. Additionally, we have developed an automated software which detects the characteristic features of explosives. One of the biggest challenges for the algorithm is to reach a practical limit of detection. In this study, we introduce our automatic detection software which is a combination of principal component analysis and support vector machines. Finally we present the sensitivity and selectivity response of our algorithm as a function of the amount of explosive detected on a given surface.
Automatic decoding of facial movements reveals deceptive pain expressions
Bartlett, Marian Stewart; Littlewort, Gwen C.; Frank, Mark G.; Lee, Kang
2014-01-01
Summary In highly social species such as humans, faces have evolved to convey rich information for social interaction, including expressions of emotions and pain [1–3]. Two motor pathways control facial movement [4–7]. A subcortical extrapyramidal motor system drives spontaneous facial expressions of felt emotions. A cortical pyramidal motor system controls voluntary facial expressions. The pyramidal system enables humans to simulate facial expressions of emotions not actually experienced. Their simulation is so successful that they can deceive most observers [8–11]. Machine vision may, however, be able to distinguish deceptive from genuine facial signals by identifying the subtle differences between pyramidally and extrapyramidally driven movements. Here we show that human observers could not discriminate real from faked expressions of pain better than chance, and after training, improved accuracy to a modest 55%. However a computer vision system that automatically measures facial movements and performs pattern recognition on those movements attained 85% accuracy. The machine system’s superiority is attributable to its ability to differentiate the dynamics of genuine from faked expressions. Thus by revealing the dynamics of facial action through machine vision systems, our approach has the potential to elucidate behavioral fingerprints of neural control systems involved in emotional signaling. PMID:24656830
Detection and Rectification of Distorted Fingerprints.
Si, Xuanbin; Feng, Jianjiang; Zhou, Jie; Luo, Yuxuan
2015-03-01
Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database.
Fingerprint Change: Not Visible, But Tangible.
Negri, Francesca V; De Giorgi, Annamaria; Bozzetti, Cecilia; Squadrilli, Anna; Petronini, Pier Giorgio; Leonardi, Francesco; Bisogno, Luigi; Garofano, Luciano
2017-09-01
Hand-foot syndrome, a chemotherapy-induced cutaneous toxicity, can cause an alteration in fingerprints causing a setback for cancer patients due to the occurrence of false rejections. A colon cancer patient was fingerprinted after not having been able to use fingerprint recognition devices after 6 months of adjuvant chemotherapy. The fingerprint images were digitally processed to improve fingerprint definition without altering the papillary design. No evidence of skin toxicity was present. Two months later, the situation returned to normal. The fingerprint evaluation conducted on 15 identification points highlighted the quantitative and qualitative fingerprint alteration details detected after the end of chemotherapy and 2 months later. Fingerprint alteration during chemotherapy has been reported, but to our knowledge, this particular case is the first ever reported without evident clinical signs. Alternative fingerprint identification methods as well as improved biometric identification systems are needed in case of unexpected situations. © 2017 American Academy of Forensic Sciences.
An effective one-dimensional anisotropic fingerprint enhancement algorithm
NASA Astrophysics Data System (ADS)
Ye, Zhendong; Xie, Mei
2012-01-01
Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.
An effective one-dimensional anisotropic fingerprint enhancement algorithm
NASA Astrophysics Data System (ADS)
Ye, Zhendong; Xie, Mei
2011-12-01
Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.
Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding
NASA Astrophysics Data System (ADS)
Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei
The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
The application of algorithm in taxi security system
NASA Astrophysics Data System (ADS)
Luo, Chengyu
2017-08-01
With the booming of the society and economy today, Taxis and private cars have gradually become one of the most popular tools in transportation for their low price and convenience. However, because of the breakdown in the security system, a few accidents occurred due to the illegal taxi. The unreliable security management has attributed to the lack of trust in taxi companies and relevant regulatory authorities, which considered to be the reason why people are worried about it. Accordingly, we put forward a design for a taxi security system, making use of modern technology such as NFC, iBeacon, GPS combined with algorithms, automatically recognize the taxi we take, and reflecting basic information of taxi and driver on our mobile phone.
Measurement-Device-Independent Quantum Key Distribution over 200 km
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei
2014-11-01
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
Separation and sequence detection of overlapped fingerprints: experiments and first results
NASA Astrophysics Data System (ADS)
Kärgel, Rainer; Giebel, Sascha; Leich, Marcus; Dittmann, Jana
2011-11-01
Latent fingerprints provide vital information in modern crime scene investigation. On frequently touched surfaces the fingerprints may overlap which poses a major problem for forensic analysis. In order to make such overlapping fingerprints available for analysis, they have to be separated. An additional evaluation of the sequence in which the fingerprints were brought onto the surface can help to reconstruct the progression of events. Advances in both tasks can considerably aid crime investigation agencies and are the subject of this work. Here, a statistical approach, initially devised for the separation of overlapping text patterns by Tonazzini et al.,1 is employed to separate overlapping fingerprints. The method involves a maximum a posteriori estimation of the single fingerprints and the mixing coefficients, computed by an expectation-maximization algorithm. A fingerprint age determination feature based on corrosion is evaluated for sequence estimation. The approaches are evaluated using 30 samples of overlapping latent fingerprints on two different substrates. The fingerprint images are acquired with a non-destructive chromatic white light surface measurement device, each sample containing exactly two fingerprints that overlap in the center of the image. Since forensic investigations rely on manual assessment of acquired fingerprints by forensics experts, a subjective scale ranging from 0 to 8 is used to rate the separation results. Our results indicate that the chosen method can separate overlapped fingerprints which exhibit strong differences in contrast, since results gradually improve with the growing contrast difference of the overlapping fingerprints. Investigating the effects of corrosion leads to a reliable determination of the fingerprints' sequence as the timespan between their leaving increases.
Earthquake Fingerprints: Representing Earthquake Waveforms for Similarity-Based Detection
NASA Astrophysics Data System (ADS)
Bergen, K.; Beroza, G. C.
2016-12-01
New earthquake detection methods, such as Fingerprint and Similarity Thresholding (FAST), use fast approximate similarity search to identify similar waveforms in long-duration data without templates (Yoon et al. 2015). These methods have two key components: fingerprint extraction and an efficient search algorithm. Fingerprint extraction converts waveforms into fingerprints, compact signatures that represent short-duration waveforms for identification and search. Earthquakes are detected using an efficient indexing and search scheme, such as locality-sensitive hashing, that identifies similar waveforms in a fingerprint database. The quality of the search results, and thus the earthquake detection results, is strongly dependent on the fingerprinting scheme. Fingerprint extraction should map similar earthquake waveforms to similar waveform fingerprints to ensure a high detection rate, even under additive noise and small distortions. Additionally, fingerprints corresponding to noise intervals should have mutually dissimilar fingerprints to minimize false detections. In this work, we compare the performance of multiple fingerprint extraction approaches for the earthquake waveform similarity search problem. We apply existing audio fingerprinting (used in content-based audio identification systems) and time series indexing techniques and present modified versions that are specifically adapted for seismic data. We also explore data-driven fingerprinting approaches that can take advantage of labeled or unlabeled waveform data. For each fingerprinting approach we measure its ability to identify similar waveforms in a low signal-to-noise setting, and quantify the trade-off between true and false detection rates in the presence of persistent noise sources. We compare the performance using known event waveforms from eight independent stations in the Northern California Seismic Network.
Influence of Skin Diseases on Fingerprint Recognition
Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon
2012-01-01
There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described. PMID:22654483
Influence of skin diseases on fingerprint recognition.
Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon
2012-01-01
There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described.
QCAPUF: QCA-based physically unclonable function as a hardware security primitive
NASA Astrophysics Data System (ADS)
Abutaleb, M. M.
2018-04-01
Physically unclonable functions (PUFs) are increasingly used as innovative security primitives to provide the hardware authentication and identification as well as the secret key generation based on unique and random variations in identically fabricated devices. Security and low power have appeared to become two crucial necessities to modern designs. As an emerging nanoelectronic technology, a quantum-dot cellular automata (QCA) can achieve ultra-low power consumption as well as an extremely small area for implementing digital designs. However, there are various classes of permanent defects that can happen during the manufacture of QCA devices. The recent extensive research has been focused on how to eliminate errors in QCA structures resulting from fabrication variances. By a completely different vision, to turn this disadvantage into an advantage, this paper presents a novel QCA-based PUF (QCAPUF) architecture to exploit the unique physical characteristics of fabricated QCA cells in order to produce different hardware fingerprint instances. This architecture is composed of proposed logic and interconnect blocks that have critical vulnerabilities and perform unexpected logical operations. The behaviour of QCAPUF is thoroughly analysed through physical relations and simulations. Results confirm that the proposed QCAPUF has state of the art PUF characteristics in the QCA technology. This paper will serve as a basis for further research into QCA-based hardware security primitives and applications.
2005-09-01
discovery of network security threats and vulnerabilities will be done by doing penetration testing during the C&A process. This can be done on a...2.1.1; Appendix E, J COBR -1 Protection of Backup and Restoration Assets Availability 1.3.1; 2.1.3; 2.1.7; 3.1; 4.3; Appendix J, M CODB-2 Data... discovery , inventory, scanning and loading of C&A information in its central database, (2) automatic generation of the SRTM , (3) automatic generation
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
NASA Astrophysics Data System (ADS)
Li, Baishou; Huang, Yu; Lan, Guangquan; Li, Tingting; Lu, Ting; Yao, Mingxing; Luo, Yuandan; Li, Boxiang; Qian, Yongyou; Gao, Yujiu
2015-12-01
This paper design and implement security monitor system within a scenic spot for tourists, the scenic spot staff can be automatic real time for visitors to perception and monitoring, and visitors can also know about themselves location in the scenic, real-time and obtain the 3D imaging conditions of scenic area. Through early warning can realize "parent-child relation", preventing the old man and child lost and wandering. Research results to the further development of virtual reality to provide effective security early warning platform of the theoretical basis and practical reference.
Constructing an Indoor Floor Plan Using Crowdsourcing Based on Magnetic Fingerprinting
Zhao, Fang; Jiang, Mengling; Ma, Hao; Zhang, Yuexia
2017-01-01
A large number of indoor positioning systems have recently been developed to cater for various location-based services. Indoor maps are a prerequisite of such indoor positioning systems; however, indoor maps are currently non-existent for most indoor environments. Construction of an indoor map by external experts excludes quick deployment and prevents widespread utilization of indoor localization systems. Here, we propose an algorithm for the automatic construction of an indoor floor plan, together with a magnetic fingerprint map of unmapped buildings using crowdsourced smartphone data. For floor plan construction, our system combines the use of dead reckoning technology, an observation model with geomagnetic signals, and trajectory fusion based on an affinity propagation algorithm. To obtain the indoor paths, the magnetic trajectory data obtained through crowdsourcing were first clustered using dynamic time warping similarity criteria. The trajectories were inferred from odometry tracing, and those belonging to the same cluster in the magnetic trajectory domain were then fused. Fusing these data effectively eliminates the inherent tracking errors originating from noisy sensors; as a result, we obtained highly accurate indoor paths. One advantage of our system is that no additional hardware such as a laser rangefinder or wheel encoder is required. Experimental results demonstrate that our proposed algorithm successfully constructs indoor floor plans with 0.48 m accuracy, which could benefit location-based services which lack indoor maps. PMID:29156639
Peng, Di; Liu, Xiang; Huang, Mengjun; Wang, Dan; Liu, Renlong
2018-04-24
Solid powder fluorescence shows great potential for application in medicine, biology, and engineering, especially in the identification of latent fingermarks in forensic science. However, conventional developing methods suffer from some drawbacks, such as low contrast, low sensitivity, low selectivity, and high toxicity. To conquer these challenges, novel SiO2@C-dot microspheres were prepared via a facile one-pot hydrothermal method by using citric acid as a carbon source and aminosilane as a nitrogen source. Interestingly, the results showed that the resultant powders possess good monodispersity, high fluorescence emission, and resistance to self-quenching. Additionally, the mechanism for the solid-state fluorescence of SiO2@C-dot compounds was also investigated. More importantly, the fingermarks on various surfaces, including transparent glasses, ceramic tiles, transparent plastics, aluminum alloys, plastic cards, painted woods, artificial leathers, and Chinese paper money, developed by the powders have indicated well-defined papillary ridges under a 365 nm UV lamp. The novel strategy of using monodisperse SiO2@C-dot microspheres as a fluorescent label for developing latent fingermarks showed greater advantages compared to conventional methods, which was also demonstrated using the automatic fingerprint identification system. It is simple, rapid, low-cost, nontoxic, and effective, and is expected to be a promising alternative for the development of latent fingerprints in forensic science.
NASA Astrophysics Data System (ADS)
Prilianti, K. R.; Hariyanto, S.; Natali, F. D. D.; Indriatmoko, Adhiwibawa, M. A. S.; Limantara, L.; Brotosudarmo, T. H. P.
2016-04-01
The development of rapid and automatic pigment characterization method become an important issue due to the fact that there are only less than 1% of plant pigments in the earth have been explored. In this research, a mathematical model based on artificial intelligence approach was developed to simplify and accelerate pigment characterization process from HPLC (high-performance liquid chromatography) procedure. HPLC is a widely used technique to separate and identify pigments in a mixture. Input of the model is chromatographic data from HPLC device and output of the model is a list of pigments which is the spectrum pattern is discovered in it. This model provides two dimensional (retention time and wavelength) fingerprints for pigment characterization which is proven to be more accurate than one dimensional fingerprint (fixed wavelength). Moreover, by mimicking interconnection of the neuron in the nervous systems of the human brain, the model have learning ability that could be replacing expert judgement on evaluating spectrum pattern. In the preprocessing step, principal component analysis (PCA) was used to reduce the huge dimension of the chromatographic data. The aim of this step is to simplify the model and accelerate the identification process. Six photosynthetic pigments i.e. zeaxantin, pheophytin a, α-carotene, β-carotene, lycopene and lutein could be well identified by the model with accuracy up to 85.33% and processing time less than 1 second.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-1 General. (a) All automatically or... tests and inspections to evaluate the operation and reliability of controls, alarms, safety features...
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
28 CFR 901.2 - Interpretation of fingerprint submission requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Interpretation of fingerprint submission... FINGERPRINT SUBMISSION REQUIREMENTS § 901.2 Interpretation of fingerprint submission requirements. (a) Article V of the Compact requires the submission of fingerprints or other approved forms of positive...
28 CFR 901.3 - Approval of delayed fingerprint submission requests.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Approval of delayed fingerprint... COMPACT COUNCIL FINGERPRINT SUBMISSION REQUIREMENTS § 901.3 Approval of delayed fingerprint submission requests. (a) A state may, based upon exigent circumstances, apply for delayed submission of fingerprints...
28 CFR 901.3 - Approval of delayed fingerprint submission requests.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Approval of delayed fingerprint... COMPACT COUNCIL FINGERPRINT SUBMISSION REQUIREMENTS § 901.3 Approval of delayed fingerprint submission requests. (a) A state may, based upon exigent circumstances, apply for delayed submission of fingerprints...
28 CFR 901.2 - Interpretation of fingerprint submission requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Interpretation of fingerprint submission... FINGERPRINT SUBMISSION REQUIREMENTS § 901.2 Interpretation of fingerprint submission requirements. (a) Article V of the Compact requires the submission of fingerprints or other approved forms of positive...
28 CFR 901.2 - Interpretation of fingerprint submission requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Interpretation of fingerprint submission... FINGERPRINT SUBMISSION REQUIREMENTS § 901.2 Interpretation of fingerprint submission requirements. (a) Article V of the Compact requires the submission of fingerprints or other approved forms of positive...
28 CFR 901.2 - Interpretation of fingerprint submission requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Interpretation of fingerprint submission... FINGERPRINT SUBMISSION REQUIREMENTS § 901.2 Interpretation of fingerprint submission requirements. (a) Article V of the Compact requires the submission of fingerprints or other approved forms of positive...
28 CFR 901.2 - Interpretation of fingerprint submission requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Interpretation of fingerprint submission... FINGERPRINT SUBMISSION REQUIREMENTS § 901.2 Interpretation of fingerprint submission requirements. (a) Article V of the Compact requires the submission of fingerprints or other approved forms of positive...
28 CFR 901.3 - Approval of delayed fingerprint submission requests.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Approval of delayed fingerprint... COMPACT COUNCIL FINGERPRINT SUBMISSION REQUIREMENTS § 901.3 Approval of delayed fingerprint submission requests. (a) A state may, based upon exigent circumstances, apply for delayed submission of fingerprints...
28 CFR 901.3 - Approval of delayed fingerprint submission requests.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Approval of delayed fingerprint... COMPACT COUNCIL FINGERPRINT SUBMISSION REQUIREMENTS § 901.3 Approval of delayed fingerprint submission requests. (a) A state may, based upon exigent circumstances, apply for delayed submission of fingerprints...
28 CFR 901.3 - Approval of delayed fingerprint submission requests.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Approval of delayed fingerprint... COMPACT COUNCIL FINGERPRINT SUBMISSION REQUIREMENTS § 901.3 Approval of delayed fingerprint submission requests. (a) A state may, based upon exigent circumstances, apply for delayed submission of fingerprints...
Columnar-thin-film acquisition of fingerprint topology
NASA Astrophysics Data System (ADS)
Shaler, Robert C.; Lakhtakia, Akhlesh; Rogers, Jessica W.; Pulsifer, Drew P.; Martín-Palma, Raúl J.
2011-01-01
Fingerprint visualization obtained from physical evidence taken from crime scenes for subsequent comparison typically requires the use of physical and chemical techniques. One physical technique to visualize or develop sebaceous fingerprints on various surfaces employs the deposition of metals such as gold and zinc thereon. We have developed a different vacuum technology: the conformal-evaporated-film-by-rotation technique to deposit dense columnar thin films (CTFs) on latent fingerprints on different types of surfaces. Sample fingerprints, acting as nonplanar substrates, deposited on different surfaces were placed in a vacuum chamber with the fingerprint side facing a boat containing an evaporant material such as chalcogenide glass. Thermal evaporation of the solid material led to the formation of a dense CTF on the fingerprint, thereby capturing the topographical texture with high resolution. Our results show that it is possible to acquire the topology of latent fingerprints on nonporous surfaces. Additionally, deposition of CTFs on overlapping fingerprints suggested ours may be a technique for elucidating the sequence of deposition of the fingerprints at the scene.
Generation of DNA profiles from fingerprints developed with columnar thin film technique.
Plazibat, Stephanie L; Roy, Reena; Swiontek, Stephen E; Lakhtakia, Akhlesh
2015-12-01
Partial-bloody fingerprints and partial fingerprints with saliva are often encountered at crime scenes, potentially enabling the combination of fingerprint and DNA analyses for absolute identification, provided that the development technique for fingerprint analysis does not inhibit DNA analysis. 36 partial-bloody fingerprints and 30 fingerprints wetted with saliva, all deposited on brass, were first developed using the columnar-thin-film (CTF) technique and then subjected to short tandem repeat (STR) DNA analysis. Equal numbers of samples were subjected to the same DNA analysis without development. Tris (8-hydroxyquinolinato) aluminum, or Alq3, was evaporated to deposit CTFs for development of the prints. DNA was extracted from all 132 samples, quantified, and amplified with AmpFlSTR(®) Identifiler Plus Amplification Kit. Additionally, DNA analyses were conducted on four blood smears on un-fingerprinted brass that had been subjected to CTF deposition and four blood smears on un-fingerprinted brass that had not been subjected to CTF deposition. Complete and concordant autosomal STR profiles of the same quality were obtained from both undeveloped and CTF-developed fingerprints, indicating that CTF development of fingerprints preserves DNA and does not inhibit subsequent DNA analysis. Even when there were no fingerprints, CTF deposition did not lead to inhibition of DNA analysis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Fingerprint changes and verification failure among patients with hand dermatitis.
Lee, Chew Kek; Chang, Choong Chor; Johar, Asmah; Puwira, Othman; Roshidah, Baba
2013-03-01
To determine the prevalence of fingerprint verification failure and to define and quantify the fingerprint changes associated with fingerprint verification failure. Case-control study. Referral public dermatology center. The study included 100 consecutive patients with clinical hand dermatitis involving the palmar distal phalanx of either thumb and 100 age-, sex-, and ethnicity-matched controls. Patients with an altered thumb print due to other causes and palmar hyperhidrosis were excluded. Fingerprint verification(pass/fail) and hand eczema severity index score. Twenty-seven percent of patients failed fingerprint verification compared with 2% of controls. Fingerprint verification failure was associated with a higher hand eczema severity index score (P.001). The main fingerprint abnormalities were fingerprint dystrophy (42.0%) and abnormal white lines (79.5%). The number of abnormal white lines was significantly higher among the patients with hand dermatitis compared with controls(P=.001). Among the patients with hand dermatitis, theodds of failing fingerprint verification with fingerprint dystrophy was 4.01. The presence of broad lines and long lines was associated with a greater odds of fingerprint verification failure (odds ratio [OR], 8.04; 95% CI, 3.56-18.17 and OR, 2.37; 95% CI, 1.31-4.27, respectively),while the presence of thin lines was protective of verification failure (OR, 0.45; 95% CI, 0.23-0.89). Fingerprint verification failure is a significant problem among patients with more severe hand dermatitis. It is mainly due to fingerprint dystrophy and abnormal white lines. Malaysian National Medical Research Register Identifier: NMRR-11-30-8226
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Fred S.; Andresen, Brian D.
1999-09-21
A fingerprint medium which is made of an aerogel having a predetermined density. The fingerprint medium may have a midrange density for forming plates or may be crushed forming a powder. The fingerprint medium may further include at least one of a metal and metal oxide to enhance characteristics desirable in a fingerprint medium.
8 CFR 236.5 - Fingerprints and photographs.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... by service of a notice to appear shall be fingerprinted and photographed. Such fingerprints and...
8 CFR 236.5 - Fingerprints and photographs.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... by service of a notice to appear shall be fingerprinted and photographed. Such fingerprints and...
8 CFR 236.5 - Fingerprints and photographs.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... by service of a notice to appear shall be fingerprinted and photographed. Such fingerprints and...
8 CFR 236.5 - Fingerprints and photographs.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... by service of a notice to appear shall be fingerprinted and photographed. Such fingerprints and...
8 CFR 236.5 - Fingerprints and photographs.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... by service of a notice to appear shall be fingerprinted and photographed. Such fingerprints and...
Fingerprint separation: an application of ICA
NASA Astrophysics Data System (ADS)
Singh, Meenakshi; Singh, Deepak Kumar; Kalra, Prem Kumar
2008-04-01
Among all existing biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Fingerprint-based identification is the most recognized tool in biometrics because of its reliability and accuracy. Fingerprint identification is done by matching questioned and known friction skin ridge impressions from fingers, palms, and toes to determine if the impressions are from the same finger (or palm, toe, etc.). There are many fingerprint matching algorithms which automate and facilitate the job of fingerprint matching, but for any of these algorithms matching can be difficult if the fingerprints are overlapped or mixed. In this paper, we have proposed a new algorithm for separating overlapped or mixed fingerprints so that the performance of the matching algorithms will improve when they are fed with these inputs. Independent Component Analysis (ICA) has been used as a tool to separate the overlapped or mixed fingerprints.
Localized Dictionaries Based Orientation Field Estimation for Latent Fingerprints.
Xiao Yang; Jianjiang Feng; Jie Zhou
2014-05-01
Dictionary based orientation field estimation approach has shown promising performance for latent fingerprints. In this paper, we seek to exploit stronger prior knowledge of fingerprints in order to further improve the performance. Realizing that ridge orientations at different locations of fingerprints have different characteristics, we propose a localized dictionaries-based orientation field estimation algorithm, in which noisy orientation patch at a location output by a local estimation approach is replaced by real orientation patch in the local dictionary at the same location. The precondition of applying localized dictionaries is that the pose of the latent fingerprint needs to be estimated. We propose a Hough transform-based fingerprint pose estimation algorithm, in which the predictions about fingerprint pose made by all orientation patches in the latent fingerprint are accumulated. Experimental results on challenging latent fingerprint datasets show the proposed method outperforms previous ones markedly.