Sample records for fingerprint authentication system

  1. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  2. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  3. A network identity authentication system based on Fingerprint identification technology

    NASA Astrophysics Data System (ADS)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  4. Optimization of illuminating system to detect optical properties inside a finger

    NASA Astrophysics Data System (ADS)

    Sano, Emiko; Shikai, Masahiro; Shiratsuki, Akihide; Maeda, Takuji; Matsushita, Masahito; Sasakawa, Koichi

    2007-01-01

    Biometrics performs personal authentication using individual bodily features including fingerprints, faces, etc. These technologies have been studied and developed for many years. In particular, fingerprint authentication has evolved over many years, and fingerprinting is currently one of world's most established biometric authentication techniques. Not long ago this technique was only used for personal identification in criminal investigations and high-security facilities. In recent years, however, various biometric authentication techniques have appeared in everyday applications. Even though providing great convenience, they have also produced a number of technical issues concerning operation. Generally, fingerprint authentication is comprised of a number of component technologies: (1) sensing technology for detecting the fingerprint pattern; (2) image processing technology for converting the captured pattern into feature data that can be used for verification; (3) verification technology for comparing the feature data with a reference and determining whether it matches. Current fingerprint authentication issues, revealed in research results, originate with fingerprint sensing technology. Sensing methods for detecting a person's fingerprint pattern for image processing are particularly important because they impact overall fingerprint authentication performance. The following are the current problems concerning sensing methods that occur in some cases: Some fingers whose fingerprints used to be difficult to detect by conventional sensors. Fingerprint patterns are easily affected by the finger's surface condition, such noise as discontinuities and thin spots can appear in fingerprint patterns obtained from wrinkled finger, sweaty finger, and so on. To address these problems, we proposed a novel fingerprint sensor based on new scientific knowledge. A characteristic of this new method is that obtained fingerprint patterns are not easily affected by the finger's surface condition because it detects the fingerprint pattern inside the finger using transmitted light. We examined optimization of illumination system of this novel fingerprint sensor to detect contrasty fingerprint pattern from wide area and to improve image processing at (2).

  5. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    NASA Astrophysics Data System (ADS)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  6. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    PubMed Central

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  7. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  8. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  9. Capturing Cognitive Fingerprints for Active Authentication

    DTIC Science & Technology

    2014-10-01

    CAPTURING COGNITIVE FINGERPRINTS FOR ACTIVE AUTHENTICATION IOWA STATE UNIVERSITY OF SCIENCE & TECHNOLOGY OCTOBER 2014 FINAL TECHNICAL REPORT...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) SEP 2013 – APR 2014 4. TITLE AND SUBTITLE CAPTURING COGNITIVE FINGERPRINTS FOR ACTIVE...The project ended before the IRB application was approved. 15. SUBJECT TERMS Active Authentication, Cognitive Fingerprints , Biometric Modalities

  10. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    NASA Astrophysics Data System (ADS)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  11. Capturing Cognitive Processing Time for Active Authentication

    DTIC Science & Technology

    2014-02-01

    cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...2 3.1 Cognitive Fingerprint Description...brief to capture a “ cognitive fingerprint .” In the current keystroke-authentication commercial market, some products combine the timing information of

  12. Screen Fingerprints as a Novel Modality for Active Authentication

    DTIC Science & Technology

    2014-03-01

    and mouse dynamics [9]. Some other examples of the computational behavior metrics of the cognitive fingerprint include eye tracking, how Approved...SCREEN FINGERPRINTS AS A NOVEL MODALITY FOR ACTIVE AUTHENTICATION UNIVERSITY OF MARYLAND MARCH 2014 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC...COVERED (From - To) MAY 2012 – OCT 2013 4. TITLE AND SUBTITLE SCREEN FINGERPRINTS AS A NOVEL MODALITY FOR ACTIVE AUTHENTICATION 5a. CONTRACT

  13. Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems

    NASA Astrophysics Data System (ADS)

    Riley, Chris; Johnson, Graham; McCracken, Heather; Al-Saffar, Ahmed

    Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diverse range of contexts from immigration control, to banking and personal computing. As is often the case with emerging technologies, the usability aspects of system design have received less attention than technical aspects. Fingerprint systems pose a number of challenges for users and past research has identified issues with correct finger placement, system feedback and instruction. This paper describes the development of an interface for fingerprint systems using an iterative, participative design approach. During this process, several different methods for the presentation of instruction and feedback were identified. The different types of instruction and feedback were tested in a study involving 82 participants. The results showed that feedback had a statistically significant effect on overall system performance, but instruction did not. The design recommendations emerging from this study, and the use of participatory design in this context, are discussed.

  14. Evaluating authentication options for mobile health applications in younger and older adults

    PubMed Central

    Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G.; Vogel, Daniel; Gebotys, Robert; Yang, Jilan

    2018-01-01

    Objective Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Methodology Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). Results A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability. PMID:29300736

  15. Evaluating authentication options for mobile health applications in younger and older adults.

    PubMed

    Grindrod, Kelly; Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G; Vogel, Daniel; Gebotys, Robert; Yang, Jilan

    2018-01-01

    Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability.

  16. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems.

    PubMed

    Snelick, Robert; Uludag, Umut; Mink, Alan; Indovina, Michael; Jain, Anil

    2005-03-01

    We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. The majority of prior studies of multimodal biometrics have been limited to relatively low accuracy non-COTS systems and populations of a few hundred users. Our work is the first to demonstrate that multimodal fingerprint and face biometric systems can achieve significant accuracy gains over either biometric alone, even when using highly accurate COTS systems on a relatively large-scale population. In addition to examining well-known multimodal methods, we introduce new methods of normalization and fusion that further improve the accuracy.

  17. Vein matching using artificial neural network in vein authentication systems

    NASA Astrophysics Data System (ADS)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  18. Gabor filter based fingerprint image enhancement

    NASA Astrophysics Data System (ADS)

    Wang, Jin-Xiang

    2013-03-01

    Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.

  19. Influence of Skin Diseases on Fingerprint Recognition

    PubMed Central

    Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon

    2012-01-01

    There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described. PMID:22654483

  20. Influence of skin diseases on fingerprint recognition.

    PubMed

    Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon

    2012-01-01

    There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described.

  1. Chromatographic fingerprinting: An innovative approach for food 'identitation' and food authentication - A tutorial.

    PubMed

    Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio

    2016-02-25

    Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Experimental evaluation of fingerprint verification system based on double random phase encoding

    NASA Astrophysics Data System (ADS)

    Suzuki, Hiroyuki; Yamaguchi, Masahiro; Yachida, Masuyoshi; Ohyama, Nagaaki; Tashima, Hideaki; Obi, Takashi

    2006-03-01

    We proposed a smart card holder authentication system that combines fingerprint verification with PIN verification by applying a double random phase encoding scheme. In this system, the probability of accurate verification of an authorized individual reduces when the fingerprint is shifted significantly. In this paper, a review of the proposed system is presented and preprocessing for improving the false rejection rate is proposed. In the proposed method, the position difference between two fingerprint images is estimated by using an optimized template for core detection. When the estimated difference exceeds the permissible level, the user inputs the fingerprint again. The effectiveness of the proposed method is confirmed by a computational experiment; its results show that the false rejection rate is improved.

  3. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    PubMed Central

    Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. PMID:25873989

  4. A fingerprint encryption scheme based on irreversible function and secure authentication.

    PubMed

    Yang, Yijun; Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  5. A novel secret sharing with two users based on joint transform correlator and compressive sensing

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Chi, Yingying

    2018-05-01

    Recently, joint transform correlator (JTC) has been widely applied to image encryption and authentication. This paper presents a novel secret sharing scheme with two users based on JTC. Two users must be present during the decryption that the system has high security and reliability. In the scheme, two users use their fingerprints to encrypt plaintext, and they can decrypt only if both of them provide the fingerprints which are successfully authenticated. The linear relationship between the plaintext and ciphertext is broken using the compressive sensing, which can resist existing attacks on JTC. The results of the theoretical analysis and numerical simulation confirm the validity of the system.

  6. A robust and non-invertible fingerprint template for fingerprint matching system.

    PubMed

    Trivedi, Amit Kumar; Thounaojam, Dalton Meitei; Pal, Shyamosree

    2018-05-20

    Fingerprint Recognition System is widely deployed in variety of application domain, ranging from forensic to mobile phones. Its widespread deployment in various applications were person authentication are required, has caused concern that a leaked fingerprint template may be used to reconstruct the original fingerprint and the reconstructed fingerprint can be used to circumvent all the applications the person is enrolled. In this paper, a non-invertible fingerprint template that stores only the relative geometric information about the minutiae points is proposed. The spatial location of the minutiae points in original fingerprint and its orientations are not available in the proposed template which makes it impossible to estimate the orientation of fingerprint from the template. The proposed template is invariant to rotation, translation and distortion and immune to reconstruction algorithm. The proposed system is experimented using standard FVC2000 database and yields better results in terms of EER and FMR as compared with latest techniques. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  8. Hierarchical minutiae matching for fingerprint and palmprint identification.

    PubMed

    Chen, Fanglin; Huang, Xiaolin; Zhou, Jie

    2013-12-01

    Fingerprints and palmprints are the most common authentic biometrics for personal identification, especially for forensic security. Previous research have been proposed to speed up the searching process in fingerprint and palmprint identification systems, such as those based on classification or indexing, in which the deterioration of identification accuracy is hard to avert. In this paper, a novel hierarchical minutiae matching algorithm for fingerprint and palmprint identification systems is proposed. This method decomposes the matching step into several stages and rejects many false fingerprints or palmprints on different stages, thus it can save much time while preserving a high identification rate. Experimental results show that the proposed algorithm can save almost 50% searching time compared with traditional methods and illustrate its effectiveness.

  9. GNSS Receiver Identification Using Clock-Derived Metrics.

    PubMed

    Borio, Daniele; Gioia, Ciro; Cano Pons, Eduardo; Baldini, Gianmarco

    2017-09-15

    Falsifying Global Navigation Satellite System (GNSS) data with a simulator or with a fake receiver can have a significant economic or safety impact in many transportation applications where Position, Velocity and Time (PVT) are used to enforce a regulation. In this context, the authentication of the source of the PVT data (i.e., the GNSS receiver) is a requirement since data faking can become a serious threat. Receiver fingerprinting techniques represent possible countermeasures to verify the authenticity of a GNSS receiver and of its data. Herein, the potential of clock-derived metrics for GNSS receiver fingerprinting is investigated, and a filter approach is implemented for feature selection. Novel experimental results show that three intrinsic features are sufficient to identify a receiver. Moreover, the adopted technique is time effective as data blocks of about 40 min are sufficient to produce stable features for fingerprinting.

  10. Developing a multimodal biometric authentication system using soft computing methods.

    PubMed

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  11. A novel hand-type detection technique with fingerprint sensor

    NASA Astrophysics Data System (ADS)

    Abe, Narishige; Shinzaki, Takashi

    2013-05-01

    In large-scale biometric authentication systems such as the US-Visit (USA), a 10-fingerprints scanner which simultaneously captures four fingerprints is used. In traditional systems, specific hand-types (left or right) are indicated, but it is difficult to detect hand-type due to the hand rotation and the opening and closing of fingers. In this paper, we evaluated features that were extracted from hand images (which were captured by a general optical scanner) that are considered to be effective for detecting hand-type. Furthermore, we extended the knowledge to real fingerprint images, and evaluated the accuracy with which it detects hand-type. We obtained an accuracy of about 80% with only three fingers (index, middle, ring finger).

  12. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  13. Online fingerprint verification.

    PubMed

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  14. Fingerprint analysis of Ginkgo biloba leaves and related health foods by high-performance liquid chromatography/electrospray ionization-mass spectrometry.

    PubMed

    Song, Jiajia; Fang, Guozhen; Zhang, Yan; Deng, Qiliang; Wang, Shuo

    2010-01-01

    A fingerprint analysis method was developed for Ginkgo biloba leaves and was successfully used for quality evaluation of related health foods by HPLC with electrospray ionization MS. Fifteen samples of G. biloba leaves, which were collected from 15 different locations in China, were analyzed and identified in this study. By both peak analysis and similarity analysis of the fingerprint chromatograms, variation of constituents was easily observed in the leaves from different sources. By comparison with batches of authentic leaves, the authenticity, and quality consistency of related health foods in different matrixes were effectively estimated. It is important to mention that studying a wide range of authentic leaves from various habitats made the quality evaluation of commercial products more convincing and reasonable. The fingerprint-based strategy of the developed method should provide improved QC of G. biloba leaves and products.

  15. Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

    PubMed Central

    Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729

  16. Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

    PubMed

    Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  17. Hardware device to physical structure binding and authentication

    DOEpatents

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  18. Digital holographic-based cancellable biometric for personal authentication

    NASA Astrophysics Data System (ADS)

    Verma, Gaurav; Sinha, Aloka

    2016-05-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%.

  19. Short tandem repeat DNA typing provides an international reference standard for authentication of human cell lines.

    PubMed

    Dirks, Wilhelm Gerhard; Faehnrich, Silke; Estella, Isabelle Annick Janine; Drexler, Hans Guenter

    2005-01-01

    Cell lines have wide applications as model systems in the medical and pharmaceutical industry. Much drug and chemical testing is now first carried out exhaustively on in vitro systems, reducing the need for complicated and invasive animal experiments. The basis for any research, development or production program involving cell lines is the choice of an authentic cell line. Microsatellites in the human genome that harbour short tandem repeat (STR) DNA markers allow individualisation of established cell lines at the DNA level. Fluorescence polymerase chain reaction amplification of eight highly polymorphic microsatellite STR loci plus gender determination was found to be the best tool to screen the uniqueness of DNA profiles in a fingerprint database. Our results demonstrate that cross-contamination and misidentification remain chronic problems in the use of human continuous cell lines. The combination of rapidly generated DNA types based on single-locus STR and their authentication or individualisation by screening the fingerprint database constitutes a highly reliable and robust method for the identification and verification of cell lines.

  20. Hand veins feature extraction using DT-CNNS

    NASA Astrophysics Data System (ADS)

    Malki, Suleyman; Spaanenburg, Lambert

    2007-05-01

    As the identification process is based on the unique patterns of the users, biometrics technologies are expected to provide highly secure authentication systems. The existing systems using fingerprints or retina patterns are, however, very vulnerable. One's fingerprints are accessible as soon as the person touches a surface, while a high resolution camera easily captures the retina pattern. Thus, both patterns can easily be "stolen" and forged. Beside, technical considerations decrease the usability for these methods. Due to the direct contact with the finger, the sensor gets dirty, which decreases the authentication success ratio. Aligning the eye with a camera to capture the retina pattern gives uncomfortable feeling. On the other hand, vein patterns of either a palm of the hand or a single finger offer stable, unique and repeatable biometrics features. A fingerprint-based identification system using Cellular Neural Networks has already been proposed by Gao. His system covers all stages of a typical fingerprint verification procedure from Image Preprocessing to Feature Matching. This paper performs a critical review of the individual algorithmic steps. Notably, the operation of False Feature Elimination is applied only once instead of 3 times. Furthermore, the number of iterations is limited to 1 for all used templates. Hence, the computational need of the feedback contribution is removed. Consequently the computational effort is drastically reduced without a notable chance in quality. This allows a full integration of the detection mechanism. The system is prototyped on a Xilinx Virtex II Pro P30 FPGA.

  1. Personal Identification Using Fingernail Image Based on Correlation of Density Block

    NASA Astrophysics Data System (ADS)

    Noda, Mayumi; Saitoh, Fumihiko

    This paper proposes an authentication using fingernail images by using the block segmentation matching. A fingernail is assumed to be a new physical character that is used for biometrics authentication. The proposed system is more effective than fingerprint authentication where psychological resistance and conformability are required. Since the block segmentation matching is useful for occlusion of an object, it is assumed to be robust to a partial change of fingernail. It is expected to enhance the difference of fingernails between persons. The experimental images of various lengths of fingernail and painted manicure were used for evaluation of system performance. The experimental results show that the proposed system obtains the sufficient accuracy to certificate individuals.

  2. Authentication of Piper betle L. folium and quantification of their antifungal-activity.

    PubMed

    Wirasuta, I Made Agus Gelgel; Srinadi, I Gusti Ayu Made; Dwidasmara, Ida Bagus Gede; Ardiyanti, Ni Luh Putu Putri; Trisnadewi, I Gusti Ayu Arya; Paramita, Ni Luh Putu Vidya

    2017-07-01

    The TLC profiles of intra- and inter-day precision for Piper betle L . (PBL) folium methanol extract was studied for their peak marker recognition and identification. The Numerical chromatographic parameters (NCPs) of the peak markers, the hierarchical clustering analysis (HCA) and the principal component analysis (PCA) were applied to authenticate the PBL. folium extract from other Piper species folium extract and to ensure the antifungal activity quality of the PBL essential oil. The spotted extract was developed with the mobile phase of toluene: ethyl acetate; 93:7, (v/v). The eluted plate was viewed with the TLC-Visualizer, scanned under absorption and fluorescent mode detection, and on each sample the in-situ UV spectra were recorded between 190 to 400 nm. The NCPs profiles of intra- and inter-day precision results offered multi-dimensional chromatogram fingerprints for better marker peak pattern recognition and identification. Using the r -value fingerprints data series generated with this method allowed more precise discrimination the PBL. from other Piper species compared to the marker peak area fingerprint method. The cosine pair comparison was a simple method for authentication of two different fingerprints. The ward linkage clustering and the pair cross-correlation comparison were better chemometric methods to determine the consistency peak area ratio between fingerprints. The first component PCA-loading values of peak marker area fingerprints were correlated linearly to both the bio-marker concentration as well as the antifungal activity. This relationship could be used to control the quality and pharmacological potency. This simple method was developed for the authentication and quantification of herbal medicine.

  3. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    PubMed

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  4. DNA Fingerprinting of Chinese Melon Provides Evidentiary Support of Seed Quality Appraisal

    PubMed Central

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications. PMID:23285039

  5. Multiple fingerprinting analyses in quality control of Cassiae Semen polysaccharides.

    PubMed

    Cheng, Jing; He, Siyu; Wan, Qiang; Jing, Pu

    2018-03-01

    Quality control issue overshadows potential health benefits of Cassiae Semen due to the analytic limitations. In this study, multiple-fingerprint analysis integrated with several chemometrics was performed to assess the polysaccharide quality of Cassiae Semen harvested from different locations. FT-IR, HPLC, and GC fingerprints of polysaccharide extracts from the authentic source were established as standard profiles, applying to assess the quality of foreign sources. Analyses of FT-IR fingerprints of polysaccharide extracts using either Pearson correlation analysis or principal component analysis (PCA), or HPLC fingerprints of partially hydrolyzed polysaccharides with PCA, distinguished the foreign sources from the authentic source. However, HPLC or GC fingerprints of completely hydrolyzed polysaccharides couldn't identify all foreign sources and the methodology using GC is quite limited in determining the monosaccharide composition. This indicates that FT-IR/HPLC fingerprints of non/partially-hydrolyzed polysaccharides, respectively, accompanied by multiple chemometrics methods, might be potentially applied in detecting and differentiating sources of Cassiae Semen. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. HPTLC Fingerprint Analysis: A Quality Control for Authentication of Herbal Phytochemicals

    NASA Astrophysics Data System (ADS)

    Ram, Mauji; Abdin, M. Z.; Khan, M. A.; Jha, Prabhakar

    Authentication and consistent quality are the basic requirement for Indian traditional medicine (TIM), Chinese traditional herbal medicine (TCHM), and their commercial products, regardless of the kind of research conducted to modernize the TIM and TCHM. The complexities of TIM and TCHM challenge the current official quality control mode, for which only a few biochemical markers were selected for identification and quantitative assay. Referring too many unknown factors existed in TIM and TCHM, it is impossible and unnecessary to pinpoint qualitatively and quantitatively every single component contained in the herbal drug. Chromatographic fingerprint is a rational option to meet the need for more effective and powerful quality assessment to TIM and TCHM. The optimized chromatographic fingerprint is not only an alternative analytical tool for authentication, but also an approach to express the various pattern of chemical ingredients distribution in the herbal drugs and preserve such "database" for further multifaced sustainable studies. Analytical separation techniques, for example, high-performance liquid chromatography (HPLC), gas chromatography (GC) and mass spectrometry (MS) were among the most popular methods of choice used for quality control of raw material and finished herbal product. Fingerprint analysis approach using high-performance thin-layer chromatography (HPTLC) has become the most potent tool for quality control of herbal medicines because of its simplicity and reliability. It can serve as a tool for identification, authentication, and quality control of herbal drugs. In this chapter, attempts are being made to expand the use of HPTLC and at the same time create interest among prospective researcher in herbal analysis. The developed method can be used as a quality control tool for rapid authentication from a wide variety of herbal samples. Some examples demonstrated the role of fingerprinting in quality control and assessment.

  7. Differentiation of organic and non-organic winter wheat cultivars from a controlled field trial by crystallization patterns.

    PubMed

    Kahl, Johannes; Busscher, Nicolaas; Mergardt, Gaby; Mäder, Paul; Torp, Torfinn; Ploeger, Angelika

    2015-01-01

    There is a need for authentication tools in order to verify the existing certification system. Recently, markers for analytical authentication of organic products were evaluated. Herein, crystallization with additives was described as an interesting fingerprint approach which needs further evidence, based on a standardized method and well-documented sample origin. The fingerprint of wheat cultivars from a controlled field trial is generated from structure analysis variables of crystal patterns. Method performance was tested on factors such as crystallization chamber, day of experiment and region of interest of the patterns. Two different organic treatments and two different treatments of the non-organic regime can be grouped together in each of three consecutive seasons. When the k-nearest-neighbor classification method was applied, approximately 84% of Runal samples and 95% of Titlis samples were classified correctly into organic and non-organic origin using cross-validation. Crystallization with additive offers an interesting complementary fingerprint method for organic wheat samples. When the method is applied to winter wheat from the DOK trial, organic and non-organic treated samples can be differentiated significantly based on pattern recognition. Therefore crystallization with additives seems to be a promising tool in organic wheat authentication. © 2014 Society of Chemical Industry.

  8. [Identification of the authentic quality of Longdanxiegan pill by systematic quantified fingerprint method based on three wavelength fusion chromatogram].

    PubMed

    Sun, Guoxiang; Zhang, Jingxian

    2009-05-01

    The three wavelength fusion high performance liquid chromatographic fingerprin (TWFFP) of Longdanxiegan pill (LDXGP) was established to identify the quality of LDXGP by the systematic quantified fingerprint method. The chromatographic fingerprints (CFPs) of the 12 batches of LDXGP were determined by reversed-phase high performance liquid chromatography. The technique of multi-wavelength fusion fingerprint was applied during processing the fingerprints. The TWFFPs containing 63 co-possessing peaks were obtained when choosing baicalin peak as the referential peak. The 12 batches of LDXGP were identified with hierarchical clustering analysis by using macro qualitative similarity (S(m)) as the variable. According to the results of classification, the referential fingerprint (RFP) was synthesized from 10 batches of LDXGP. Taking the RFP for the qualified model, all the 12 batches of LDXGP were evaluated by the systematic quantified fingerprint method. Among the 12 batches of LDXGP, 9 batches were completely qualified, the contents of 1 batch were obviously higher while the chemical constituents quantity and distributed proportion in 2 batches were not qualified. The systematic quantified fingerprint method based on the technique of multi-wavelength fusion fingerprint ca effectively identify the authentic quality of traditional Chinese medicine.

  9. Secure Biometric Multi-Logon System Based on Current Authentication Technologies

    NASA Astrophysics Data System (ADS)

    Tait, Bobby L.

    The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

  10. Review of validation and reporting of non-targeted fingerprinting approaches for food authentication.

    PubMed

    Riedl, Janet; Esslinger, Susanne; Fauhl-Hassek, Carsten

    2015-07-23

    Food fingerprinting approaches are expected to become a very potent tool in authentication processes aiming at a comprehensive characterization of complex food matrices. By non-targeted spectrometric or spectroscopic chemical analysis with a subsequent (multivariate) statistical evaluation of acquired data, food matrices can be investigated in terms of their geographical origin, species variety or possible adulterations. Although many successful research projects have already demonstrated the feasibility of non-targeted fingerprinting approaches, their uptake and implementation into routine analysis and food surveillance is still limited. In many proof-of-principle studies, the prediction ability of only one data set was explored, measured within a limited period of time using one instrument within one laboratory. Thorough validation strategies that guarantee reliability of the respective data basis and that allow conclusion on the applicability of the respective approaches for its fit-for-purpose have not yet been proposed. Within this review, critical steps of the fingerprinting workflow were explored to develop a generic scheme for multivariate model validation. As a result, a proposed scheme for "good practice" shall guide users through validation and reporting of non-targeted fingerprinting results. Furthermore, food fingerprinting studies were selected by a systematic search approach and reviewed with regard to (a) transparency of data processing and (b) validity of study results. Subsequently, the studies were inspected for measures of statistical model validation, analytical method validation and quality assurance measures. In this context, issues and recommendations were found that might be considered as an actual starting point for developing validation standards of non-targeted metabolomics approaches for food authentication in the future. Hence, this review intends to contribute to the harmonization and standardization of food fingerprinting, both required as a prior condition for the authentication of food in routine analysis and official control. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Separation of high-resolution samples of overlapping latent fingerprints using relaxation labeling

    NASA Astrophysics Data System (ADS)

    Qian, Kun; Schott, Maik; Schöne, Werner; Hildebrandt, Mario

    2012-06-01

    The analysis of latent fingerprint patterns generally requires clearly recognizable friction ridge patterns. Currently, overlapping latent fingerprints pose a major problem for traditional crime scene investigation. This is due to the fact that these fingerprints usually have very similar optical properties. Consequently, the distinction of two or more overlapping fingerprints from each other is not trivially possible. While it is possible to employ chemical imaging to separate overlapping fingerprints, the corresponding methods require sophisticated fingerprint acquisition methods and are not compatible with conventional forensic fingerprint data. A separation technique that is purely based on the local orientation of the ridge patterns of overlapping fingerprints is proposed by Chen et al. and quantitatively evaluated using off-the-shelf fingerprint matching software with mostly artificially composed overlapping fingerprint samples, which is motivated by the scarce availability of authentic test samples. The work described in this paper adapts the approach presented by Chen et al. for its application on authentic high resolution fingerprint samples acquired by a contactless measurement device based on a Chromatic White Light (CWL) sensor. An evaluation of the work is also given, with the analysis of all adapted parameters. Additionally, the separability requirement proposed by Chen et al. is also evaluated for practical feasibility. Our results show promising tendencies for the application of this approach on high-resolution data, yet the separability requirement still poses a further challenge.

  12. Authentication of commercial spices based on the similarities between gas chromatographic fingerprints.

    PubMed

    Matsushita, Takaya; Zhao, Jing Jing; Igura, Noriyuki; Shimoda, Mitsuya

    2018-06-01

    A simple and solvent-free method was developed for the authentication of commercial spices. The similarities between gas chromatographic fingerprints were measured using similarity indices and multivariate data analyses, as morphological differentiation between dried powders and small spice particles was challenging. The volatile compounds present in 11 spices (i.e. allspice, anise, black pepper, caraway, clove, coriander, cumin, dill, fennel, star anise, and white pepper) were extracted by headspace solid-phase microextraction, and analysed by gas chromatography-mass spectrometry. The largest 10 peaks were selected from each total ion chromatogram, and a total of 65 volatiles were tentatively identified. The similarity indices (i.e. the congruence coefficients) were calculated using the data matrices of the identified compound relative peak areas to differentiate between two sets of fingerprints. Where pairs of similar fingerprints produced high congruence coefficients (>0.80), distinctive volatile markers were employed to distinguish between these samples. In addition, hierarchical cluster analysis and principal component analysis were performed to visualise the similarity among fingerprints, and the analysed spices were grouped and characterised according to their distinctive major components. This method is suitable for screening unknown spices, and can therefore be employed to evaluate the quality and authenticity of various spices. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  13. Systematic review for geo-authentic Lonicerae Japonicae Flos.

    PubMed

    Yang, Xingyue; Liu, Yali; Hou, Aijuan; Yang, Yang; Tian, Xin; He, Liyun

    2017-06-01

    In traditional Chinese medicine, Lonicerae Japonicae Flos is commonly used as anti-inflammatory, antiviral, and antipyretic herbal medicine, and geo-authentic herbs are believed to present the highest quality among all samples from different regions. To discuss the current situation and trend of geo-authentic Lonicerae Japonicae Flos, we searched Chinese Biomedicine Literature Database, Chinese Journal Full-text Database, Chinese Scientific Journal Full-text Database, Cochrane Central Register of Controlled Trials, Wanfang, and PubMed. We investigated all studies up to November 2015 pertaining to quality assessment, discrimination, pharmacological effects, planting or processing, or ecological system of geo-authentic Lonicerae Japonicae Flos. Sixty-five studies mainly discussing about chemical fingerprint, component analysis, planting and processing, discrimination between varieties, ecological system, pharmacological effects, and safety were systematically reviewed. By analyzing these studies, we found that the key points of geo-authentic Lonicerae Japonicae Flos research were quality and application. Further studies should focus on improving the quality by selecting the more superior of all varieties and evaluating clinical effectiveness.

  14. Application of gas chromatography/flame ionization detector-based metabolite fingerprinting for authentication of Asian palm civet coffee (Kopi Luwak).

    PubMed

    Jumhawan, Udi; Putri, Sastia Prama; Yusianto; Bamba, Takeshi; Fukusaki, Eiichiro

    2015-11-01

    Development of authenticity screening for Asian palm civet coffee, the world-renowned priciest coffee, was previously reported using metabolite profiling through gas chromatography/mass spectrometry (GC/MS). However, a major drawback of this approach is the high cost of the instrument and maintenance. Therefore, an alternative method is needed for quality and authenticity evaluation of civet coffee. A rapid, reliable and cost-effective analysis employing a universal detector, GC coupled with flame ionization detector (FID), and metabolite fingerprinting has been established for discrimination analysis of 37 commercial and non-commercial coffee beans extracts. gas chromatography/flame ionization detector (GC/FID) provided higher sensitivity over a similar range of detected compounds than GC/MS. In combination with multivariate analysis, GC/FID could successfully reproduce quality prediction from GC/MS for differentiation of commercial civet coffee, regular coffee and coffee blend with 50 wt % civet coffee content without prior metabolite details. Our study demonstrated that GC/FID-based metabolite fingerprinting can be effectively actualized as an alternative method for coffee authenticity screening in industries. Copyright © 2015. Published by Elsevier B.V.

  15. Authentication of Trappist beers by LC-MS fingerprints and multivariate data analysis.

    PubMed

    Mattarucchi, Elia; Stocchero, Matteo; Moreno-Rojas, José Manuel; Giordano, Giuseppe; Reniero, Fabiano; Guillou, Claude

    2010-12-08

    The aim of this study was to asses the applicability of LC-MS profiling to authenticate a selected Trappist beer as part of a program on traceability funded by the European Commission. A total of 232 beers were fingerprinted and classified through multivariate data analysis. The selected beer was clearly distinguished from beers of different brands, while only 3 samples (3.5% of the test set) were wrongly classified when compared with other types of beer of the same Trappist brewery. The fingerprints were further analyzed to extract the most discriminating variables, which proved to be sufficient for classification, even using a simplified unsupervised model. This reduced fingerprint allowed us to study the influence of batch-to-batch variability on the classification model. Our results can easily be applied to different matrices and they confirmed the effectiveness of LC-MS profiling in combination with multivariate data analysis for the characterization of food products.

  16. Practical Pocket PC Application w/Biometric Security

    NASA Technical Reports Server (NTRS)

    Logan, Julian

    2004-01-01

    I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

  17. Clone-preventive technique that features magnetic microfibers and cryptography

    NASA Astrophysics Data System (ADS)

    Matsumoto, Hiroyuki; Suzuki, Keiichi; Matsumoto, Tsutomu

    1998-04-01

    We have used the term 'clone' to refer to those things which are produced by methods such as counterfeiting, alteration, duplication or simulation. To satisfy the requirements of secure and low-cost techniques for preventing card fraud, we have recently developed a clone preventive system called 'FibeCrypt (Fiber Cryptosystem)' which utilizes physical characteristics. Each card has a canonical domain (i.e. a distinctive part), similar to fingerprints as the biometric measurement, made up of magnetic micro-fibers scattered randomly inside. We have applied cryptosystems to the system. FibeCrypt examines and authenticates the unique pattern of the canonical domain using pre-stored reference data and a digital signature. In our paper, the schemes and the features of this system are described in detail. The results of our examinations show the accuracy of authentication of the system. We conclude that this authentication technique which utilizes physical characteristics can be very effective for clone prevention in various fields.

  18. An Authentic RFLP Lab for High School or College Biology Students.

    ERIC Educational Resources Information Center

    Guilfoile, Patrick G.; Plum, Stephen

    1998-01-01

    Explains how students can perform an alternative authentic DNA fingerprinting analysis. Presents restriction fragment length polymorphism (RFLP) analysis and can serve as a simulated molecular epidemiology laboratory or as a simulated forensic laboratory exercise. (DDR)

  19. Accurate determination of genetic identity for a single cacao bean, using molecular markers with a nanofluidic system, ensures cocoa authentication.

    PubMed

    Fang, Wanping; Meinhardt, Lyndel W; Mischke, Sue; Bellato, Cláudia M; Motilal, Lambert; Zhang, Dapeng

    2014-01-15

    Cacao (Theobroma cacao L.), the source of cocoa, is an economically important tropical crop. One problem with the premium cacao market is contamination with off-types adulterating raw premium material. Accurate determination of the genetic identity of single cacao beans is essential for ensuring cocoa authentication. Using nanofluidic single nucleotide polymorphism (SNP) genotyping with 48 SNP markers, we generated SNP fingerprints for small quantities of DNA extracted from the seed coat of single cacao beans. On the basis of the SNP profiles, we identified an assumed adulterant variety, which was unambiguously distinguished from the authentic beans by multilocus matching. Assignment tests based on both Bayesian clustering analysis and allele frequency clearly separated all 30 authentic samples from the non-authentic samples. Distance-based principle coordinate analysis further supported these results. The nanofluidic SNP protocol, together with forensic statistical tools, is sufficiently robust to establish authentication and to verify gourmet cacao varieties. This method shows significant potential for practical application.

  20. Cognitive Fingerprints

    DTIC Science & Technology

    2015-03-25

    is another cognitive fingerprint that has been used extensively for authorship . This work has been ex- tended to authentication by relating keyboard...this work is the inference of high-level features such as personality, gender , and dominant hand but those features have not been integrated to date

  1. Fingerprint chromatogram analysis of Pseudostellaria heterophylla (Miq.) Pax root by high performance liquid chromatography.

    PubMed

    Han, Chao; Chen, Junhui; Chen, Bo; Lee, Frank Sen-Chun; Wang, Xiaoru

    2006-09-01

    A simple and reliable high performance liquid chromatographic (HPLC) method has been developed and validated for the fingerprinting of extracts from the root of Pseudostellaria heterophylla (Miq.) Pax. HPLC with gradient elution was performed on an authentic reference standard of powdered P. heterophylla (Miq.) Pax root and 11 plant samples of the root were collected from different geographic locations. The HPLC chromatograms have been standardized through the selection and identification of reference peaks and the normalization of retention times and peak intensities of all the common peaks. The standardized HPLC fingerprints show high stability and reproducibility, and thus can be used effectively for the screening analysis or quality assessment of the root or its derived products. Similarity index calculations based on cosine angle values or correlation methods have been performed on the HPLC fingerprints. As a group, the fingerprints of the P. heterophylla (Miq.) Pax samples studied are highly correlated with closely similar fingerprints. Within the group, the samples can be further divided into subgroups based on hierarchical clustering analysis (HCA). Sample grouping based on HCA coincides nicely with those based on the geographical origins of the samples. The HPLC fingerprinting techniques thus have high potential in authentication or source-tracing types of applications.

  2. Optical security verification for blurred fingerprints

    NASA Astrophysics Data System (ADS)

    Soon, Boon Y.; Karim, Mohammad A.; Alam, Mohammad S.

    1998-12-01

    Optical fingerprint security verification is gaining popularity, as it has the potential to perform correlation at the speed of light. With advancement in optical security verification techniques, authentication process can be almost foolproof and reliable for financial transaction, banking, etc. In law enforcement, when a fingerprint is obtained from a crime scene, it may be blurred and can be an unhealthy candidate for correlation purposes. Therefore, the blurred fingerprint needs to be clarified before it is used for the correlation process. There are a several different types of blur, such as linear motion blur and defocus blur, induced by aberration of imaging system. In addition, we may or may not know the blur function. In this paper, we propose the non-singularity inverse filtering in frequency/power domain for deblurring known motion-induced blur in fingerprints. This filtering process will be incorporated with the pow spectrum subtraction technique, uniqueness comparison scheme, and the separated target and references planes method in the joint transform correlator. The proposed hardware implementation is a hybrid electronic-optical correlator system. The performance of the proposed system would be verified with computer simulation for both cases: with and without additive random noise corruption.

  3. Differentiation of Aurantii Fructus Immaturus from Poniciri Trifoliatae Fructus Immaturus using Flow- injection Mass spectrometric (FIMS) Metabolic Fingerprinting Method Combined with Chemometrics

    PubMed Central

    Zhao, Yang; Chang, Yuan-Shiun; Chen, Pei

    2015-01-01

    A flow-injection mass spectrometric metabolic fingerprinting method in combination with chemometrics was used to differentiate Aurantii Fructus Immaturus from its counterfeit Poniciri Trifoliatae Fructus Immaturus. Flow-injection mass spectrometric (FIMS) fingerprints of 9 Aurantii Fructus Immaturus samples and 12 Poniciri Trifoliatae Fructus Immaturus samples were acquired and analyzed using principal component analysis (PCA) and soft independent modeling of class analogy (SIMCA). The authentic herbs were differentiated from their counterfeits easily. Eight characteristic components which were responsible for the difference between the samples were tentatively identified. Furthermore, three out of the eight components, naringin, hesperidin, and neohesperidin, were quantified. The results are useful to help identify the authenticity of Aurantii Fructus Immaturus. PMID:25622204

  4. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  5. The Potential of Using Brain Images for Authentication

    PubMed Central

    Zhou, Zongtan; Shen, Hui; Hu, Dewen

    2014-01-01

    Biometric recognition (also known as biometrics) refers to the automated recognition of individuals based on their biological or behavioral traits. Examples of biometric traits include fingerprint, palmprint, iris, and face. The brain is the most important and complex organ in the human body. Can it be used as a biometric trait? In this study, we analyze the uniqueness of the brain and try to use the brain for identity authentication. The proposed brain-based verification system operates in two stages: gray matter extraction and gray matter matching. A modified brain segmentation algorithm is implemented for extracting gray matter from an input brain image. Then, an alignment-based matching algorithm is developed for brain matching. Experimental results on two data sets show that the proposed brain recognition system meets the high accuracy requirement of identity authentication. Though currently the acquisition of the brain is still time consuming and expensive, brain images are highly unique and have the potential possibility for authentication in view of pattern recognition. PMID:25126604

  6. The potential of using brain images for authentication.

    PubMed

    Chen, Fanglin; Zhou, Zongtan; Shen, Hui; Hu, Dewen

    2014-01-01

    Biometric recognition (also known as biometrics) refers to the automated recognition of individuals based on their biological or behavioral traits. Examples of biometric traits include fingerprint, palmprint, iris, and face. The brain is the most important and complex organ in the human body. Can it be used as a biometric trait? In this study, we analyze the uniqueness of the brain and try to use the brain for identity authentication. The proposed brain-based verification system operates in two stages: gray matter extraction and gray matter matching. A modified brain segmentation algorithm is implemented for extracting gray matter from an input brain image. Then, an alignment-based matching algorithm is developed for brain matching. Experimental results on two data sets show that the proposed brain recognition system meets the high accuracy requirement of identity authentication. Though currently the acquisition of the brain is still time consuming and expensive, brain images are highly unique and have the potential possibility for authentication in view of pattern recognition.

  7. Fingerprinting analysis of Rhizoma chuanxiong of commercial types using 1H nuclear magnetic resonance spectroscopy and high performance liquid chromatography method.

    PubMed

    Qin, Hai-Lin; Deng, An-Jun; Du, Guan-Hua; Wang, Peng; Zhang, Jin-Lan; Li, Zhi-Hong

    2009-06-01

    The (1)H nuclear magnetic resonance ((1)H NMR) fingerprints of fractionated non-polar extracts (control substance for a plant drug (CSPD) A) from Rhizoma chuanxiong, the rhizomes of Ligusticum chuanxiong Hort., of seven specimens from different sources were measured on Fourier Transform (FT)-NMR spectrometer and assigned by comparing them with the (1)H NMR spectra of the isolated pure compounds. The (1)H NMR fingerprints showed exclusively characteristic resonance signals of the major special constituents of the plant. Although the differences in the relative intensity of the (1)H NMR signals due to a discrepancy in the ratio of the major constituents among these samples could be confirmed by high performance liquid chromatography analysis, the general features of the (1)H NMR fingerprint established for an authentic sample of the rhizomes of L. chuanxiong exhibited exclusive data from those special compounds and can be used for authenticating L. Chuanxiong species.

  8. Application of Ultrasound Phase-Shift Analysis to Authenticate Wooden Panel Paintings

    PubMed Central

    Bravo, José M.; Sánchez-Pérez, Juan V.; Ferri, Marcelino; Redondo, Javier; Picó, Rubén

    2014-01-01

    Artworks are a valuable part of the World's cultural and historical heritage. Conservation and authentication of authorship are important aspects to consider in the protection of cultural patrimony. In this paper we present a novel application of a well-known method based on the phase-shift analysis of an ultrasonic signal, providing an integrated encoding system that enables authentication of the authorship of wooden panel paintings. The method has been evaluated in comparison with optical analysis and shows promising results. The proposed method provides an integrated fingerprint of the artwork, and could be used to enrich the cataloging and protection of artworks. Other advantages that make particularly attractive the proposed technique are its robustness and the use of low-cost sensors. PMID:24803191

  9. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  10. Impact of Finger Type in Fingerprint Authentication

    NASA Astrophysics Data System (ADS)

    Gafurov, Davrondzhon; Bours, Patrick; Yang, Bian; Busch, Christoph

    Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.

  11. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem

    PubMed Central

    Hussain, Muhammad; AboAlSamh, Hatim; AlZuair, Mansour

    2018-01-01

    The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass) that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem. PMID:29597286

  12. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem.

    PubMed

    AlShehri, Helala; Hussain, Muhammad; AboAlSamh, Hatim; AlZuair, Mansour

    2018-03-28

    The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass) that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  13. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  14. Evaluation of Caesalpinia bonducella flower extract for anti-inflammatory action in rats and its high performance thin layer chromatography chemical fingerprinting.

    PubMed

    Arunadevi, Rathinam; Murugammal, Shanmugam; Kumar, Dinesh; Tandan, Surendra Kumar

    2015-01-01

    The study is aimed to evaluate anti-inflammatory activity of Caesalpinia bonducella Fleming (Caesalpiniaceae) flower extract (CBFE) and to study its effect on radiographic outcome in adjuvant induced arthritis and authentication by high performance thin layer chromatography (HPTLC) chemical fingerprinting. CBFE was administered orally (30, 100, and 300 mg/kg b.wt.) and tested for its anti-inflammatory activity in carrageenan-induced inflammation, cotton pellet induced chronic granulomatous inflammation and autacoids-induced inflammation. Effect on radiographic outcome was tested in adjuvant-induced arthritis. CBFE was HPTLC fingerprinted in suitable solvent system. In carrageenan-induced inflammation, CBFE produced significant inhibition in edema volume at all the doses (30, 100 and 300 mg/kg b.wt.) and percentage of inhibition was 28.68, 31.00, and 22.48, respectively as compared to control at 5 h of its administration. In cotton pellet granuloma assay, CBFE significantly decreased the granuloma weight at 300 mg/kg dose level by 22.53%. CBFE (300 mg/kg) caused significant inhibition by 37.5, 44.44, and 35.29% edema volume, at ½, 1 and 3 h after 5-hydroxytryptamine injection, respectively. Radiographic score of animals treated with 300 mg/kg CBFE was significantly decreased when compared to arthritic control animals. The extract was found to possess significant anti-inflammatory activity. CBFE treatment improved the bony architecture in adjuvant-induced arthritis in rats. The developed HPTLC fingerprint would be helpful in the authentication of C. bonducella flower extract.

  15. Securing the Communication of Medical Information using Local Biometric Authentication and Commercial Wireless Links

    DTIC Science & Technology

    2010-01-01

    from the sensor) as a second-tier authentication is problematic because the monitored data are often pathological (i.e. revealing disease symptoms...Standards and Technology, March 2006. 17. Tan B and Schuckers S. Liveness detection for fingerprint scanners based on the statistics of wavelet signal

  16. Strengthening Authentication

    ERIC Educational Resources Information Center

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  17. PCR-fingerprint profiles of mitochondrial and genomic DNA extracted from Fetus cervi using different extraction methods.

    PubMed

    Ai, Jinxia; Wang, Xuesong; Gao, Lijun; Xia, Wei; Li, Mingcheng; Yuan, Guangxin; Niu, Jiamu; Zhang, Lihua

    2017-11-01

    The use of Fetus cervi, which is derived from the embryo and placenta of Cervus Nippon Temminck or Cervs elaphus Linnaeus, has been documented for a long time in China. There are abundant species of deer worldwide. Those recorded by China Pharmacopeia (2010 edition) from all the species were either authentic or adulterants/counterfeits. Identification of their origins or authenticity became a key in the preparation of the authentic products. The traditional SDS alkaline lysis and salt-outing methods were modified to extract mt DNA and genomic DNA from fresh and dry Fetus cervi in addition to Fetus from false animals, respectively. A set of primers were designed by bioinformatics to target the intra-and inter-variation. The mt DNA and genomic DNA extracted from Fetus cervi using the two methods meet the requirement for authenticity. Extraction of mt DNA by SDS alkaline lysis is more practical and accurate than extraction of genomic DNA by salt-outing method. There were differences in length and number of segments amplified by PCR between mt DNA from authentic Fetus cervi and false animals Fetus. The distinctive PCR-fingerprint patterns can distinguish the Fetus cervi from adulterants and counterfeit animal Fetus.

  18. Comparison of Flow Injection MS, NMR, and DNA Sequencing: Methods for Identification and Authentication of Black Cohosh (Actaea racemosa)

    USDA-ARS?s Scientific Manuscript database

    Flow injection mass spectrometry (FIMS) and proton nuclear magnetic resonance spectrometry (1H-NMR), two metabolic fingerprinting methods, and DNA sequencing were used to identify and authenticate Actaea species. Initially, samples of Actaea racemosa L. from a single source were distinguished from ...

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  20. Multi-factor challenge/response approach for remote biometric authentication

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  1. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  2. Status quo and future research challenges on organic food quality determination with focus on laboratory methods.

    PubMed

    Kahl, Johannes; Bodroza-Solarov, Marija; Busscher, Nicolaas; Hajslova, Jana; Kneifel, Wolfgang; Kokornaczyk, Maria Olga; van Ruth, Saskia; Schulzova, Vera; Stolz, Peter

    2014-10-01

    Organic food quality determination needs multi-dimensional evaluation tools. The main focus is on the authentication as an analytical verification of the certification process. New fingerprinting approaches such as ultra-performance liquid chromatography-mass spectrometry, gas chromatography-mass spectrometry, direct analysis in real time-high-resolution mass spectrometry as well as crystallization with and without the presence of additives seem to be promising methods in terms of time of analysis and detecting organic system-related parameters. For further methodological development, a system approach is recommended, which also takes into account food structure aspects. Furthermore, the authentication of processed organic samples needs more consciousness, hence most of organic food is complex and processed. © 2013 Society of Chemical Industry.

  3. Evaluation of Caesalpinia bonducella flower extract for anti-inflammatory action in rats and its high performance thin layer chromatography chemical fingerprinting

    PubMed Central

    Arunadevi, Rathinam; Murugammal, Shanmugam; Kumar, Dinesh; Tandan, Surendra Kumar

    2015-01-01

    Objective: The study is aimed to evaluate anti-inflammatory activity of Caesalpinia bonducella Fleming (Caesalpiniaceae) flower extract (CBFE) and to study its effect on radiographic outcome in adjuvant induced arthritis and authentication by high performance thin layer chromatography (HPTLC) chemical fingerprinting. Materials and Methods: CBFE was administered orally (30, 100, and 300 mg/kg b.wt.) and tested for its anti-inflammatory activity in carrageenan-induced inflammation, cotton pellet induced chronic granulomatous inflammation and autacoids-induced inflammation. Effect on radiographic outcome was tested in adjuvant-induced arthritis. CBFE was HPTLC fingerprinted in suitable solvent system. Result: In carrageenan-induced inflammation, CBFE produced significant inhibition in edema volume at all the doses (30, 100 and 300 mg/kg b.wt.) and percentage of inhibition was 28.68, 31.00, and 22.48, respectively as compared to control at 5 h of its administration. In cotton pellet granuloma assay, CBFE significantly decreased the granuloma weight at 300 mg/kg dose level by 22.53%. CBFE (300 mg/kg) caused significant inhibition by 37.5, 44.44, and 35.29% edema volume, at ½, 1 and 3 h after 5-hydroxytryptamine injection, respectively. Radiographic score of animals treated with 300 mg/kg CBFE was significantly decreased when compared to arthritic control animals. Conclusion: The extract was found to possess significant anti-inflammatory activity. CBFE treatment improved the bony architecture in adjuvant-induced arthritis in rats. The developed HPTLC fingerprint would be helpful in the authentication of C. bonducella flower extract. PMID:26729956

  4. Validating a biometric authentication system: sample size requirements.

    PubMed

    Dass, Sarat C; Zhu, Yongfang; Jain, Anil K

    2006-12-01

    Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Often, vendors and owners of these commercial biometric systems claim impressive performance that is estimated based on some proprietary data. In such situations, there is a need to independently validate the claimed performance levels. System performance is typically evaluated by collecting biometric templates from n different subjects, and for convenience, acquiring multiple instances of the biometric for each of the n subjects. Very little work has been done in 1) constructing confidence regions based on the ROC curve for validating the claimed performance levels and 2) determining the required number of biometric samples needed to establish confidence regions of prespecified width for the ROC curve. To simplify the analysis that address these two problems, several previous studies have assumed that multiple acquisitions of the biometric entity are statistically independent. This assumption is too restrictive and is generally not valid. We have developed a validation technique based on multivariate copula models for correlated biometric acquisitions. Based on the same model, we also determine the minimum number of samples required to achieve confidence bands of desired width for the ROC curve. We illustrate the estimation of the confidence bands as well as the required number of biometric samples using a fingerprint matching system that is applied on samples collected from a small population.

  5. Biometrics Go Mainstream

    ERIC Educational Resources Information Center

    Gale, Doug

    2006-01-01

    Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…

  6. Use of Biometrics within Sub-Saharan Refugee Communities

    DTIC Science & Technology

    2013-12-01

    fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity. Biometrics creates and...Biometrics typically comprises fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity...authentication because it identifies an individual based on mathematical analysis of the random pattern visible within the iris. Facial recognition is

  7. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology.

    PubMed

    Viswanathan, P; Krishna, P Venkata

    2014-05-01

    Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.

  8. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  9. R&D100: IC ID

    ScienceCinema

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    2018-06-25

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  10. Combined use of isotopic fingerprint and metabolomics analysis for the authentication of saw palmetto (Serenoa repens) extracts.

    PubMed

    Perini, Matteo; Paolini, Mauro; Camin, Federica; Appendino, Giovanni; Vitulo, Francesca; De Combarieu, Eric; Sardone, Nicola; Martinelli, Ernesto Marco; Pace, Roberto

    2018-04-22

    Saw palmetto (Serenoa repens, SP) is the most expensive oil source of the pharmaceutical and healthfood market, and its high cost and recurrent shortages have spurred the development of designer blends of fatty acids to mimic its phytochemical profile and fraudulently comply with the current authentication assays. To detect this adulteration, the combined use of isotopic fingerprint and omic analysis has been investigated, using Principal Component Analysis (PCA) to handle the complex databases generated by these techniques and to identify the possible source of the adulterants. Surprisingly, the presence of fatty acids of animal origin turned out to be widespread in commercial samples of saw palmetto oil. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    PubMed

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buckner, Mark A; Bobrek, Miljko; Farquhar, Ethan

    Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differentialmore » Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.« less

  13. Case study of 3D fingerprints applications

    PubMed Central

    Liu, Feng; Liang, Jinrong; Shen, Linlin; Yang, Meng; Zhang, David; Lai, Zhihui

    2017-01-01

    Human fingers are 3D objects. More information will be provided if three dimensional (3D) fingerprints are available compared with two dimensional (2D) fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. The applications of these features are finally discussed. A series of experiments are conducted to demonstrate the helpfulness of 3D information to fingerprint recognition. Results show that a quick alignment can be easily implemented under the guidance of 3D finger shape feature even though this feature does not work for fingerprint recognition directly. The newly defined distinctive 3D shape ridge feature can be used for personal authentication with Equal Error Rate (EER) of ~8.3%. Also, it is helpful to remove false core point. Furthermore, a promising of EER ~1.3% is realized by combining this feature with 2D features for fingerprint recognition which indicates the prospect of 3D fingerprint recognition. PMID:28399141

  14. Case study of 3D fingerprints applications.

    PubMed

    Liu, Feng; Liang, Jinrong; Shen, Linlin; Yang, Meng; Zhang, David; Lai, Zhihui

    2017-01-01

    Human fingers are 3D objects. More information will be provided if three dimensional (3D) fingerprints are available compared with two dimensional (2D) fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. The applications of these features are finally discussed. A series of experiments are conducted to demonstrate the helpfulness of 3D information to fingerprint recognition. Results show that a quick alignment can be easily implemented under the guidance of 3D finger shape feature even though this feature does not work for fingerprint recognition directly. The newly defined distinctive 3D shape ridge feature can be used for personal authentication with Equal Error Rate (EER) of ~8.3%. Also, it is helpful to remove false core point. Furthermore, a promising of EER ~1.3% is realized by combining this feature with 2D features for fingerprint recognition which indicates the prospect of 3D fingerprint recognition.

  15. Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging

    NASA Astrophysics Data System (ADS)

    Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai

    2015-08-01

    Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.

  16. Review of passive-blind detection in digital video forgery based on sensing and imaging techniques

    NASA Astrophysics Data System (ADS)

    Tao, Junjie; Jia, Lili; You, Ying

    2016-01-01

    Advances in digital video compression and IP communication technologies raised new issues and challenges concerning the integrity and authenticity of surveillance videos. It is so important that the system should ensure that once recorded, the video cannot be altered; ensuring the audit trail is intact for evidential purposes. This paper gives an overview of passive techniques of Digital Video Forensics which are based on intrinsic fingerprints inherent in digital surveillance videos. In this paper, we performed a thorough research of literatures relevant to video manipulation detection methods which accomplish blind authentications without referring to any auxiliary information. We presents review of various existing methods in literature, and much more work is needed to be done in this field of video forensics based on video data analysis and observation of the surveillance systems.

  17. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  18. Method for modeling post-mortem biometric 3D fingerprints

    NASA Astrophysics Data System (ADS)

    Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.

    2016-05-01

    Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.

  19. Infrared authentication of ginseng species: the use of the 2-6PC rule.

    PubMed

    Yap, Kevin Yi-Lwern; Lai, Tommy Kok Heng; Chan, Sui Yung; Lim, Chu Sing

    2009-01-01

    The quality of herbal products is important for ensuring efficacy and consumer safety. Traditional methods of authenticating herbs like ginseng via their morphology are hardly reliable. Different chemical constituents in herbs like ginseng tend to exhibit characteristic IR fingerprints that enable their identification. We previously introduced an IR-based protocol known as the "2-6PC rule" to categorize and identify ginseng and its products, as well as distinguishing it from morphological fakes. Here, we describe the use of this rule as a rapid and effective means of analyzing the IR spectral fingerprints of the biologically active components of ginseng, as well as distinguishing among its species. Our results show that Panax ginseng, P. quinquefolius, and P. notoginseng can be differentiated from each other. Our results also indicate the presence of starch, carbohydrates, calcium oxalate, and ginsenosides Re and Rg1 in commercial ginseng roots sold in Singapore. This work effectively demonstrates the usefulness of the 2-6PC rule as a rapid screening tool in the authentication of ginseng species.

  20. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.

    PubMed

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-06-14

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application.

  1. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings

    PubMed Central

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-01-01

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353

  2. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  3. Cell Line Data Base: structure and recent improvements towards molecular authentication of human cell lines

    PubMed Central

    Romano, Paolo; Manniello, Assunta; Aresu, Ottavia; Armento, Massimiliano; Cesaro, Michela; Parodi, Barbara

    2009-01-01

    The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility by also allowing information retrieval through web spiders. Access to HyperCLDB is provided through indexes of biological characteristics and navigation in the hypertext is granted by many internal links. HyperCLDB also includes links to external resources. Recently, an interest was raised for a reference nomenclature for cell lines and CLDB was seen as an authoritative system. Furthermore, to overcome the cell line misidentification problem, molecular authentication methods, such as fingerprinting, single-locus short tandem repeat (STR) profile and single nucleotide polymorphisms validation, were proposed. Since this data is distributed, a reference portal on authentication of human cell lines is needed. We present here the architecture and contents of CLDB, its recent enhancements and perspectives. We also present a new related database, the Cell Line Integrated Molecular Authentication (CLIMA) database (http://bioinformatics.istge.it/clima/), that allows to link authentication data to actual cell lines. PMID:18927105

  4. Cell Line Data Base: structure and recent improvements towards molecular authentication of human cell lines.

    PubMed

    Romano, Paolo; Manniello, Assunta; Aresu, Ottavia; Armento, Massimiliano; Cesaro, Michela; Parodi, Barbara

    2009-01-01

    The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility by also allowing information retrieval through web spiders. Access to HyperCLDB is provided through indexes of biological characteristics and navigation in the hypertext is granted by many internal links. HyperCLDB also includes links to external resources. Recently, an interest was raised for a reference nomenclature for cell lines and CLDB was seen as an authoritative system. Furthermore, to overcome the cell line misidentification problem, molecular authentication methods, such as fingerprinting, single-locus short tandem repeat (STR) profile and single nucleotide polymorphisms validation, were proposed. Since this data is distributed, a reference portal on authentication of human cell lines is needed. We present here the architecture and contents of CLDB, its recent enhancements and perspectives. We also present a new related database, the Cell Line Integrated Molecular Authentication (CLIMA) database (http://bioinformatics.istge.it/clima/), that allows to link authentication data to actual cell lines.

  5. Ultrasonic Fingerprinting of Structural Materials: Spent Nuclear Fuel Containers Case-Study

    NASA Astrophysics Data System (ADS)

    Sednev, D.; Lider, A.; Demyanuk, D.; Kroening, M.; Salchak, Y.

    Nowadays, NDT is mainly focused on safety purposes, but it seems possible to apply those methods to provide national and IAEA safeguards. The containment of spent fuel in storage casks could be dramatically improved in case of development of so-called "smart" spent fuel storage and transfer casks. Such casks would have tamper indicating and monitoring/tracking features integrated directly into the cask design. The microstructure of the containers material as well as of the dedicated weld seam is applied to the lid and the cask body and provides a unique fingerprint of the full container, which can be reproducibly scanned by using an appropriate technique. The echo-sounder technique, which is the most commonly used method for material inspection, was chosen for this project. The main measuring parameter is acoustic noise, reflected from material's artefacts. The purpose is to obtain structural fingerprinting. Reference measurement and additional measurement results were compared. Obtained results have verified the appliance of structural fingerprint and the chosen control method. The successful authentication demonstrates the levels of the feature points' compliance exceeding the given threshold which differs considerably from the percentage of the concurrent points during authentication from other points. Since reproduction or doubling of the proposed unique identification characteristics is impossible at the current state science and technology, application of this technique is considered to identify the interference into the nuclear materials displacement with high accuracy.

  6. Real time biometric surveillance with gait recognition

    NASA Astrophysics Data System (ADS)

    Mohapatra, Subasish; Swain, Anisha; Das, Manaswini; Mohanty, Subhadarshini

    2018-04-01

    Bio metric surveillance has become indispensable for every system in the recent years. The contribution of bio metric authentication, identification, and screening purposes are widely used in various domains for preventing unauthorized access. A large amount of data needs to be updated, segregated and safeguarded from malicious software and misuse. Bio metrics is the intrinsic characteristics of each individual. Recently fingerprints, iris, passwords, unique keys, and cards are commonly used for authentication purposes. These methods have various issues related to security and confidentiality. These systems are not yet automated to provide the safety and security. The gait recognition system is the alternative for overcoming the drawbacks of the recent bio metric based authentication systems. Gait recognition is newer as it hasn't been implemented in the real-world scenario so far. This is an un-intrusive system that requires no knowledge or co-operation of the subject. Gait is a unique behavioral characteristic of every human being which is hard to imitate. The walking style of an individual teamed with the orientation of joints in the skeletal structure and inclinations between them imparts the unique characteristic. A person can alter one's own external appearance but not skeletal structure. These are real-time, automatic systems that can even process low-resolution images and video frames. In this paper, we have proposed a gait recognition system and compared the performance with conventional bio metric identification systems.

  7. Review: DNA Barcoding and Chromatography Fingerprints for the Authentication of Botanicals in Herbal Medicinal Products

    PubMed Central

    2017-01-01

    In the last two decades, there has been a tremendous increase in the global use of herbal medicinal products (HMPs) due to their claimed health benefits. This has led to increase in their demand and consequently, also, resulted in massive adulteration. This is due to the fact that most of the traditional methods cannot identify closely related species in a process product form. Therefore the urgent need for simple and rapid identification methods resulted in the discovery of a novel technique. DNA barcoding is a process that uses short DNA sequence from the standard genome for species identification. This technique is reliable and is not affected by external factors such as climates, age, or plant part. The difficulties in isolation of DNA of high quality in addition to other factors are among the challenges encountered using the DNA barcoding in the authentication of HMP. These limitations indicated that using DNA barcoding alone may ineffectively authenticate the HMP. Therefore, the combination of DNA barcoding with chromatographic fingerprint, a popular and generally accepted technique for the assessment and quality control of HMP, will offer an efficient solution to effectively evaluate the authenticity and quality consistency of HMP. Detailed and quality information about the main composition of the HMPs will help to ascertain their efficacy and safety as these are very important for quality control. PMID:28536641

  8. Generating cancelable fingerprint templates.

    PubMed

    Ratha, Nalini K; Chikkerur, Sharat; Connell, Jonathan H; Bolle, Ruud M

    2007-04-01

    Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key." The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.

  9. A Clock Fingerprints-Based Approach for Wireless Transmitter Identification

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan

    Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.

  10. Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing

    NASA Astrophysics Data System (ADS)

    Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie

    Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.

  11. Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images

    PubMed Central

    Hsieh, Shang-Lin; Chen, Chun-Che; Shen, Wen-Shan

    2014-01-01

    This paper presents a copyright identification scheme for color images that takes advantage of the complementary nature of watermarking and fingerprinting. It utilizes an authentication logo and the extracted features of the host image to generate a fingerprint, which is then stored in a database and also embedded in the host image to produce a watermarked image. When a dispute over the copyright of a suspect image occurs, the image is first processed by watermarking. If the watermark can be retrieved from the suspect image, the copyright can then be confirmed; otherwise, the watermark then serves as the fingerprint and is processed by fingerprinting. If a match in the fingerprint database is found, then the suspect image will be considered a duplicated one. Because the proposed scheme utilizes both watermarking and fingerprinting, it is more robust than those that only adopt watermarking, and it can also obtain the preliminary result more quickly than those that only utilize fingerprinting. The experimental results show that when the watermarked image suffers slight attacks, watermarking alone is enough to identify the copyright. The results also show that when the watermarked image suffers heavy attacks that render watermarking incompetent, fingerprinting can successfully identify the copyright, hence demonstrating the effectiveness of the proposed scheme. PMID:25114966

  12. An evaluation of authentication methods for smartphone based on users’ preferences

    NASA Astrophysics Data System (ADS)

    Sari, P. K.; Ratnasari, G. S.; Prasetio, A.

    2016-04-01

    This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.

  13. Enzymatic fingerprints of polysaccharides of Dendrobium officinale and their application in identification of Dendrobium species.

    PubMed

    Zha, Xue-Qiang; Pan, Li-Hua; Luo, Jian-Ping; Wang, Jun-Hui; Wei, Peng; Bansal, Vibha

    2012-07-01

    Enzymatic fingerprinting of polysaccharides from Dendrobium officinale was studied and applied to authenticate Dendrobium species. Results showed that Dendrobium officinale species from Anhui province, Fujian province, Yunnan province, Guangdong province and Guangxi province of China, could be identified by polysaccharide analysis using carbohydrate gel electrophoresis (PACE). However, the fingerprints of Dendrobium officinale from Jiangxi province, Hu'nan province and Wenzhou, Yandangshan and Fuyang in Zhejiang province were very similar. As far as the fingerprints of different Dendrobium species were concerned, the differences between Dendrobium officinale, Dendrobium huoshanense, Dendrobium moniliforme, Dendrobium devonianum, Dendrobium aphyllum, Dendrobium wilsonii and Dendrobium crystallinum were obvious. Moreover, the genetic relationships between different samples were analyzed by using principal component analysis and unweighted pair group method with arithmetic mean cluster analysis. Results suggested that polysaccharide fingerprint analysis by PACE has the potential to become a valuable new method for the identification and control of quality of herbal medicines in future.

  14. Current Federal Identity Management and the Dynamic Signature Biometrics Option

    DTIC Science & Technology

    2009-03-01

    A lack of general public knowledge on biometrics combined with a lack of open discussion and detailed product advertising has created an atmosphere...Authentication: Fingerprint Sensor Product Guidelines. Version 1.03, September 2003 http:/Avww,intel.comidesign/ mobi /e/platform

  15. How Captain Amerika uses neural networks to fight crime

    NASA Technical Reports Server (NTRS)

    Rogers, Steven K.; Kabrisky, Matthew; Ruck, Dennis W.; Oxley, Mark E.

    1994-01-01

    Artificial neural network models can make amazing computations. These models are explained along with their application in problems associated with fighting crime. Specific problems addressed are identification of people using face recognition, speaker identification, and fingerprint and handwriting analysis (biometric authentication).

  16. Metabolomics for organic food authentication: Results from a long-term field study in carrots.

    PubMed

    Cubero-Leon, Elena; De Rudder, Olivier; Maquet, Alain

    2018-01-15

    Increasing demand for organic products and their premium prices make them an attractive target for fraudulent malpractices. In this study, a large-scale comparative metabolomics approach was applied to investigate the effect of the agronomic production system on the metabolite composition of carrots and to build statistical models for prediction purposes. Orthogonal projections to latent structures-discriminant analysis (OPLS-DA) was applied successfully to predict the origin of the agricultural system of the harvested carrots on the basis of features determined by liquid chromatography-mass spectrometry. When the training set used to build the OPLS-DA models contained samples representative of each harvest year, the models were able to classify unknown samples correctly (100% correct classification). If a harvest year was left out of the training sets and used for predictions, the correct classification rates achieved ranged from 76% to 100%. The results therefore highlight the potential of metabolomic fingerprinting for organic food authentication purposes. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  17. NIR and UV-vis spectroscopy, artificial nose and tongue: comparison of four fingerprinting techniques for the characterisation of Italian red wines.

    PubMed

    Casale, M; Oliveri, P; Armanino, C; Lanteri, S; Forina, M

    2010-06-04

    Four rapid and low-cost vanguard analytical systems (NIR and UV-vis spectroscopy, a headspace-mass based artificial nose and a voltammetric artificial tongue), together with chemometric pattern recognition techniques, were applied and compared in addressing a food authentication problem: the distinction between wine samples from the same Italian oenological region, according to the grape variety. Specifically, 59 certified samples belonging to the Barbera d'Alba and Dolcetto d'Alba appellations and collected from the same vintage (2007) were analysed. The instrumental responses, after proper data pre-processing, were used as fingerprints of the characteristics of the samples: the results from principal component analysis and linear discriminant analysis were discussed, comparing the capability of the four analytical strategies in addressing the problem studied. Copyright 2010 Elsevier B.V. All rights reserved.

  18. Identification of goat milk powder by manufacturer using multiple chemical parameters.

    PubMed

    McLeod, Rebecca J; Prosser, Colin G; Wakefield, Joshua W

    2016-02-01

    Concentrations of multiple elements and ratios of stable isotopes of carbon and nitrogen were measured and combined to create a chemical fingerprint of production batches of goat whole milk powder (WMP) produced by different manufacturers. Our objectives were to determine whether or not differences exist in the chemical fingerprint among samples of goat WMP produced at different sites, and assess temporal changes in the chemical fingerprint in product manufactured at one site. In total, 58 samples of goat WMP were analyzed by inductively coupled plasma-mass spectrometry as well as isotope ratio mass spectrometry and a suite of 13 elements (Li, Na, Mg, K, Ca, Mn, Cu, Zn, Rb, Sr, Mo, Cs, and Ba), δ(13)C, and δ(15)N selected to create the chemical fingerprint. Differences in the chemical fingerprint of samples between sites and over time were assessed using principal components analysis and canonical analysis of principal coordinates. Differences in the chemical fingerprints of samples between production sites provided a classification success rate (leave-one-out classification) of 98.1%, providing a basis for using the approach to test the authenticity of product manufactured at a site. Within one site, the chemical fingerprint of samples produced at the beginning of the production season differed from those produced in the middle and late season, driven predominantly by lower concentrations of Na, Mg, K, Mn, and Rb, and higher concentrations of Ba and Cu. This observed temporal variability highlights the importance of obtaining samples from throughout the season to ensure a representative chemical fingerprint is obtained for goat WMP from a single manufacturing site. The reconstitution and spray drying of samples from one manufacturer by the other manufacturer enabled the relative influence of the manufacturing process on the chemical fingerprint to be examined. It was found that such reprocessing altered the chemical fingerprint, although the degree of alteration varied among samples and individual elements. The findings of this study support the use of trace elements and stable isotope ratios to test the authenticity of goat WMP, which can likely be applied to other dairy goat products. This approach could be used test to the factory of origin (and potentially batch of origin) of products in the supply chain, thus providing the ability to audit the supply chain and monitor for fraudulent activity. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  19. User Authentication from Web Browsing Behavior

    DTIC Science & Technology

    2013-05-01

    ourselves with a cognitive personal fingerprint. Attribution is broadly defined as the assignment of an ef- fect to a cause. We differentiate between...reusable patterns of behavior. We encode the semantic and stylistic content Figure 4: Burstiness profile below 1 min aggregated across all sessions for

  20. Authentication and Quantitation of Fraud in Extra Virgin Olive Oils Based on HPLC-UV Fingerprinting and Multivariate Calibration

    PubMed Central

    Carranco, Núria; Farrés-Cebrián, Mireia; Saurina, Javier

    2018-01-01

    High performance liquid chromatography method with ultra-violet detection (HPLC-UV) fingerprinting was applied for the analysis and characterization of olive oils, and was performed using a Zorbax Eclipse XDB-C8 reversed-phase column under gradient elution, employing 0.1% formic acid aqueous solution and methanol as mobile phase. More than 130 edible oils, including monovarietal extra-virgin olive oils (EVOOs) and other vegetable oils, were analyzed. Principal component analysis results showed a noticeable discrimination between olive oils and other vegetable oils using raw HPLC-UV chromatographic profiles as data descriptors. However, selected HPLC-UV chromatographic time-window segments were necessary to achieve discrimination among monovarietal EVOOs. Partial least square (PLS) regression was employed to tackle olive oil authentication of Arbequina EVOO adulterated with Picual EVOO, a refined olive oil, and sunflower oil. Highly satisfactory results were obtained after PLS analysis, with overall errors in the quantitation of adulteration in the Arbequina EVOO (minimum 2.5% adulterant) below 2.9%. PMID:29561820

  1. Comprehensive profiling and marker identification in non-volatile citrus oil residues by mass spectrometry and nuclear magnetic resonance.

    PubMed

    Marti, Guillaume; Boccard, Julien; Mehl, Florence; Debrus, Benjamin; Marcourt, Laurence; Merle, Philippe; Delort, Estelle; Baroux, Lucie; Sommer, Horst; Rudaz, Serge; Wolfender, Jean-Luc

    2014-05-01

    The detailed characterization of cold-pressed lemon oils (CPLOs) is of great importance for the flavor and fragrance (F&F) industry. Since a control of authenticity by standard analytical techniques can be bypassed using elaborated adulterated oils to pretend a higher quality, a combination of advanced orthogonal methods has been developed. The present study describes a combined metabolomic approach based on UHPLC-TOF-MS profiling and (1)H NMR fingerprinting to highlight metabolite differences on a set of representative samples used in the F&F industry. A new protocol was set up and adapted to the use of CPLO residues. Multivariate analysis based on both fingerprinting methods showed significant chemical variations between Argentinian and Italian samples. Discriminating markers identified in mixtures belong to furocoumarins, flavonoids, terpenoids and fatty acids. Quantitative NMR revealed low citropten and high bergamottin content in Italian samples. The developed metabolomic approach applied to CPLO residues gives some new perspectives for authenticity assessment. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Authentication of medicinal herbs using PCR-amplified ITS2 with specific primers.

    PubMed

    Chiou, Shu-Jiau; Yen, Jui-Hung; Fang, Cheng-Li; Chen, Hui-Ling; Lin, Tsai-Yun

    2007-10-01

    Different parts of medicinal herbs have long been used as traditional Chinese drugs for treating many diseases, whereas materials of similar morphology and chemical fingerprints are often misidentified. Analyses of sequence variations in the nuclear ribosomal DNA (rDNA) internal transcribed spacer (ITS) have become a valid method for authentication of medicinal herbs at the intergenic and interspecific levels. DNA extracted from processed materials is usually severely degraded or contaminated by microorganisms, thus generates no or unexpected PCR products. The goal of this study is to apply the ITS fragments selectively amplified with two designed primer sets for efficient and precise authentication of medicinal herbs. The designed primers led to an accurate PCR product of the specific region in ITS2, which was confirmed with DNA extracted from 55 processed medicinal herbs belonging to 48 families. Moreover, the selectively amplified ITS2 authenticated five sets of easily confusable Chinese herbal materials. The designed primers were proven to be suitable for a broad application in the authentication of herbal materials.

  3. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  4. Computer-aided diagnosis workstation and network system for chest diagnosis based on multislice CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru

    2008-03-01

    Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The function to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and Success in login" effective. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

  5. Authenticity techniques for PACS images and records

    NASA Astrophysics Data System (ADS)

    Wong, Stephen T. C.; Abundo, Marco; Huang, H. K.

    1995-05-01

    Along with the digital radiology environment supported by picture archiving and communication systems (PACS) comes a new problem: How to establish trust in multimedia medical data that exist only in the easily altered memory of a computer. Trust is characterized in terms of integrity and privacy of digital data. Two major self-enforcing techniques can be used to assure the authenticity of electronic images and text -- key-based cryptography and digital time stamping. Key-based cryptography associates the content of an image with the originator using one or two distinct keys and prevents alteration of the document by anyone other than the originator. A digital time stamping algorithm generates a characteristic `digital fingerprint' for the original document using a mathematical hash function, and checks that it has not been modified. This paper discusses these cryptographic algorithms and their appropriateness for a PACS environment. It also presents experimental results of cryptographic algorithms on several imaging modalities.

  6. Instrumented SSH

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Campbell, Scott; Campbell, Scott

    NERSC recently undertook a project to access and analyze Secure Shell (SSH) related data. This includes authentication data such as user names and key fingerprints, interactive session data such as keystrokes and responses, and information about noninteractive sessions such as commands executed and files transferred. Historically, this data has been inaccessible with traditional network monitoring techniques, but with a modification to the SSH daemon, this data can be passed directly to intrusion detection systems for analysis. The instrumented version of SSH is now running on all NERSC production systems. This paper describes the project, details about how SSH was instrumented,more » and the initial results of putting this in production.« less

  7. Usable Multi-factor Authentication and Risk-based Authorization

    DTIC Science & Technology

    2015-06-01

    acceptance. In the previous section we described user studies that explored risks perceived by individuals using online banking and credit card purchases... iTunes purchases. We note that the fingerprint scanners in the current experiment are very different from what would be available in future. However

  8. Fingerprint of Herb Product by Matrix-assisted Laser Desorption Ionization Mass Spectrometry

    USDA-ARS?s Scientific Manuscript database

    Product authentication, quality assurance, and identification of adulterants/contamination are major issues facing the dietary supplement industry. Scutellaria lateriflora is an herb widely used as a remedy for many ailments ranging from rabies to epilepsy. It could be easily contaminated by similar...

  9. Real-Time Food Authentication Using a Miniature Mass Spectrometer.

    PubMed

    Gerbig, Stefanie; Neese, Stephan; Penner, Alexander; Spengler, Bernhard; Schulz, Sabine

    2017-10-17

    Food adulteration is a threat to public health and the economy. In order to determine food adulteration efficiently, rapid and easy-to-use on-site analytical methods are needed. In this study, a miniaturized mass spectrometer in combination with three ambient ionization methods was used for food authentication. The chemical fingerprints of three milk types, five fish species, and two coffee types were measured using electrospray ionization, desorption electrospray ionization, and low temperature plasma ionization. Minimum sample preparation was needed for the analysis of liquid and solid food samples. Mass spectrometric data was processed using the laboratory-built software MS food classifier, which allows for the definition of specific food profiles from reference data sets using multivariate statistical methods and the subsequent classification of unknown data. Applicability of the obtained mass spectrometric fingerprints for food authentication was evaluated using different data processing methods, leave-10%-out cross-validation, and real-time classification of new data. Classification accuracy of 100% was achieved for the differentiation of milk types and fish species, and a classification accuracy of 96.4% was achieved for coffee types in cross-validation experiments. Measurement of two milk mixtures yielded correct classification of >94%. For real-time classification, the accuracies were comparable. Functionality of the software program and its performance is described. Processing time for a reference data set and a newly acquired spectrum was found to be 12 s and 2 s, respectively. These proof-of-principle experiments show that the combination of a miniaturized mass spectrometer, ambient ionization, and statistical analysis is suitable for on-site real-time food authentication.

  10. Volatile-Compound Fingerprinting by Headspace-Gas-Chromatography Ion-Mobility Spectrometry (HS-GC-IMS) as a Benchtop Alternative to 1H NMR Profiling for Assessment of the Authenticity of Honey.

    PubMed

    Gerhardt, Natalie; Birkenmeier, Markus; Schwolow, Sebastian; Rohn, Sascha; Weller, Philipp

    2018-02-06

    This work describes a simple approach for the untargeted profiling of volatile compounds for the authentication of the botanical origins of honey based on resolution-optimized HS-GC-IMS combined with optimized chemometric techniques, namely PCA, LDA, and kNN. A direct comparison of the PCA-LDA models between the HS-GC-IMS and 1 H NMR data demonstrated that HS-GC-IMS profiling could be used as a complementary tool to NMR-based profiling of honey samples. Whereas NMR profiling still requires comparatively precise sample preparation, pH adjustment in particular, HS-GC-IMS fingerprinting may be considered an alternative approach for a truly fully automatable, cost-efficient, and in particular highly sensitive method. It was demonstrated that all tested honey samples could be distinguished on the basis of their botanical origins. Loading plots revealed the volatile compounds responsible for the differences among the monofloral honeys. The HS-GC-IMS-based PCA-LDA model was composed of two linear functions of discrimination and 10 selected PCs that discriminated canola, acacia, and honeydew honeys with a predictive accuracy of 98.6%. Application of the LDA model to an external test set of 10 authentic honeys clearly proved the high predictive ability of the model by correctly classifying them into three variety groups with 100% correct classifications. The constructed model presents a simple and efficient method of analysis and may serve as a basis for the authentication of other food types.

  11. Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching

    PubMed Central

    Zhou, Ru; Zhong, Dexing; Han, Jiuqiang

    2013-01-01

    The performance of conventional minutiae-based fingerprint authentication algorithms degrades significantly when dealing with low quality fingerprints with lots of cuts or scratches. A similar degradation of the minutiae-based algorithms is observed when small overlapping areas appear because of the quite narrow width of the sensors. Based on the detection of minutiae, Scale Invariant Feature Transformation (SIFT) descriptors are employed to fulfill verification tasks in the above difficult scenarios. However, the original SIFT algorithm is not suitable for fingerprint because of: (1) the similar patterns of parallel ridges; and (2) high computational resource consumption. To enhance the efficiency and effectiveness of the algorithm for fingerprint verification, we propose a SIFT-based Minutia Descriptor (SMD) to improve the SIFT algorithm through image processing, descriptor extraction and matcher. A two-step fast matcher, named improved All Descriptor-Pair Matching (iADM), is also proposed to implement the 1:N verifications in real-time. Fingerprint Identification using SMD and iADM (FISiA) achieved a significant improvement with respect to accuracy in representative databases compared with the conventional minutiae-based method. The speed of FISiA also can meet real-time requirements. PMID:23467056

  12. Chemical Fingerprint Analysis and Quantitative Analysis of Rosa rugosa by UPLC-DAD.

    PubMed

    Mansur, Sanawar; Abdulla, Rahima; Ayupbec, Amatjan; Aisa, Haji Akbar

    2016-12-21

    A method based on ultra performance liquid chromatography with a diode array detector (UPLC-DAD) was developed for quantitative analysis of five active compounds and chemical fingerprint analysis of Rosa rugosa . Ten batches of R. rugosa collected from different plantations in the Xinjiang region of China were used to establish the fingerprint. The feasibility and advantages of the used UPLC fingerprint were verified for its similarity evaluation by systematically comparing chromatograms with professional analytical software recommended by State Food and Drug Administration (SFDA) of China. In quantitative analysis, the five compounds showed good regression (R² = 0.9995) within the test ranges, and the recovery of the method was in the range of 94.2%-103.8%. The similarities of liquid chromatography fingerprints of 10 batches of R. rugosa were more than 0.981. The developed UPLC fingerprint method is simple, reliable, and validated for the quality control and identification of R. rugosa . Additionally, simultaneous quantification of five major bioactive ingredients in the R. rugosa samples was conducted to interpret the consistency of the quality test. The results indicated that the UPLC fingerprint, as a characteristic distinguishing method combining similarity evaluation and quantification analysis, can be successfully used to assess the quality and to identify the authenticity of R. rugosa .

  13. A flow-injection mass spectrometry fingerprinting method for authentication and quality assessment of Scutellaria lateriflora-based dietary supplements

    USDA-ARS?s Scientific Manuscript database

    Scutellaria lateriflora, commonly known as skullcap, is used as an ingredient in numerous herbal products. However, it has been occasionally adulterated/contaminated with Teucrium canadense and/or Teucrium chamaedrys, commonly known as germander, due to the morphological similarities between the tw...

  14. Assessing the varietal origin of extra-virgin olive oil using liquid chromatography fingerprints of phenolic compound, data fusion and chemometrics.

    PubMed

    Bajoub, Aadil; Medina-Rodríguez, Santiago; Gómez-Romero, María; Ajal, El Amine; Bagur-González, María Gracia; Fernández-Gutiérrez, Alberto; Carrasco-Pancorbo, Alegría

    2017-01-15

    High Performance Liquid Chromatography (HPLC) with diode array (DAD) and fluorescence (FLD) detection was used to acquire the fingerprints of the phenolic fraction of monovarietal extra-virgin olive oils (extra-VOOs) collected over three consecutive crop seasons (2011/2012-2013/2014). The chromatographic fingerprints of 140 extra-VOO samples processed from olive fruits of seven olive varieties, were recorded and statistically treated for varietal authentication purposes. First, DAD and FLD chromatographic-fingerprint datasets were separately processed and, subsequently, were joined using "Low-level" and "Mid-Level" data fusion methods. After the preliminary examination by principal component analysis (PCA), three supervised pattern recognition techniques, Partial Least Squares Discriminant Analysis (PLS-DA), Soft Independent Modeling of Class Analogies (SIMCA) and K-Nearest Neighbors (k-NN) were applied to the four chromatographic-fingerprinting matrices. The classification models built were very sensitive and selective, showing considerably good recognition and prediction abilities. The combination "chromatographic dataset+chemometric technique" allowing the most accurate classification for each monovarietal extra-VOO was highlighted. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  16. Design of a MEMS-based retina scanning system for biometric authentication

    NASA Astrophysics Data System (ADS)

    Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Schelinski, Uwe; Grüger, Heinrich

    2014-05-01

    There is an increasing need for reliable authentication for a number of applications such as e commerce. Common authentication methods based on ownership (ID card) or knowledge factors (password, PIN) are often prone to manipulations and may therefore be not safe enough. Various inherence factor based methods like fingerprint, retinal pattern or voice identifications are considered more secure. Retina scanning in particular offers both low false rejection rate (FRR) and low false acceptance rate (FAR) with about one in a million. Images of the retina with its characteristic pattern of blood vessels can be made with either a fundus camera or laser scanning methods. The present work describes the optical design of a new compact retina laser scanner which is based on MEMS (Micro Electric Mechanical System) technology. The use of a dual axis micro scanning mirror for laser beam deflection enables a more compact and robust design compared to classical systems. The scanner exhibits a full field of view of 10° which corresponds to an area of 4 mm2 on the retinal surface surrounding the optical disc. The system works in the near infrared and is designed for use under ambient light conditions, which implies a pupil diameter of 1.5 mm. Furthermore it features a long eye relief of 30 mm so that it can be conveniently used by persons wearing glasses. The optical design requirements and the optical performance are discussed in terms of spot diagrams and ray fan plots.

  17. Biometrics: Accessibility challenge or opportunity?

    PubMed

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  18. Biometrics: Accessibility challenge or opportunity?

    PubMed Central

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  19. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  20. Species-specific AFLP markers for identification of Zingiber officinale, Z. montanum and Z. zerumbet (Zingiberaceae).

    PubMed

    Ghosh, S; Majumder, P B; Sen Mandi, S

    2011-02-08

    The Zingiber genus, which includes the herbs known as gingers, commonly used in cooking, is well known for its medicinal properties, as described in the Indian pharmacopoeia. Different members of this genus, although somewhat similar in morphology, differ widely in their pharmacological and therapeutic properties. The most important species of this genus, with maximal therapeutic properties, is Zingiber officinale (garden ginger), which is often adulterated with other less-potent Zingiber sp. There is an existing demand in the herbal drug industry for an authentication system for the Zingiber sp in order to facilitate their commercial use as genuine phytoceuticals. To this end, we used amplified fragment length polymorphism (AFLP) to produce DNA fingerprints for three Zingiber species. Sixteen collections (six of Z. officinale, five of Z. montanum, and five of Z. zerumbet) were used in the study. Seven selective primer pairs were found to be useful for all the accessions. A total of 837 fragments were produced by these primer pairs. Species-specific markers were identified for all three Zingiber species (91 for Z. officinale, 82 for Z. montanum, and 55 for Z. zerumbet). The dendogram analysis generated from AFLP patterns showed that Z. montanum and Z. zerumbet are phylogenetically closer to each other than to Z. officinale. The AFLP fingerprints of the Zingiber species could be used to authenticate Zingiber sp-derived drugs and to resolve adulteration-related problems faced by the commercial users of these herbs.

  1. 32 CFR 161.7 - ID card life-cycle procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... provide two fingerprint biometric scans and a facial image, to assist with authenticating the applicant's... manner: (i) A digitized, full-face passport-type photograph will be captured for the facial image and stored in DEERS and shall have a plain white or off-white background. No flags, posters, or other images...

  2. High performance thin layer chromatography fingerprint analysis of guava (Psidium guajava) leaves

    NASA Astrophysics Data System (ADS)

    Astuti, M.; Darusman, L. K.; Rafi, M.

    2017-05-01

    High-performance thin layer chromatography (HPTLC) fingerprint analysis is commonly used for quality control of medicinal plants in term of identification and authentication. In this study, we have been developed HPTLC fingerprint analysis for identification of guava (Psidium guajava) leaves raw material. A mixture of chloroform, acetone, and formic acid in the ratio 10:2:1 was used as the optimum mobile phase in HPTLC silica plate and with 13 bands were detected. As reference marker we chose gallic acid (Rf = 0.21) and catechin (Rf = 0.11). The two compound were detected as pale black bands at 366 nm after derivatization with sulfuric acid 10% v/v (in methanol) reagent. Validation of the method was met within validation criteria, so the developed method could be used for quality control of guava leaves.

  3. On Hunting Animals of the Biometric Menagerie for Online Signature.

    PubMed

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  4. Computer-aided diagnosis workstation and database system for chest diagnosis based on multi-helical CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Mori, Kiyoshi; Eguchi, Kenji; Kaneko, Masahiro; Kakinuma, Ryutarou; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru; Sasagawa, Michizou

    2006-03-01

    Multi-helical CT scanner advanced remarkably at the speed at which the chest CT images were acquired for mass screening. Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images and a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification. We also have developed electronic medical recording system and prototype internet system for the community health in two or more regions by using the Virtual Private Network router and Biometric fingerprint authentication system and Biometric face authentication system for safety of medical information. Based on these diagnostic assistance methods, we have now developed a new computer-aided workstation and database that can display suspected lesions three-dimensionally in a short time. This paper describes basic studies that have been conducted to evaluate this new system. The results of this study indicate that our computer-aided diagnosis workstation and network system can increase diagnostic speed, diagnostic accuracy and safety of medical information.

  5. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    PubMed Central

    Yang, Bian; Busch, Christoph; de Groot, Koen; Xu, Haiyun; Veldhuis, Raymond N. J.

    2012-01-01

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations) on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples. PMID:22778583

  6. Metabolic fingerprint of Brazilian maize landraces silk (stigma/styles) using NMR spectroscopy and chemometric methods.

    PubMed

    Kuhnen, Shirley; Bernardi Ogliari, Juliana; Dias, Paulo Fernando; da Silva Santos, Maiara; Ferreira, Antônio Gilberto; Bonham, Connie C; Wood, Karl Vernon; Maraschin, Marcelo

    2010-02-24

    Aqueous extract from maize silks is used by traditional medicine for the treatment of several ailments, mainly related to the urinary system. This work focuses on the application of NMR spectroscopy and chemometric analysis for the determination of metabolic fingerprint and pattern recognition of silk extracts from seven maize landraces cultivated in southern Brazil. Principal component analysis (PCA) of the (1)H NMR data set showed clear discrimination among the maize varieties by PC1 and PC2, pointing out three distinct metabolic profiles. Target compounds analysis showed significant differences (p < 0.05) in the contents of protocatechuic acid, gallic acid, t-cinnamic acid, and anthocyanins, corroborating the discrimination of the genotypes in this study as revealed by PCA analysis. Thus the combination of (1)H NMR and PCA is a useful tool for the discrimination of maize silks in respect to their chemical composition, including rapid authentication of the raw material of current pharmacological interest.

  7. Lab-on-a-Chip-Based PCR-RFLP Assay for the Detection of Malayan Box Turtle (Cuora amboinensis) in the Food Chain and Traditional Chinese Medicines

    PubMed Central

    Asing; Ali, Md. Eaqub; Abd Hamid, Sharifah Bee; Hossain, M. A. Motalib; Mustafa, Shuhaimi; Kader, Md. Abdul; Zaidul, I. S. M.

    2016-01-01

    The Malayan box turtle (Cuora amboinensis) (MBT) is a vulnerable and protected turtle species, but it is a lucrative item in the illegal wildlife trade because of its great appeal as an exotic food item and in traditional medicine. Although several polymerase chain reaction (PCR) assays to identify MBT by various routes have been documented, their applicability for forensic authentication remains inconclusive due to the long length of the amplicon targets, which are easily broken down by natural decomposition, environmental stresses or physiochemical treatments during food processing. To address this research gap, we developed, for the first time, a species-specific PCR-restriction fragment length polymorphism (RFLP) assay with a very short target length (120 bp) to detect MBT in the food chain; this authentication ensured better security and reliability through molecular fingerprints. The PCR-amplified product was digested with Bfa1 endonuclease, and distinctive restriction fingerprints (72, 43 and 5 bp) for MBT were found upon separation in a microfluidic chip-based automated electrophoresis system, which enhances the resolution of short oligos. The chances of any false negative identifications were eliminated through the use of a universal endogenous control for eukaryotes, and the limit of detection was 0.0001 ng DNA or 0.01% of the meat under admixed states. Finally, the optimized PCR-RFLP assay was validated for the screening of raw and processed commercial meatballs, burgers and frankfurters, which are very popular in most countries. The optimized PCR-RFLP assay was further used to screen MBT materials in 153 traditional Chinese medicines of 17 different brands and 62 of them were found MBT positive; wherein the ingredients were not declared in product labels. Overall, the novel assay demonstrated sufficient merit for use in any forensic and/or archaeological authentication of MBT, even under a state of decomposition. PMID:27716792

  8. Lab-on-a-Chip-Based PCR-RFLP Assay for the Detection of Malayan Box Turtle (Cuora amboinensis) in the Food Chain and Traditional Chinese Medicines.

    PubMed

    Asing; Ali, Md Eaqub; Abd Hamid, Sharifah Bee; Hossain, M A Motalib; Mustafa, Shuhaimi; Kader, Md Abdul; Zaidul, I S M

    2016-01-01

    The Malayan box turtle (Cuora amboinensis) (MBT) is a vulnerable and protected turtle species, but it is a lucrative item in the illegal wildlife trade because of its great appeal as an exotic food item and in traditional medicine. Although several polymerase chain reaction (PCR) assays to identify MBT by various routes have been documented, their applicability for forensic authentication remains inconclusive due to the long length of the amplicon targets, which are easily broken down by natural decomposition, environmental stresses or physiochemical treatments during food processing. To address this research gap, we developed, for the first time, a species-specific PCR-restriction fragment length polymorphism (RFLP) assay with a very short target length (120 bp) to detect MBT in the food chain; this authentication ensured better security and reliability through molecular fingerprints. The PCR-amplified product was digested with Bfa1 endonuclease, and distinctive restriction fingerprints (72, 43 and 5 bp) for MBT were found upon separation in a microfluidic chip-based automated electrophoresis system, which enhances the resolution of short oligos. The chances of any false negative identifications were eliminated through the use of a universal endogenous control for eukaryotes, and the limit of detection was 0.0001 ng DNA or 0.01% of the meat under admixed states. Finally, the optimized PCR-RFLP assay was validated for the screening of raw and processed commercial meatballs, burgers and frankfurters, which are very popular in most countries. The optimized PCR-RFLP assay was further used to screen MBT materials in 153 traditional Chinese medicines of 17 different brands and 62 of them were found MBT positive; wherein the ingredients were not declared in product labels. Overall, the novel assay demonstrated sufficient merit for use in any forensic and/or archaeological authentication of MBT, even under a state of decomposition.

  9. Game meat authentication through rare earth elements fingerprinting.

    PubMed

    Danezis, G P; Pappas, A C; Zoidis, E; Papadomichelakis, G; Hadjigeorgiou, I; Zhang, P; Brusic, V; Georgiou, C A

    2017-10-23

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Computer-aided diagnosis workstation and telemedicine network system for chest diagnosis based on multislice CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2009-02-01

    Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. To overcome these problems, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The functions to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and "Success in login" effective. As a result, patients' private information is protected. We can share the screen of Web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with workstation. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

  11. Metabolomic fingerprinting employing DART-TOFMS for authentication of tomatoes and peppers from organic and conventional farming.

    PubMed

    Novotná, H; Kmiecik, O; Gałązka, M; Krtková, V; Hurajová, A; Schulzová, V; Hallmann, E; Rembiałkowska, E; Hajšlová, J

    2012-01-01

    The rapidly growing demand for organic food requires the availability of analytical tools enabling their authentication. Recently, metabolomic fingerprinting/profiling has been demonstrated as a challenging option for a comprehensive characterisation of small molecules occurring in plants, since their pattern may reflect the impact of various external factors. In a two-year pilot study, concerned with the classification of organic versus conventional crops, ambient mass spectrometry consisting of a direct analysis in real time (DART) ion source and a time-of-flight mass spectrometer (TOFMS) was employed. This novel methodology was tested on 40 tomato and 24 pepper samples grown under specified conditions. To calculate statistical models, the obtained data (mass spectra) were processed by the principal component analysis (PCA) followed by linear discriminant analysis (LDA). The results from the positive ionisation mode enabled better differentiation between organic and conventional samples than the results from the negative mode. In this case, the recognition ability obtained by LDA was 97.5% for tomato and 100% for pepper samples and the prediction abilities were above 80% for both sample sets. The results suggest that the year of production had stronger influence on the metabolomic fingerprints compared with the type of farming (organic versus conventional). In any case, DART-TOFMS is a promising tool for rapid screening of samples. Establishing comprehensive (multi-sample) long-term databases may further help to improve the quality of statistical classification models.

  12. Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode.

    PubMed

    Cai, Yong; Li, Peng; Li, Xi-Wen; Zhao, Jing; Chen, Hai; Yang, Qing; Hu, Hao

    2017-07-01

    In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.

  13. A flow-injection mass spectrometry fingerprinting method for authentication and quality assessment of Scutellaria lateriflora-based dietary supplements

    USDA-ARS?s Scientific Manuscript database

    Identification and differentiation of anthocyanins and non-anthocyanin compounds in natural products can be very difficult by mass spectrometry. Using a ultra-violet/visible detector can be helpful, but not fool-proof, and it requires an additional detector. To solve the problem, a fast and reliab...

  14. Advances in high-resolution mass spectrometry based on metabolomics studies for food--a review.

    PubMed

    Rubert, Josep; Zachariasova, Milena; Hajslova, Jana

    2015-01-01

    Food authenticity becomes a necessity for global food policies, since food placed in the market without fail has to be authentic. It has always been a challenge, since in the past minor components, called also markers, have been mainly monitored by chromatographic methods in order to authenticate the food. Nevertheless, nowadays, advanced analytical methods have allowed food fingerprints to be achieved. At the same time they have been also combined with chemometrics, which uses statistical methods in order to verify food and to provide maximum information by analysing chemical data. These sophisticated methods based on different separation techniques or stand alone have been recently coupled to high-resolution mass spectrometry (HRMS) in order to verify the authenticity of food. The new generation of HRMS detectors have experienced significant advances in resolving power, sensitivity, robustness, extended dynamic range, easier mass calibration and tandem mass capabilities, making HRMS more attractive and useful to the food metabolomics community, therefore becoming a reliable tool for food authenticity. The purpose of this review is to summarise and describe the most recent metabolomics approaches in the area of food metabolomics, and to discuss the strengths and drawbacks of the HRMS analytical platforms combined with chemometrics.

  15. On Hunting Animals of the Biometric Menagerie for Online Signature

    PubMed Central

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836

  16. Application of analytical methods in authentication and adulteration of honey.

    PubMed

    Siddiqui, Amna Jabbar; Musharraf, Syed Ghulam; Choudhary, M Iqbal; Rahman, Atta-Ur-

    2017-02-15

    Honey is synthesized from flower nectar and it is famous for its tremendous therapeutic potential since ancient times. Many factors influence the basic properties of honey including the nectar-providing plant species, bee species, geographic area, and harvesting conditions. Quality and composition of honey is also affected by many other factors, such as overfeeding of bees with sucrose, harvesting prior to maturity, and adulteration with sugar syrups. Due to the complex nature of honey, it is often challenging to authenticate the purity and quality by using common methods such as physicochemical parameters and more specialized procedures need to be developed. This article reviews the literature (between 2000 and 2016) on the use of analytical techniques, mainly NMR spectroscopy, for authentication of honey, its botanical and geographical origin, and adulteration by sugar syrups. NMR is a powerful technique and can be used as a fingerprinting technique to compare various samples. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Evaluation of saffron (Crocus sativus L.) adulteration with plant adulterants by (1)H NMR metabolite fingerprinting.

    PubMed

    Petrakis, Eleftherios A; Cagliani, Laura R; Polissiou, Moschos G; Consonni, Roberto

    2015-04-15

    In the present work, a preliminary study for the detection of adulterated saffron and the identification of the adulterant used by means of (1)H NMR and chemometrics is reported. Authentic Greek saffron and four typical plant-derived materials utilised as bulking agents in saffron, i.e., Crocus sativus stamens, safflower, turmeric, and gardenia were investigated. A two-step approach, relied on the application of both OPLS-DA and O2PLS-DA models to the (1)H NMR data, was adopted to perform authentication and prediction of authentic and adulterated saffron. Taking into account the deficiency of established methodologies to detect saffron adulteration with plant adulterants, the method developed resulted reliable in assessing the type of adulteration and could be viable for dealing with extensive saffron frauds at a minimum level of 20% (w/w). Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    NASA Astrophysics Data System (ADS)

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  19. Computer-aided diagnosis workstation and network system for chest diagnosis based on multislice CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Mori, Kiyoshi; Eguchi, Kenji; Kaneko, Masahiro; Kakinuma, Ryutarou; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru

    2007-03-01

    Multislice CT scanner advanced remarkably at the speed at which the chest CT images were acquired for mass screening. Mass screening based on multislice CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images and a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification. Moreover, we have provided diagnostic assistance methods to medical screening specialists by using a lung cancer screening algorithm built into mobile helical CT scanner for the lung cancer mass screening done in the region without the hospital. We also have developed electronic medical recording system and prototype internet system for the community health in two or more regions by using the Virtual Private Network router and Biometric fingerprint authentication system and Biometric face authentication system for safety of medical information. Based on these diagnostic assistance methods, we have now developed a new computer-aided workstation and database that can display suspected lesions three-dimensionally in a short time. This paper describes basic studies that have been conducted to evaluate this new system.

  20. An Intelligent Fingerprint-Biometric Image Scrambling Scheme

    NASA Astrophysics Data System (ADS)

    Khan, Muhammad Khurram; Zhang, Jiashu

    To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.

  1. The spectrum-effect relationship-a rational approach to screening effective compounds, reflecting the internal quality of Chinese herbal medicine.

    PubMed

    Zhu, Chun-Sheng; Lin, Zhi-Jian; Xiao, Ming-Liang; Niu, Hong-Juan; Zhang, Bing

    2016-03-01

    Since the chromatographic fingerprint was introduced, it has been accepted by many countries to assess the quality and authenticity of Chinese herbal medicine (CHM). However, solely using the chromatographic fingerprint to assay numerous chemicals is not suitable for the assessment of the whole internal quality and pharmacodynamics of CHM. Consequently, it is necessary to develop a rational approach to connecting the chromatographic fingerprint with effective components to assess the internal quality of CHM. For this purpose, a spectrum-effect relationship theory was proposed and accepted as a new method for the assessment of CHM because of its potential use to screen effective components from CHM. In this paper, we systematically reviewed the application of the spectrum-effect relationship theory in the research of CHM, including research mentality, different chromatographic analysis techniques, data processing technologies, and structure determination. Copyright © 2016 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  2. Genetic and chemical diversity of high mucilaginous plants of Sida complex by ISSR markers and chemical fingerprinting.

    PubMed

    Thul, Sanjog T; Srivastava, Ankit K; Singh, Subhash C; Shanker, Karuna

    2011-09-01

    A method was developed based on multiple approaches wherein DNA and chemical analysis was carried out toward differentiation of important species of Sida complex that is being used for commercial preparation. Isolated DNA samples were successfully performed through PCR amplification using ISSR markers and degree of genetic diversity among the different species of Sida is compared with that of chemical diversity. For genetic fingerprint investigation, selected 10 ISSR primers generating reproducible banding patterns were used. Among the total of 63 amplicons, 62 were recorded as polymorphic, genetic similarity index deduced from ISSR profiles ranged from 12 to 51%. Based on similarity index, S. acuta and S. rhombifolia found to be most similar (51%). High number of species-specific bands played pivotal role to delineate species at genetic level. Investigation based on HPTLC fingerprints analysis revealed 23 bands representing to characteristic chemicals and similarity index ranged from 73 to 91%. Prominent distinguishable bands were observed only in S. acuta, while S. cordifolia and S. rhombifolia shared most bands making them difficult to identify on chemical fingerprint basis. This report summarizes the genotypic and chemotypic diversity and the use of profiles for authentication of species of Sida complex.

  3. Identification of (antioxidative) plants in herbal pharmaceutical preparations and dietary supplements.

    PubMed

    Deconinck, Eric; Custers, Deborah; De Beer, Jacques Omer

    2015-01-01

    The standard procedures for the identification, authentication, and quality control of medicinal plants and herbs are nowadays limited to pure herbal products. No guidelines or procedures, describing the detection or identification of a targeted plant or herb in pharmaceutical preparations or dietary supplements, can be found. In these products the targeted plant is often present together with other components of herbal or synthetic origin. This chapter describes a strategy for the fast development of a chromatographic fingerprint approach that allows the identification of a targeted plant in herbal preparations and dietary supplements. The strategy consists of a standard chromatographic gradient that is tested for the targeted plant with different extraction solvents and different mobile phases. From the results obtained, the optimal fingerprint is selected. Subsequently the samples are analyzed according to the selected methodological parameters, and the obtained fingerprints can be compared with the one obtained for the pure herbal product or a standard preparation. Calculation of the dissimilarity between these fingerprints will result in a probability of presence of the targeted plant. Optionally mass spectrometry can be used to improve specificity, to confirm identification, or to identify molecules with a potential medicinal or antioxidant activity.

  4. A High Speed Finger-Print Optical Scanning Method

    DTIC Science & Technology

    2000-01-01

    biometrics technologies for authentication, from the view point of convenience and higher security, dactyloscopy is by far the best, much better than the...sensing technologies using static capacitance, thermal or optical detection, the optical detection is by far with the most potential to meet the...present time due to the low resolution of the inherent nature of thermal imaging technique. Besides, this method is easily influenced by environmental

  5. Multi-ingredients determination and fingerprint analysis of leaves from Ilex latifolia using ultra-performance liquid chromatography coupled with quadrupole time-of-flight mass spectrometry.

    PubMed

    Fan, Chunlin; Deng, Jiewei; Yang, Yunyun; Liu, Junshan; Wang, Ying; Zhang, Xiaoqi; Fai, Kuokchiu; Zhang, Qingwen; Ye, Wencai

    2013-10-01

    An ultra-performance liquid chromatography coupled with quadrupole time-of-flight mass spectrometry (UPLC-QTOF-MS) method integrating multi-ingredients determination and fingerprint analysis has been established for quality assessment and control of leaves from Ilex latifolia. The method possesses the advantages of speediness, efficiency, accuracy, and allows the multi-ingredients determination and fingerprint analysis in one chromatographic run within 13min. Multi-ingredients determination was performed based on the extracted ion chromatograms of the exact pseudo-molecular ions (with a 0.01Da window), and fingerprint analysis was performed based on the base peak chromatograms, obtained by negative-ion electrospray ionization QTOF-MS. The method validation results demonstrated our developed method possessing desirable specificity, linearity, precision and accuracy. The method was utilized to analyze 22 I. latifolia samples from different origins. The quality assessment was achieved by using both similarity analysis (SA) and principal component analysis (PCA), and the results from SA were consistent with those from PCA. Our experimental results demonstrate that the strategy integrated multi-ingredients determination and fingerprint analysis using UPLC-QTOF-MS technique is a useful approach for rapid pharmaceutical analysis, with promising prospects for the differentiation of origin, the determination of authenticity, and the overall quality assessment of herbal medicines. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Geographical provenance of palm oil by fatty acid and volatile compound fingerprinting techniques.

    PubMed

    Tres, A; Ruiz-Samblas, C; van der Veer, G; van Ruth, S M

    2013-04-15

    Analytical methods are required in addition to administrative controls to verify the geographical origin of vegetable oils such as palm oil in an objective manner. In this study the application of fatty acid and volatile organic compound fingerprinting in combination with chemometrics have been applied to verify the geographical origin of crude palm oil (continental scale). For this purpose 94 crude palm oil samples were collected from South East Asia (55), South America (11) and Africa (28). Partial least squares discriminant analysis (PLS-DA) was used to develop a hierarchical classification model by combining two consecutive binary PLS-DA models. First, a PLS-DA model was built to distinguish South East Asian from non-South East Asian palm oil samples. Then a second model was developed, only for the non-Asian samples, to discriminate African from South American crude palm oil. Models were externally validated by using them to predict the identity of new authentic samples. The fatty acid fingerprinting model revealed three misclassified samples. The volatile compound fingerprinting models showed an 88%, 100% and 100% accuracy for the South East Asian, African and American class, respectively. The verification of the geographical origin of crude palm oil is feasible by fatty acid and volatile compound fingerprinting. Further research is required to further validate the approach and to increase its spatial specificity to country/province scale. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Recent applications of multivariate data analysis methods in the authentication of rice and the most analyzed parameters: A review.

    PubMed

    Maione, Camila; Barbosa, Rommel Melgaço

    2018-01-24

    Rice is one of the most important staple foods around the world. Authentication of rice is one of the most addressed concerns in the present literature, which includes recognition of its geographical origin and variety, certification of organic rice and many other issues. Good results have been achieved by multivariate data analysis and data mining techniques when combined with specific parameters for ascertaining authenticity and many other useful characteristics of rice, such as quality, yield and others. This paper brings a review of the recent research projects on discrimination and authentication of rice using multivariate data analysis and data mining techniques. We found that data obtained from image processing, molecular and atomic spectroscopy, elemental fingerprinting, genetic markers, molecular content and others are promising sources of information regarding geographical origin, variety and other aspects of rice, being widely used combined with multivariate data analysis techniques. Principal component analysis and linear discriminant analysis are the preferred methods, but several other data classification techniques such as support vector machines, artificial neural networks and others are also frequently present in some studies and show high performance for discrimination of rice.

  8. Intersubject Differences in False Nonmatch Rates for a Fingerprint-Based Authentication System

    NASA Astrophysics Data System (ADS)

    Breebaart, Jeroen; Akkermans, Ton; Kelkboom, Emile

    2009-12-01

    The intersubject dependencies of false nonmatch rates were investigated for a minutiae-based biometric authentication process using single enrollment and verification measurements. A large number of genuine comparison scores were subjected to statistical inference tests that indicated that the number of false nonmatches depends on the subject and finger under test. This result was also observed if subjects associated with failures to enroll were excluded from the test set. The majority of the population (about 90%) showed a false nonmatch rate that was considerably smaller than the average false nonmatch rate of the complete population. The remaining 10% could be characterized as "goats due to their relatively high probability for a false nonmatch. The image quality reported by the template extraction module only weakly correlated with the genuine comparison scores. When multiple verification attempts were investigated, only a limited benefit was observed for "goats, since the conditional probability for a false nonmatch given earlier nonsuccessful attempts increased with the number of attempts. These observations suggest that (1) there is a need for improved identification of "goats during enrollment (e.g., using dedicated signal-driven analysis and classification methods and/or the use of multiple enrollment images) and (2) there should be alternative means for identity verification in the biometric system under test in case of two subsequent false nonmatches.

  9. Diffuse-light absorption spectroscopy by fiber optics for detecting and quantifying the adulteration of extra virgin olive oil

    NASA Astrophysics Data System (ADS)

    Mignani, A. G.; Ciaccheri, L.; Ottevaere, H.; Thienpont, H.; Conte, L.; Marega, M.; Cichelli, A.; Attilio, C.; Cimato, A.

    2010-09-01

    A fiber optic setup for diffuse-light absorption spectroscopy in the wide 400-1700 nm spectral range is experimented for detecting and quantifying the adulteration of extra virgin olive oil caused by lower-grade olive oils. Absorption measurements provide spectral fingerprints of authentic and adulterated oils. A multivariate processing of spectroscopic data is applied for discriminating the type of adulterant and for predicting its fraction.

  10. Construction of inorganic elemental fingerprint and multivariate statistical analysis of marine traditional Chinese medicine Meretricis concha from Rushan Bay

    NASA Astrophysics Data System (ADS)

    Wu, Xia; Zheng, Kang; Zhao, Fengjia; Zheng, Yongjun; Li, Yantuan

    2014-08-01

    Meretricis concha is a kind of marine traditional Chinese medicine (TCM), and has been commonly used for the treatment of asthma and scald burns. In order to investigate the relationship between the inorganic elemental fingerprint and the geographical origin identification of Meretricis concha, the elemental contents of M. concha from five sampling points in Rushan Bay have been determined by means of inductively coupled plasma optical emission spectrometry (ICP-OES). Based on the contents of 14 inorganic elements (Al, As, Cd, Co, Cr, Cu, Fe, Hg, Mn, Mo, Ni, Pb, Se, and Zn), the inorganic elemental fingerprint which well reflects the elemental characteristics was constructed. All the data from the five sampling points were discriminated with accuracy through hierarchical cluster analysis (HCA) and principle component analysis (PCA), indicating that a four-factor model which could explain approximately 80% of the detection data was established, and the elements Al, As, Cd, Cu, Ni and Pb could be viewed as the characteristic elements. This investigation suggests that the inorganic elemental fingerprint combined with multivariate statistical analysis is a promising method for verifying the geographical origin of M. concha, and this strategy should be valuable for the authenticity discrimination of some marine TCM.

  11. Fingerprinting analysis of Saposhnikovia divaricata using 1H nuclear magnetic resonance spectroscopy and high performance liquid chromatography.

    PubMed

    Xin, Yue-Yang; Deng, An-Jun; Du, Guan-Hua; Zhang, Jin-Lan; Qin, Hai-Lin

    2010-09-01

    The (1)H nuclear magnetic resonance ((1)H NMR) fingerprints of fractionated non-polar and polar extracts (control substance for plant drug [CSPD] A and B) from the roots of 12 specimens of Saposhnikovia divaricata (Turcz.) Schischk were achieved with Fourier Transform (FT)-NMR spectrometer and assigned by comparison to each other and to the (1)H NMR spectra of the isolated individual compounds. These fingerprints were found to be uniform in terms of the specificity for the implication of all 12 specimens being systematically of the same origin. The uniformity was further affirmed by high performance liquid chromatography (HPLC), which also revealed exactly identical specificity for the identified S. divaricata species with the (1)H NMR appearances of corresponding CSPD on the part of the composition of characteristic constituents when comparing to corresponding individual compounds. This investigation unambiguously shows that the specific signals from the chemotaxonomically significant compounds of chromones and coumarins in S. divaricata are exhibited distinctively in the composite features of both (1)H NMR fingerprints and HPLC profiles. The (1)H NMR and HPLC profiles established can successfully be used as reference for the authentication of the origin of S. divaricata species as well as for chemotaxonomic studies.

  12. Privacy and Security within Biobanking: The Role of Information Technology.

    PubMed

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  13. Data-Dependent Fingerprints for Wireless Device Authentication

    DTIC Science & Technology

    2014-05-20

    enhanced when using a modulation based on orthogonal frequency division multiplexing ( OFDM ) that has a large range of signal levels. However, in...at 70 MHz. The radios use OFDM with 64-point FFT block sizes for transmission so that the bandwidth is divided into Nd = 64 data and Nc = 5 cyclic...τℓTs) (1) where Ts is the OFDM symbol period (and therefore discrete-time sampling period) and L is the number of multipaths in the channel with

  14. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    PubMed

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  15. Performance evaluation of wavelet-based face verification on a PDA recorded database

    NASA Astrophysics Data System (ADS)

    Sellahewa, Harin; Jassim, Sabah A.

    2006-05-01

    The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.

  16. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques.

    PubMed

    Oliveira, Gislene B; Alewijn, Martin; Boerrigter-Eenling, Rita; van Ruth, Saskia M

    2015-08-25

    Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  17. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques

    PubMed Central

    Oliveira, Gislene B.; Alewijn, Martin; Boerrigter-Eenling, Rita; van Ruth, Saskia M.

    2015-01-01

    Consumers’ interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester—FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry—ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry—PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power. PMID:28231211

  18. [Study on HPLC fingerprint of Oldenlandia diffusa].

    PubMed

    Chen, Yan; Yao, Zhi-Hong; Dai, Yi; Cheng, Hong; Wen, Li-Rong; Zhou, Guang-Xiong; Yao, Xin-Sheng

    2012-06-01

    To establish the HPLC fingerprint chromatogram of Oldenlandia diffusa coupled with chemometrics means for the quality control of multi-batches of medicinal material. The separation was developed on C18 column(4.6 mm x 250 mm, 5 microm) by gradient elution with acetonitrile-water(both containing 0.1 per thousand (V/V) ocetic acid) as mobile phase at a flow rate of 0.8 mL/min, the detection wavelength at 238 nm and column temperature at 30 degrees C. The HPLC fingerprint chromatogram of Oldenlandia diffusa was set up and the main characteristic peaks were identified by comparing with chemical reference substance. The quality of 22 batches of medicinal material was evaluated by similarity assay as well as principal component analysis (PCA) and cluster analysis. The established HPLC fingerprint chromatogram of Oldenlandia diffusa was specific, precise, reproducible and stable. 11 peaks were chemically identified. The similarity of 17 batches of Oldenlandia diffusa was obviously higher than 5 batches of adulterants. PCA showed that 17 batches of Oldenlandia diffusa were in a domain and 5 batches of adulterants were far apart from the domain. The cluster analysis of the 22 batches of medicinal material showed that 17 batches of Oldenlandia diffusa were in a cluster while 5 batches of adulterants were excluded. Further cluster analysis was carried out for the quality consistency of 17 batches of Oldenlandia diffusa and accordingly they were devided into 4 clusters. With the combination of chemometrics means, the HPLC fingerprint chromatogram provides a method for evaluation of authenticity and quality control of Oldenlandia diffusa, which is favorable to improve overall quality control of Oldenlandia diffusa.

  19. A novel method to rapidly distinguish the geographical origin of traditional fermented-salted vegetables by mass fingerprinting

    PubMed Central

    Yoon, So-Ra; Kim, Sung Hyun; Lee, Hae-Won

    2017-01-01

    The geographical origin of kimchi is of interest to consumers and producers because the prices of commercial kimchi products can vary significantly according to the geographical origin. Hence, social issues related to the geographical origin of kimchi in Korea have emerged as a major problem. In this study, the geographical origin of kimchi was determined by comparing the mass fingerprints obtained for Korean and Chinese kimchi samples by MALDI-TOF MS with multivariate analysis. The results obtained herein provide an accurate, powerful tool to clearly discriminate kimchi samples based on their geographical origin within a short time and to ensure food authenticity, which is of significance in the kimchi industry. Furthermore, our MALDI-TOF MS method could be applied to determining the geographical origin of other fermented-salted vegetables at a reduced cost in shorter times. PMID:29149220

  20. A novel method to rapidly distinguish the geographical origin of traditional fermented-salted vegetables by mass fingerprinting.

    PubMed

    Yoon, So-Ra; Kim, Sung Hyun; Lee, Hae-Won; Ha, Ji-Hyoung

    2017-01-01

    The geographical origin of kimchi is of interest to consumers and producers because the prices of commercial kimchi products can vary significantly according to the geographical origin. Hence, social issues related to the geographical origin of kimchi in Korea have emerged as a major problem. In this study, the geographical origin of kimchi was determined by comparing the mass fingerprints obtained for Korean and Chinese kimchi samples by MALDI-TOF MS with multivariate analysis. The results obtained herein provide an accurate, powerful tool to clearly discriminate kimchi samples based on their geographical origin within a short time and to ensure food authenticity, which is of significance in the kimchi industry. Furthermore, our MALDI-TOF MS method could be applied to determining the geographical origin of other fermented-salted vegetables at a reduced cost in shorter times.

  1. Characteristic fingerprinting based on macamides for discrimination of maca (Lepidium meyenii) by LC/MS/MS and multivariate statistical analysis.

    PubMed

    Pan, Yu; Zhang, Ji; Li, Hong; Wang, Yuan-Zhong; Li, Wan-Yi

    2016-10-01

    Macamides with a benzylalkylamide nucleus are characteristic and major bioactive compounds in the functional food maca (Lepidium meyenii Walp). The aim of this study was to explore variations in macamide content among maca from China and Peru. Twenty-seven batches of maca hypocotyls with different phenotypes, sampled from different geographical origins, were extracted and profiled by liquid chromatography with ultraviolet detection/tandem mass spectrometry (LC-UV/MS/MS). Twelve macamides were identified by MS operated in multiple scanning modes. Similarity analysis showed that maca samples differed significantly in their macamide fingerprinting. Partial least squares discriminant analysis (PLS-DA) was used to differentiate samples according to their geographical origin and to identify the most relevant variables in the classification model. The prediction accuracy for raw maca was 91% and five macamides were selected and considered as chemical markers for sample classification. When combined with a PLS-DA model, characteristic fingerprinting based on macamides could be recommended for labelling for the authentication of maca from different geographical origins. The results provided potential evidence for the relationships between environmental or other factors and distribution of macamides. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  2. Nanoscale diffusive memristor crossbars as physical unclonable functions.

    PubMed

    Zhang, R; Jiang, H; Wang, Z R; Lin, P; Zhuo, Y; Holcomb, D; Zhang, D H; Yang, J J; Xia, Q

    2018-02-08

    Physical unclonable functions have emerged as promising hardware security primitives for device authentication and key generation in the era of the Internet of Things. Herein, we report novel physical unclonable functions built upon the crossbars of nanoscale diffusive memristors that translate the stochastic distribution of Ag clusters in a SiO 2 matrix into a random binary bitmap that serves as a device fingerprint. The random dispersion of Ag led to an uneven number of clusters at each cross-point, which in turn resulted in a stochastic ability to switch in the Ag:SiO 2 diffusive memristors in an array. The randomness of the dispersion was a barrier to fingerprint cloning and the unique fingerprints of each device were persistent after fabrication. Using an optimized fabrication procedure, we maximized the randomness and achieved an inter-class Hamming distance of 50.68%. We also discovered that the bits were not flipping after over 10 4 s at 400 K, suggesting superior reliability of our physical unclonable functions. In addition, our diffusive memristor-based physical unclonable functions were easy to fabricate and did not require complicated post-processing for digitization and thus, provide new opportunities in hardware security applications.

  3. The Synthesis of Human Placental Lactogen by Ribosomes Derived from Human Placenta

    PubMed Central

    Boime, Irving; Boguslawski, Sophie

    1974-01-01

    In a very active cell-free system containing polysomes derived from human placenta and a cell-sap fraction prepared from ascites tumor cells, the synthesis of the hormone human placental lactogen (HPL) was detected. The identification was based on the following: (a) The in vitro synthesized protein labeled with [35S]methionine migrated at the same rate as authentic HPL on sodium dodecyl sulfate-polyacrylamide gels and (b) tryptic fingerprint analysis of the labeled protein yielded peptides having the same mobilities as seen with the same analysis of purified HPL. The amount of HPL synthesized in a cell-free system containing polysomes derived from term placenta was about 10% of the total proteins synthesized and in a comparable system containing first trimester ribosomes the level of synthesis was about 5%. These data suggest the potential for quantitating the HPL mRNA activity as a function of the period of gestation and for isolating the mRNA itself. Images PMID:4524639

  4. The biometric menagerie.

    PubMed

    Yager, Neil; Dunstone, Ted

    2010-02-01

    It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

  5. Detection of counterfeit brand spirits using 1H NMR fingerprints in comparison to sensory analysis.

    PubMed

    Kuballa, Thomas; Hausler, Thomas; Okaru, Alex O; Neufeld, Maria; Abuga, Kennedy O; Kibwage, Isaac O; Rehm, Jürgen; Luy, Burkhard; Walch, Stephan G; Lachenmeier, Dirk W

    2018-04-15

    Beverage fraud involving counterfeiting of brand spirits is an increasing problem not only due to deception of the consumer but also because it poses health risks e.g. from possible methanol admixture. Suspicious spirit samples from Russia and Kenya were analysed using 1 H nuclear magnetic resonance (NMR) spectroscopy in comparison to authentic products. Using linear regression analysis of spectral integral values, 4 counterfeited samples from Russia and 2 from Kenya were easily identifiable with R 2  < 0.7. Sensory analysis using triangle test methodology confirmed significant taste differences between counterfeited and authentic samples but the assessors were unable to correctly identify the counterfeited product in the majority of cases. An important conclusion is that consumers cannot assumed to be self-responsible when consuming counterfeit alcohol because there is no general ability to organoleptically detect counterfeit alcohol. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Multielement fingerprinting as a tool in origin authentication of PGI food products: Tropea red onion.

    PubMed

    Furia, Emilia; Naccarato, Attilio; Sindona, Giovanni; Stabile, Gaetano; Tagarelli, Antonio

    2011-08-10

    Tropea red onion ( Allium cepa L. var. Tropea) is among the most highly appreciated Italian products. It is cultivated in specific areas of Calabria and, due to its characteristics, was recently awarded with the protected geographical indications (PGI) certification from the European Union. A reliable classification of onion samples in groups corresponding to "Tropea" and "non-Tropea" categories is now available to the producers. This important goal has been achieved through the evaluation of three supervised chemometric approaches. Onion samples with PGI brand (120) and onion samples not cultivated following the production regulations (80) were digested by a closed-vessel microwave oven system. ICP-MS equipped with a dynamic reaction cell was used to determine the concentrations of 25 elements (Al, Ba, Ca, Cd, Ce, Cr, Dy, Eu, Fe, Ga, Gd, Ho, La, Mg, Mn, Na, Nd, Ni, Pr, Rb, Sm, Sr, Tl, Y, and Zn). The multielement fingerprint was processed using linear discriminant analysis (LDA) (standard and stepwise), soft independent modeling of class analogy (SIMCA), and back-propagation artificial neural network (BP-ANN). The cross-validation procedure has shown good results in terms of the prediction ability for all of the chemometric models: standard LDA, 94.0%; stepwise LDA, 94.5%; SIMCA, 95.5%; and BP-ANN, 91.5%.

  7. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.

    PubMed

    Ehatisham-Ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-09-06

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.

  8. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing

    PubMed Central

    Ehatisham-ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-01-01

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. PMID:28878177

  9. A metabolic fingerprinting approach based on selected ion flow tube mass spectrometry (SIFT-MS) and chemometrics: A reliable tool for Mediterranean origin-labeled olive oils authentication.

    PubMed

    Bajoub, Aadil; Medina-Rodríguez, Santiago; Ajal, El Amine; Cuadros-Rodríguez, Luis; Monasterio, Romina Paula; Vercammen, Joeri; Fernández-Gutiérrez, Alberto; Carrasco-Pancorbo, Alegría

    2018-04-01

    Selected Ion flow tube mass spectrometry (SIFT-MS) in combination with chemometrics was used to authenticate the geographical origin of Mediterranean virgin olive oils (VOOs) produced under geographical origin labels. In particular, 130 oil samples from six different Mediterranean regions (Kalamata (Greece); Toscana (Italy); Meknès and Tyout (Morocco); and Priego de Córdoba and Baena (Spain)) were considered. The headspace volatile fingerprints were measured by SIFT-MS in full scan with H 3 O + , NO + and O 2 + as precursor ions and the results were subjected to chemometric treatments. Principal Component Analysis (PCA) was used for preliminary multivariate data analysis and Partial Least Squares-Discriminant Analysis (PLS-DA) was applied to build different models (considering the three reagent ions) to classify samples according to the country of origin and regions (within the same country). The multi-class PLS-DA models showed very good performance in terms of fitting accuracy (98.90-100%) and prediction accuracy (96.70-100% accuracy for cross validation and 97.30-100% accuracy for external validation (test set)). Considering the two-class PLS-DA models, the one for the Spanish samples showed 100% sensitivity, specificity and accuracy in calibration, cross validation and external validation; the model for Moroccan oils also showed very satisfactory results (with perfect scores for almost every parameter in all the cases). Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Chemometrics Methods for Specificity, Authenticity and Traceability Analysis of Olive Oils: Principles, Classifications and Applications.

    PubMed

    Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil

    2016-11-17

    Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends' preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors.

  11. Authentication, privacy, security can exploit brainwave by biomarker

    NASA Astrophysics Data System (ADS)

    Jenkins, Jeffrey; Sweet, Charles; Sweet, James; Noel, Steven; Szu, Harold

    2014-05-01

    We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (PIN) verification systems with an additional layer of classified access biometrics. Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuli response images from other users, as well as one of their own, for the purpose of authentication. We performed testing and evaluation of the Authenticity Privacy and Security (APS) brainwave biometrics, similar to the internal organ of the human eye's iris which cannot easily be altered. `Aha' recognition through stimulus-response habituation can serve as a biomarker, similar to keystroke dynamics analysis for inter and intra key fluctuation time of a memorized PIN number (FIST). Using a non-tethered Electroencephalogram (EEG) wireless smartphone/pc monitor interface, we explore the appropriate stimuli-response biomarker present in DTAB low frequency group waves. Prior to login, the user is shown a series of images on a computer display. They have been primed to click their mouse when the image is presented. DTAB waves are collected with a wireless EEG and are sent via Smartphone to a cloud based processing infrastructure. There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's mental performance baseline. Towards that goal, we describe an infrastructure that supports distributed verification for web-based EEG authentication. The performance of machine learning on the relative Power Spectral Density EEG data may uncover features required for subsequent access to web or media content. Our approach provides a scalable framework wrapped into a robust Neuro-Informatics toolkit, viable for use in the Biomedical and mental health communities, as well as numerous consumer applications.

  12. Chemical fingerprint and simultaneous determination of alkaloids and flavonoids in aerial parts of genus Peganum indigenous to China based on HPLC-UV: application of analysis on secondary metabolites accumulation.

    PubMed

    Wen, Fangfang; Cheng, Xuemei; Liu, Wei; Xuan, Min; Zhang, Lei; Zhao, Xin; Shan, Meng; Li, Yan; Teng, Liang; Wang, Zhengtao; Wang, Changhong

    2014-12-01

    The aerial parts of genus Peganum are officially used in traditional Chinese medicine. The paper aims to establish a high-performance liquid chromatography (HPLC) method for fingerprint analysis and simultaneous determination of three alkaloids and two flavonoids in aerial parts of genus Peganum, and to analyze accumulative difference of secondary metabolites in inter-species, individuals of plants, inter-/intra-population and from different growing seasons. HPLC analysis was performed on a C18 column with gradient elution using 0.1% trifloroacetic acid and acetonitrile as mobile phase and detected at 265 nm, by conventional methodology validation. For fingerprint analysis, the RSDs of relative retention time and relative peak area of the characteristic peaks were within 0.07-0.78 and 0.94-9.09%, respectively. For simultaneous determination of vasicine, harmaline, harmine, deacetylpeganetin and peganetin, all calibration curves showed good linearity (r > 0.9990) within the test range. The relative standard deviations of precision, repeatability and stability test did not exceed 2.37, 2.68 and 2.67%, respectively. The average recoveries for the five analytes were between 96.47 and 101.20%. HPLC fingerprints play a minor role in authenticating and differentiating the herbs of different species of genus Peganum. However, the secondary metabolites levels of alkaloids and flavonoids in aerial parts of genus Peganum rely on species-, habitat-, and growth season-dependent accumulation. Copyright © 2014 John Wiley & Sons, Ltd.

  13. Recent advance in DNA-based traceability and authentication of livestock meat PDO and PGI products.

    PubMed

    Nicoloso, Letizia; Crepaldi, Paola; Mazza, Raffaele; Ajmone-Marsan, Paolo; Negrini, Riccardo

    2013-04-01

    This review updates the available molecular techniques and technologies and discusses how they can be used for traceability, food control and enforcement activities. The review also provides examples on how molecular techniques succeeded to trace back unknowns to their breeds of origin, to fingerprint single individuals and to generate evidence in court cases. The examples demonstrate the potential of the DNA based traceability techniques and explore possibilities for translating the next generation genomics tools into a food and feed control and enforcement framework.

  14. System and method for authentication

    DOEpatents

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  15. Tongue prints: A novel biometric and potential forensic tool.

    PubMed

    Radhika, T; Jeddy, Nadeem; Nithya, S

    2016-01-01

    Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated.

  16. 3D fingerprint imaging system based on full-field fringe projection profilometry

    NASA Astrophysics Data System (ADS)

    Huang, Shujun; Zhang, Zonghua; Zhao, Yan; Dai, Jie; Chen, Chao; Xu, Yongjia; Zhang, E.; Xie, Lili

    2014-01-01

    As an unique, unchangeable and easily acquired biometrics, fingerprint has been widely studied in academics and applied in many fields over the years. The traditional fingerprint recognition methods are based on the obtained 2D feature of fingerprint. However, fingerprint is a 3D biological characteristic. The mapping from 3D to 2D loses 1D information and causes nonlinear distortion of the captured fingerprint. Therefore, it is becoming more and more important to obtain 3D fingerprint information for recognition. In this paper, a novel 3D fingerprint imaging system is presented based on fringe projection technique to obtain 3D features and the corresponding color texture information. A series of color sinusoidal fringe patterns with optimum three-fringe numbers are projected onto a finger surface. From another viewpoint, the fringe patterns are deformed by the finger surface and captured by a CCD camera. 3D shape data of the finger can be obtained from the captured fringe pattern images. This paper studies the prototype of the 3D fingerprint imaging system, including principle of 3D fingerprint acquisition, hardware design of the 3D imaging system, 3D calibration of the system, and software development. Some experiments are carried out by acquiring several 3D fingerprint data. The experimental results demonstrate the feasibility of the proposed 3D fingerprint imaging system.

  17. Characteristic fingerprint based on gingerol derivative analysis for discrimination of ginger (Zingiber officinale) according to geographical origin using HPLC-DAD combined with chemometrics.

    PubMed

    Yudthavorasit, Soparat; Wongravee, Kanet; Leepipatpiboon, Natchanun

    2014-09-01

    Chromatographic fingerprints of gingers from five different ginger-producing countries (China, India, Malaysia, Thailand and Vietnam) were newly established to discriminate the origin of ginger. The pungent bioactive principles of ginger, gingerols and six other gingerol-related compounds were determined and identified. Their variations in HPLC profiles create the characteristic pattern of each origin by employing similarity analysis, hierarchical cluster analysis (HCA), principal component analysis (PCA) and linear discriminant analysis (LDA). As results, the ginger profiles tended to be grouped and separated on the basis of the geographical closeness of the countries of origin. An effective mathematical model with high predictive ability was obtained and chemical markers for each origin were also identified as the characteristic active compounds to differentiate the ginger origin. The proposed method is useful for quality control of ginger in case of origin labelling and to assess food authenticity issues. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. New approach: Chemical and fluorescence profiling of NZ honeys.

    PubMed

    Bong, Jessie; Loomes, Kerry M; Lin, Bin; Stephens, Jonathan M

    2018-11-30

    New Zealand manuka (Leptospermum scoparium) and kanuka (Kunzea ericoides) honeys contain a unique array of chemical markers useful for chemical fingerprinting. We investigated the presence of 13 potential marker compounds in nectars of the major honey crop species. We confirmed that leptosperin, lepteridine, 2'-methoxyacetophenone, and 2-methoxybenzoic acid are exclusive to manuka nectar whereas lumichrome is unique to kanuka nectar. 3-Phenyllactic acid and 4-hydroxyphenyllactic acid are present in manuka and kanuka nectars. Leptosperin, lepteridine, 3-phenyllactic acid, and 4-hydroxyphenyllactic acid are chemically stable over prolonged storage, but not 2-methoxybenzoic acid and 2'-methoxyacetophenone. Accordingly, leptosperin and lepteridine are definitive chemical markers for authentication of manuka honey. An optimal concentration cut-off was established for the floral source-specific markers: leptosperin (94mg/kg), lepteridine (2.1mg/kg), 2'-methoxyacetophenone (2.0mg/kg) for manuka honey, and lumichrome (4.5mg/kg) for kanuka honey. The use of leptosperin and lepteridine as fluorescence markers for manuka honey authentication is reinforced. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Headspace Analysis of Philippine Civet Coffee Beans Using Gas Chromatography-Mass Spectrometry and Electronic Nose

    NASA Astrophysics Data System (ADS)

    Ongo, E.; Sevilla, F.; Antonelli, A.; Sberveglieri, G.; Montevecchi, G.; Sberveglieri, V.; de Paola, E. L.; Concina, I.; Falasconi, M.

    2011-11-01

    Civet coffee, the most expensive and best coffee in the world, is an economically important export product of the Philippines. With a growing threat of food adulteration and counterfeiting, a need for quality authentication is essential to protect the integrity and strong market value of Philippine civet coffee. At present, there is no internationally accepted method of verifying whether a bean is an authentic civet coffee. This study presented a practical and promising approach to identify and establish the headspace qualitative profile of Philippine civet coffee using electronic nose (E-nose) and gas chromatography-mass spectrometry (GC-MS). E-nose analysis revealed that aroma characteristic is one of the most important quality indicators of civet coffee. The findings were supported by GC-MS analysis. Principal component analysis (PCA) exhibited a clearly separated civet coffees from their control beans. The chromatographic fingerprints indicated that civet coffees differed with their control beans in terms of composition and concentration of individual volatile constituents.

  20. Authentication and dating of biomass components of industrial materials; links to sustainable technology

    NASA Astrophysics Data System (ADS)

    Currie, L. A.; Klinedinst, D. B.; Burch, R.; Feltham, N.; Dorsch, R.

    2000-10-01

    There are twin pressures mounting in US industry for increased utilization of biomass feedstocks and biotechnology in production. The more demanding pressure relates to economic sustainability, that is, because of increased competition globally, businesses will fail unless a minimum margin of profit is maintained while meeting the demands of consumers for less expensive products. The second pressure relates to "Green Technology" where environmental sustainability, linked for example to concerns about climate change and the preservation of natural resources, represents a worldwide driving force to reduce the consumption of fossil hydrocarbons. The resulting transition of biomass production in the industrial plant, as opposed to the agricultural plant, has resulted in an increasing need for isotopic methods of authenticating and dating feedstocks, intermediates and industrial products. The research described represents a prototypical case study leading to the definition of a unique dual isotopic ( 13C, 14C) signature or "fingerprint" for a new biomass-based commercial polymer, polypropylene terephthalate (3GT).

  1. Chemometrics Methods for Specificity, Authenticity and Traceability Analysis of Olive Oils: Principles, Classifications and Applications

    PubMed Central

    Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil

    2016-01-01

    Background. Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends’ preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. Methods. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. Results. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Conclusion. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors. PMID:28231172

  2. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  3. Plant seed species identification from chemical fingerprints: a high-throughput application of direct analysis in real time mass spectrometry.

    PubMed

    Lesiak, Ashton D; Cody, Robert B; Dane, A John; Musah, Rabi A

    2015-09-01

    Plant species identification based on the morphological features of plant parts is a well-established science in botany. However, species identification from seeds has largely been unexplored, despite the fact that the seeds contain all of the genetic information that distinguishes one plant from another. Using seeds of genus Datura plants, we show here that the mass spectrum-derived chemical fingerprints for seeds of the same species are similar. On the other hand, seeds from different species within the same genus display distinct chemical signatures, even though they may contain similar characteristic biomarkers. The intraspecies chemical signature similarities on the one hand, and interspecies fingerprint differences on the other, can be processed by multivariate statistical analysis methods to enable rapid species-level identification and differentiation. The chemical fingerprints can be acquired rapidly and in a high-throughput manner by direct analysis in real time mass spectrometry (DART-MS) analysis of the seeds in their native form, without use of a solvent extract. Importantly, knowledge of the identity of the detected molecules is not required for species level identification. However, confirmation of the presence within the seeds of various characteristic tropane and other alkaloids, including atropine, scopolamine, scopoline, tropine, tropinone, and tyramine, was accomplished by comparison of the in-source collision-induced dissociation (CID) fragmentation patterns of authentic standards, to the fragmentation patterns observed in the seeds when analyzed under similar in-source CID conditions. The advantages, applications, and implications of the chemometric processing of DART-MS derived seed chemical signatures for species level identification and differentiation are discussed.

  4. Use of flow injection mass spectrometric fingerprinting and chemometrics for differentiation of three black cohosh species

    NASA Astrophysics Data System (ADS)

    Huang, Huilian; Sun, Jianghao; McCoy, Joe-Ann; Zhong, Haiyan; Fletcher, Edward J.; Harnly, James; Chen, Pei

    2015-03-01

    Flow injection mass spectrometry (FIMS) was used to provide chemical fingerprints of black cohosh (Actaea racemosa L.) in a manner of minutes by omitting the separation step. This method has proven to be a powerful tool for botanical authentication and in this study it was used to distinguish between three Actaea species prior to a more detailed chemical analysis using ultra high-performance liquid chromatography high-resolution mass spectrometry (UHPLC-HRMS). Black cohosh has become increasingly popular as a dietary supplement in the United States for the treatment of symptoms related to menopause. However, it has been known to be adulterated with the Asian Actaea dahurica (Turcz. ex Fisch. & C.A.Mey.) Franch. species (syn. Cimicifuga dahurica (Turcz.) Maxim). Existing methods for identification of black cohosh and differentiation of Actaea species are usually lengthy, laborious, and lack robustness, often based on the comparison of a few pre-selected components. Chemical fingerprints were obtained for 77 black cohosh samples and their related species using FIMS in the negative ion mode. The analysis time for each sample was less than 2 min. All data were processed using principal component analysis (PCA). FIMS fingerprints could readily differentiate all three species. Representative samples from each of the three species were further examined using UHPLC-MS to provide detailed profiles of the chemical differences between the three species and were compared to the PCA loadings. This study demonstrates a simple, fast, and easy analytical method that can be used to differentiate A. racemosa, Actaea podocarpa, and A. dahurica.

  5. Genetic Profiling Reveals Cross-Contamination and Misidentification of 6 Adenoid Cystic Carcinoma Cell Lines: ACC2, ACC3, ACCM, ACCNS, ACCS and CAC2

    PubMed Central

    Phuchareon, Janyaporn; Ohta, Yoshihito; Woo, Jonathan M.; Eisele, David W.; Tetsu, Osamu

    2009-01-01

    Adenoid cystic carcinoma (ACC) is the second most common malignant neoplasm of the salivary glands. Most patients survive more than 5 years after surgery and postoperative radiation therapy. The 10 year survival rate, however, drops to 40%, due to locoregional recurrences and distant metastases. Improving long-term survival in ACC requires the development of more effective systemic therapies based on a better understanding of the biologic behavior of ACC. Much preclinical research in this field involves the use of cultured cells and, to date, several ACC cell lines have been established. Authentication of these cell lines, however, has not been reported. We performed DNA fingerprint analysis on six ACC cell lines using short tandem repeat (STR) examinations and found that all six cell lines had been contaminated with other cells. ACC2, ACC3, and ACCM were determined to be cervical cancer cells (HeLa cells), whereas the ACCS cell line was composed of T24 urinary bladder cancer cells. ACCNS and CAC2 cells were contaminated with cells derived from non-human mammalian species: the cells labeled ACCNS were mouse cells and the CAC2 cells were rat cells. These observations suggest that future studies using ACC cell lines should include cell line authentication to avoid the use of contaminated or non-human cells. PMID:19557180

  6. Altered fingerprints: analysis and detection.

    PubMed

    Yoon, Soweon; Feng, Jianjiang; Jain, Anil K

    2012-03-01

    The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Several cases of fingerprint obfuscation have been reported in the press. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly. The main contributions of this paper are: 1) compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing AFIS, 2) investigating the impact of fingerprint alteration on the accuracy of a commercial fingerprint matcher, 3) classifying the alterations into three major categories and suggesting possible countermeasures, 4) developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae distribution, and 5) evaluating the proposed technique and the NFIQ algorithm on a large database of altered fingerprints provided by a law enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need to further pursue this problem.

  7. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis.

    PubMed

    Cheng, Yezeng; Larin, Kirill V

    2006-12-20

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  8. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis

    NASA Astrophysics Data System (ADS)

    Cheng, Yezeng; Larin, Kirill V.

    2006-12-01

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  9. Attendance fingerprint identification system using arduino and single board computer

    NASA Astrophysics Data System (ADS)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  10. Improving the recognition of fingerprint biometric system using enhanced image fusion

    NASA Astrophysics Data System (ADS)

    Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma

    2010-04-01

    Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.

  11. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    PubMed

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.

  12. Unbiased metabolite profiling by liquid chromatography-quadrupole time-of-flight mass spectrometry and multivariate data analysis for herbal authentication: classification of seven Lonicera species flower buds.

    PubMed

    Gao, Wen; Yang, Hua; Qi, Lian-Wen; Liu, E-Hu; Ren, Mei-Ting; Yan, Yu-Ting; Chen, Jun; Li, Ping

    2012-07-06

    Plant-based medicines become increasingly popular over the world. Authentication of herbal raw materials is important to ensure their safety and efficacy. Some herbs belonging to closely related species but differing in medicinal properties are difficult to be identified because of similar morphological and microscopic characteristics. Chromatographic fingerprinting is an alternative method to distinguish them. Existing approaches do not allow a comprehensive analysis for herbal authentication. We have now developed a strategy consisting of (1) full metabolic profiling of herbal medicines by rapid resolution liquid chromatography (RRLC) combined with quadrupole time-of-flight mass spectrometry (QTOF MS), (2) global analysis of non-targeted compounds by molecular feature extraction algorithm, (3) multivariate statistical analysis for classification and prediction, and (4) marker compounds characterization. This approach has provided a fast and unbiased comparative multivariate analysis of the metabolite composition of 33-batch samples covering seven Lonicera species. Individual metabolic profiles are performed at the level of molecular fragments without prior structural assignment. In the entire set, the obtained classifier for seven Lonicera species flower buds showed good prediction performance and a total of 82 statistically different components were rapidly obtained by the strategy. The elemental compositions of discriminative metabolites were characterized by the accurate mass measurement of the pseudomolecular ions and their chemical types were assigned by the MS/MS spectra. The high-resolution, comprehensive and unbiased strategy for metabolite data analysis presented here is powerful and opens the new direction of authentication in herbal analysis. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Accurate, fast, and secure biometric fingerprint recognition system utilizing sensor fusion of fingerprint patterns

    NASA Astrophysics Data System (ADS)

    El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy

    2011-04-01

    Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.

  14. A Coordinated Research Project on the Implementation of Nuclear Techniques to Improve Food Traceability

    NASA Astrophysics Data System (ADS)

    Frew, Russell; Cannavan, Andrew; Zandric, Zora; Maestroni, Britt; Abrahim, Aiman

    2013-04-01

    Traceability systems play a key role in assuring a safe and reliable food supply. Analytical techniques harnessing the spatial patterns in distribution of stable isotope and trace element ratios can be used for the determination of the provenance of food. Such techniques offer the potential to enhance global trade by providing an independent means of verifying "paper" traceability systems and can also help to prove authenticity, to combat fraudulent practices, and to control adulteration, which are important issues for economic, religious or cultural reasons. To address some of the challenges that developing countries face in attempting to implement effective food traceability systems, the IAEA, through its Joint FAO/IAEA Division on Nuclear Techniques in Food and Agriculture, has initiated a 5-year coordinated research project involving institutes in 15 developing and developed countries (Austria, Botswana, Chile, China, France, India, Lebanon, Morocco, Portugal, Singapore, Sweden, Thailand, Uganda, UK, USA). The objective is to help in member state laboratories to establish robust analytical techniques and databases, validated to international standards, to determine the provenance of food. Nuclear techniques such as stable isotope and multi-element analysis, along with complementary methods, will be applied for the verification of food traceability systems and claims related to food origin, production, and authenticity. This integrated and multidisciplinary approach to strengthening capacity in food traceability will contribute to the effective implementation of holistic systems for food safety and control. The project focuses mainly on the development of techniques to confirm product authenticity, with several research partners also considering food safety issues. Research topics encompass determination of the geographical origin of a variety of commodities, including seed oils, rice, wine, olive oil, wheat, orange juice, fish, groundnuts, tea, pork, honey and coffee, the adulteration of milk with soy protein, chemical contamination of food products, and inhomogeneity in isotopic ratios in poultry and eggs as a means to determine production history. Analytical techniques include stable isotope ratio measurements (2H/1H, 13C/12C, 15N/14N, 18O/16O, 34S/32S, 87Sr/86Sr, 208Pb/207Pb/206Pb), elemental analysis, DNA fingerprinting, fatty acid and other biomolecule profiling, chromatography-mass spectrometry and near infra-red spectroscopy.

  15. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    PubMed Central

    Chen, Chi-Jim; Pai, Tun-Wen; Cheng, Mox

    2015-01-01

    A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS), successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM), based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates. PMID:25835186

  16. Investigating the relationship between raw milk bacterial composition, as described by intergenic transcribed spacer-PCR fingerprinting, and pasture altitude.

    PubMed

    Bonizzi, I; Buffoni, J N; Feligini, M; Enne, G

    2009-10-01

    To assess the bacterial biodiversity level in bovine raw milk used to produce Fontina, a Protected Designation of Origin cheese manufactured at high-altitude pastures and in valleys of Valle d'Aosta region (North-western Italian Alps) without any starters. To study the relation between microbial composition and pasture altitude, in order to distinguish high-altitude milk against valley and lowland milk. The microflora from milks sampled at different alpine pasture, valley and lowland farms were fingerprinted by PCR of the 16S-23S intergenic transcribed spacers (ITS-PCR). The resulting band patterns were analysed by generalized multivariate statistical techniques to handle discrete (band presence-absence) and continuous (altitude) information. The fingerprints featured numerous bands and marked variability indicating complex, differentiated bacterial communities. Alpine pasture milks were distinguished from lowland ones by cluster analysis, while this technique less clearly discriminated alpine pasture and valley samples. Generalized principal component analysis and clustering-after-ordination enabled a more effective distinction of alpine pasture, valley and lowland samples. Alpine raw milks for Fontina production contain highly diverse bacterial communities, the composition of which is related to the altitude of the pasture where milk was produced. This research may provide analytical support to the important issue represented by the authentication of the geographical origin of alpine milk productions.

  17. An effective one-dimensional anisotropic fingerprint enhancement algorithm

    NASA Astrophysics Data System (ADS)

    Ye, Zhendong; Xie, Mei

    2012-01-01

    Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.

  18. An effective one-dimensional anisotropic fingerprint enhancement algorithm

    NASA Astrophysics Data System (ADS)

    Ye, Zhendong; Xie, Mei

    2011-12-01

    Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.

  19. Fingerprint recognition system by use of graph matching

    NASA Astrophysics Data System (ADS)

    Shen, Wei; Shen, Jun; Zheng, Huicheng

    2001-09-01

    Fingerprint recognition is an important subject in biometrics to identify or verify persons by physiological characteristics, and has found wide applications in different domains. In the present paper, we present a finger recognition system that combines singular points and structures. The principal steps of processing in our system are: preprocessing and ridge segmentation, singular point extraction and selection, graph representation, and finger recognition by graphs matching. Our fingerprint recognition system is implemented and tested for many fingerprint images and the experimental result are satisfactory. Different techniques are used in our system, such as fast calculation of orientation field, local fuzzy dynamical thresholding, algebraic analysis of connections and fingerprints representation and matching by graphs. Wed find that for fingerprint database that is not very large, the recognition rate is very high even without using a prior coarse category classification. This system works well for both one-to-few and one-to-many problems.

  20. Differentiation of Chinese rice wines from different wineries based on mineral elemental fingerprinting.

    PubMed

    Shen, Fei; Wu, Jian; Ying, Yibin; Li, Bobin; Jiang, Tao

    2013-12-15

    Discrimination of Chinese rice wines from three well-known wineries ("Guyuelongshan", "Kuaijishan", and "Pagoda") in China has been carried out according to mineral element contents in this study. Nineteen macro and trace mineral elements (Na, Mg, Al, K, Ca, Mn, Fe, Cu, Zn, V, Cr, Co, Ni, As, Se, Mo, Cd, Ba and Pb) were determined by inductively coupled plasma mass spectrometry (ICP-MS) in 117 samples. Then the experimental data were subjected to analysis of variance (ANOVA) and principal component analysis (PCA) to reveal significant differences and potential patterns between samples. Stepwise linear discriminant analysis (LDA) and partial least square discriminant analysis (PLS-DA) were applied to develop classification models and achieved correct classified rates of 100% and 97.4% for the prediction sample set, respectively. The discrimination could be attributed to different raw materials (mainly water) and elaboration processes employed. The results indicate that the element compositions combined with multivariate analysis can be used as fingerprinting techniques to protect prestigious wineries and enable the authenticity of Chinese rice wine. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Assessment of Web-Based Authentication Methods in the U.S.: Comparing E-Learning Systems to Internet Healthcare Information Systems

    ERIC Educational Resources Information Center

    Mattord, Herbert J.

    2012-01-01

    Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…

  2. Efficient Fingercode Classification

    NASA Astrophysics Data System (ADS)

    Sun, Hong-Wei; Law, Kwok-Yan; Gollmann, Dieter; Chung, Siu-Leung; Li, Jian-Bin; Sun, Jia-Guang

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e. g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  3. Capturing the vital vascular fingerprint with optical coherence tomography

    PubMed Central

    Liu, Gangjun; Chen, Zhongping

    2014-01-01

    Using fingerprints as a method to identify an individual has been accepted in forensics since the nineteenth century, and the fingerprint has become one of the most widely used biometric characteristics. Most of the modern fingerprint recognition systems are based on the print pattern of the finger surface and are not robust against spoof attaching. We demonstrate a novel vital vascular fingerprint system using Doppler optical coherence tomography that provides highly sensitive and reliable personal identification. Because the system is based on blood flow, which only exists in a livng person, the technique is robust against spoof attaching. PMID:23913068

  4. Application of ¹H NMR for the characterisation and authentication of ''Tonda Gentile Trilobata" hazelnuts from Piedmont (Italy).

    PubMed

    Caligiani, Augusta; Coisson, Jean Daniel; Travaglia, Fabiano; Acquotti, Domenico; Palla, Gerardo; Palla, Luigi; Arlorio, Marco

    2014-04-01

    The Italian hazelnut (Corylus avellana L.) cultivar "Tonda Gentile Trilobata" (TGT) is covered by protected geographical indication "Nocciola Piemonte" and is well-known as the best-suited hazelnut for the industrial transformation into roasted kernel. The hazelnut cultivar identification is primarily based on morphological characteristics, so there is the need for more objective analytical methods for high quality hazelnut authentication. This study reports the (1)H NMR fingerprinting of raw and roasted hazelnut, with the aim of obtaining hazelnut classification based on their spectroscopic pattern. (1)H NMR analyses were carried out on polar extracts of TGT and other cultivars: the data were analysed with multivariate statistical methods. Results showed that (1)H NMR combined with chemometrics is useful to characterise the hazelnuts as a function of the cultivars, both on raw and roasted form. The classification models allowed identifying molecular markers useful to distinguish TGT from other types, among these trigonelline, amino acids and an unidentified orto-disubstituted aromatic compound. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Authentication techniques for smart cards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less

  6. Advanced Technologies for Touchless Fingerprint Recognition

    NASA Astrophysics Data System (ADS)

    Parziale, Giuseppe; Chen, Yi

    A fingerprint capture consists of touching or rolling a finger onto a rigid sensing surface. During this act, the elastic skin of the finger deforms. The quantity and direction of the pressure applied by the user, the skin conditions, and the projection of an irregular 3D object (the finger) onto a 2D flat plane introduce distortions, noise, and inconsistencies on the captured fingerprint image. Due to these negative effects, the representation of the same fingerprint changes every time the finger is placed on the sensor platen, increasing the complexity of the fingerprint matching and representing a negative influence on the system performance. Recently, a new approach to capture fingerprints has been proposed. This approach, referred to as touchless or contactless fingerprinting, tries to overcome the above-cited problems. Because of the lack of contact between the finger and any rigid surface, the skin does not deform during the capture and the repeatability of the measure is quiet ensured. However, this technology introduces new challenges. Finger positioning, illumination, image contrast adjustment, data format compatibility, and user convenience are key in the design and development of touchless fingerprint systems. In addition, vulnerability to spoofing attacks of some touchless fingerprint systems must be addressed.

  7. Inorganic elemental determinations of marine traditional Chinese Medicine Meretricis concha from Jiaozhou Bay: The construction of inorganic elemental fingerprint based on chemometric analysis

    NASA Astrophysics Data System (ADS)

    Shao, Mingying; Li, Xuejie; Zheng, Kang; Jiang, Man; Yan, Cuiwei; Li, Yantuan

    2016-04-01

    The goal of this paper is to explore the relationship between the inorganic elemental fingerprint and the geographical origin identification of Meretricis concha, which is a commonly used marine traditional Chinese medicine (TCM) for the treatment of asthma and scald burns. For that, the inorganic elemental contents of Meretricis concha from five sampling points in Jiaozhou Bay have been determined by means of inductively coupled plasma optical emission spectrometry, and the comparative investigations based on the contents of 14 inorganic elements (Al, As, Cd, Co, Cr, Cu, Fe, Hg, Mn, Mo, Ni, Pb, Se and Zn) of the samples from Jiaozhou Bay and the previous reported Rushan Bay were performed. It has been found that the samples from the two bays are approximately classified into two kinds using hierarchical cluster analysis, and a four-factor model based on principle component analysis could explain approximately 75% of the detection data, also linear discriminant analysis can be used to develop a prediction model to distinguish the samples from Jiaozhou Bay and Rushan Bay with accuracy of about 93%. The results of the present investigation suggested that the inorganic elemental fingerprint based on the combination of the measured elemental content and chemometric analysis is a promising approach for verifying the geographical origin of Meretricis concha, and this strategy should be valuable for the authenticity discrimination of some marine TCM.

  8. Identification of terpenes and essential oils by means of static headspace gas chromatography-ion mobility spectrometry.

    PubMed

    Rodríguez-Maecker, Roman; Vyhmeister, Eduardo; Meisen, Stefan; Rosales Martinez, Antonio; Kuklya, Andriy; Telgheder, Ursula

    2017-11-01

    Static headspace gas chromatography-ion mobility spectrometry (SHS GC-IMS) is a relatively new analytical technique that has considerable potential for analysis of volatile organic compounds (VOCs). In this study, SHS GC-IMS was used for the identification of the major terpene components of various essential oils (EOs). Based on the data obtained from 25 terpene standards and 50 EOs, a database for fingerprint identification of characteristic terpenes and EOs was generated utilizing SHS GC-IMS for authenticity testing of fragrances in foods, cosmetics, and personal care products. This database contains specific normalized IMS drift times and GC retention indices for 50 terpene components of EOs. Initially, the SHS GC-IMS parameters, e.g., drift gas and carrier gas flow rates, drift tube, and column temperatures, were evaluated to determine suitable operating conditions for terpene separation and identification. Gas chromatography-mass spectrometry (GC-MS) was used as a reference method for the identification of terpenes in EOs. The fingerprint pattern based on the normalized IMS drift times and retention indices of 50 terpenes is presented for 50 EOs. The applicability of the method was proven on examples of ten commercially available food, cosmetic, and personal care product samples. The results confirm the suitability of SHS GC-IMS as a powerful analytical technique for direct identification of terpene components in solid and liquid samples without any pretreatment. Graphical abstract Fingerprint pattern identification of terpenes and essential oils using static headspace gas chromatography-ion mobility spectrometry.

  9. Pterodon pubescens oil: characterisation, certification of origin and quality control via mass spectrometry fingerprinting analysis.

    PubMed

    Cabral, E C; Sevart, L; Spindola, H M; Coelho, M B; Sousa, I M O; Queiroz, N C A; Foglio, M A; Eberlin, M N; Riveros, J M

    2013-02-01

    The oil obtained from Pterodon pubescens (Leguminosae) seeds are known to display anti-cancer, anti-dermatogenic and anti-nociceptive activitiy. Phytochemical studies have demonstrated that its main constituents are diterpenoids with voucapan skeletons. Considering the potential biological activities of the oil, rapid and efficient methods for assessing its quality would facilitate certification and quality control. To develop a direct mass spectrometric fingerprinting method for the P. pubescens seed oil that would focus on the major diterpenoids constituents, enabling quality control, origin certification and recognition of marker species in commercially available products. Two techniques were used: (i) direct infusion electrospray ionisation (ESI) mass spectrometry after solvent extraction and dilution and (ii) ambient desorption/ionisation via easy ambient sonic-spray ionisation, EASI(+)-MS, performed directly on the seed surface or at a paper surface imprinted with the oil. From a combination of ESI-MS, HRESI-MS and ESI-MS/MS data, 12 diterpenes were characterised, and typical profiles were obtained for the oil extract or the crude oil via both ESI-MS and EASI-MS. These techniques require no or very simple sample preparation protocols and the whole analytical processes with spectra acquisition take just a few minutes. Both techniques, but particularly EASI-MS, provide simple, fast and efficient MS fingerprinting methodologies to characterise the P. pubescens oil with typical (di)terpene profiles being applicable to quality control and certification of authenticity and origin. Copyright © 2012 John Wiley & Sons, Ltd.

  10. Integrated fingerprinting in secure digital cinema projection

    NASA Astrophysics Data System (ADS)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  11. Indoor localization using FM radio and DTMB signals

    NASA Astrophysics Data System (ADS)

    Wu, H.; Wang, Q.; Zhao, Y.; Ma, X.; Yang, M.; Liu, B.; Tang, R.; Xu, X.

    2016-07-01

    Indoor localization systems based on Wi-Fi signal strength fingerprinting techniques are widely used in office buildings. However, a general problem of these systems pertains to Wi-Fi signal degradation due to the environmental factors. And also, these systems cannot be used in the environments not covered with Wi-Fi signals or the environments with only a single Wi-Fi access point. In this paper, a new indoor location fingerprinting system using both FM radio and Digital Television Terrestrial Multimedia Broadcasting (DTMB) signals is proposed. First, the indoor location fingerprinting using FM radio and DTMB signals is theoretically analyzed to confirm its feasibility. Then, a specially designed combined strength fingerprinting location algorithm is proposed for the location system, which is achieved on the USRP2 platform. Finally, the system is tested in a typical indoor environment. The theoretical analysis and the tests show that the indoor location fingerprinting system using FM radio and DTMB signals has a similar localization accuracy to the Wi-Fi signal strength fingerprinting location system, while it has a wider coverage area, a lower maintenance cost, and more stable signal strength, which makes it a practical indoor positioning method.

  12. Enhancing security of fingerprints through contextual biometric watermarking.

    PubMed

    Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M

    2007-07-04

    This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.

  13. Jan Evangelista Purkynje (1787-1869): first to describe fingerprints.

    PubMed

    Grzybowski, Andrzej; Pietrzak, Krzysztof

    2015-01-01

    Fingerprints have been used for years as the accepted tool in criminology and for identification. The first system of classification of fingerprints was introduced by Jan Evangelista Purkynje (1787-1869), a Czech physiologist, in 1823. He divided the papillary lines into nine types, based on their geometric arrangement. This work, however, was not recognized internationally for many years. In 1858, Sir William Herschel (1833-1917) registered fingerprints for those signing documents at the Indian magistrate's office in Jungipoor. Henry Faulds (1843-1930) in 1880 proposed using ink for fingerprint determination and people identification, and Francis Galton (1822-1911) collected 8000 fingerprints and developed their classification based on the spirals, loops, and arches. In 1892, Juan Vucetich (1858-1925) created his own fingerprint identification system and proved that a woman was responsible for killing two of her sons. In 1896, a London police officer Edward Henry (1850-1931) expanded on earlier systems of classification and used papillary lines to identify criminals; it was his system that was adopted by the forensic world. The work of Jan Evangelista Purkynje (1787-1869) (Figure 1), who in 1823 was the first to describe in detail fingerprints, is almost forgotten. He also established their classification. The year 2013 marked the 190th anniversary of the publication of his work on this topic. Our contribution is an attempt to introduce the reader to this scientist and his discoveries in the field of fingerprint identification. Copyright © 2015.

  14. Multispectral imaging for biometrics

    NASA Astrophysics Data System (ADS)

    Rowe, Robert K.; Corcoran, Stephen P.; Nixon, Kristin A.; Ostrom, Robert E.

    2005-03-01

    Automated identification systems based on fingerprint images are subject to two significant types of error: an incorrect decision about the identity of a person due to a poor quality fingerprint image and incorrectly accepting a fingerprint image generated from an artificial sample or altered finger. This paper discusses the use of multispectral sensing as a means to collect additional information about a finger that significantly augments the information collected using a conventional fingerprint imager based on total internal reflectance. In the context of this paper, "multispectral sensing" is used broadly to denote a collection of images taken under different polarization conditions and illumination configurations, as well as using multiple wavelengths. Background information is provided on conventional fingerprint imaging. A multispectral imager for fingerprint imaging is then described and a means to combine the two imaging systems into a single unit is discussed. Results from an early-stage prototype of such a system are shown.

  15. Implementation of an electronic fingerprint-linked data collection system: a feasibility and acceptability study among Zambian female sex workers.

    PubMed

    Wall, Kristin M; Kilembe, William; Inambao, Mubiana; Chen, Yi No; Mchoongo, Mwaka; Kimaru, Linda; Hammond, Yuna Tiffany; Sharkey, Tyronza; Malama, Kalonde; Fulton, T Roice; Tran, Alex; Halumamba, Hanzunga; Anderson, Sarah; Kishore, Nishant; Sarwar, Shawn; Finnegan, Trisha; Mark, David; Allen, Susan A

    2015-06-27

    Patient identification within and between health services is an operational challenge in many resource-limited settings. When following HIV risk groups for service provision and in the context of vaccine trials, patient misidentification can harm patient care and bias trial outcomes. Electronic fingerprinting has been proposed to identify patients over time and link patient data between health services. The objective of this study was to determine 1) the feasibility of implementing an electronic-fingerprint linked data capture system in Zambia and 2) the acceptability of this system among a key HIV risk group: female sex workers (FSWs). Working with Biometrac, a US-based company providing biometric-linked healthcare platforms, an electronic fingerprint-linked data capture system was developed for use by field recruiters among Zambian FSWs. We evaluated the technical feasibility of the system for use in the field in Zambia and conducted a pilot study to determine the acceptability of the system, as well as barriers to uptake, among FSWs. We found that implementation of an electronic fingerprint-linked patient tracking and data collection system was feasible in this relatively resource-limited setting (false fingerprint matching rate of 1/1000 and false rejection rate of <1/10,000) and was acceptable among FSWs in a clinic setting (2% refusals). However, our data indicate that less than half of FSWs are comfortable providing an electronic fingerprint when recruited while they are working. The most common reasons cited for not providing a fingerprint (lack of privacy/confidentiality issues while at work, typically at bars or lodges) could be addressed by recruiting women during less busy hours, in their own homes, in the presence of "Queen Mothers" (FSW organizers), or in the presence of a FSW that has already been fingerprinted. Our findings have major implications for key population research and improved health services provision. However, more work needs to be done to increase the acceptability of the electronic fingerprint-linked data capture system during field recruitment. This study indicated several potential avenues that will be explored to increase acceptability.

  16. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  17. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOEpatents

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  18. Study of UV imaging technology for noninvasive detection of latent fingerprints

    NASA Astrophysics Data System (ADS)

    Li, Hong-xia; Cao, Jing; Niu, Jie-qing; Huang, Yun-gang

    2013-09-01

    Using UV imaging technology, according to the special absorption 、reflection 、scattering and fluorescence characterization of the various residues in fingerprints (fatty acid ester, protein, and carboxylic acid salts etc) to the UV light, weaken or eliminate the background disturbance to increase the brightness contrast of fingerprints with the background, and design、setup the illumination optical system and UV imaging system, the noninvasive detection of latent fingerprints remaining on various object surface are studied. In the illumination optical system, using the 266nm UV Nd:YAG solid state laser as illumination light source, by calculating the best coupling conditions of the laser beam with UV liquid core fiber and analyzing the beam transforming characterizations, we designed and setup the optical system to realize the UV imaging uniform illumination. In the UV imaging system, the UV lens is selected as the fingerprint imaging element, and the UV intensified CCD (ICCD) which consists of a second-generation UV image intensifier and a CCD coupled by fiber plate and taper directly are used as the imaging sensing element. The best imaging conditions of the UV lens with ICCD were analyzed and the imaging system was designed and setup. In this study, by analyzing the factors which influence the detection effect, optimal design and setup the illumination system and imaging system, latent fingerprints on the surface of the paint tin box、plastic、smooth paper、notebook paper and print paper were noninvasive detected and appeared, and the result meet the fingerprint identification requirements in forensic science.

  19. Missing data reconstruction using Gaussian mixture models for fingerprint images

    NASA Astrophysics Data System (ADS)

    Agaian, Sos S.; Yeole, Rushikesh D.; Rao, Shishir P.; Mulawka, Marzena; Troy, Mike; Reinecke, Gary

    2016-05-01

    Publisher's Note: This paper, originally published on 25 May 2016, was replaced with a revised version on 16 June 2016. If you downloaded the original PDF, but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. One of the most important areas in biometrics is matching partial fingerprints in fingerprint databases. Recently, significant progress has been made in designing fingerprint identification systems for missing fingerprint information. However, a dependable reconstruction of fingerprint images still remains challenging due to the complexity and the ill-posed nature of the problem. In this article, both binary and gray-level images are reconstructed. This paper also presents a new similarity score to evaluate the performance of the reconstructed binary image. The offered fingerprint image identification system can be automated and extended to numerous other security applications such as postmortem fingerprints, forensic science, investigations, artificial intelligence, robotics, all-access control, and financial security, as well as for the verification of firearm purchasers, driver license applicants, etc.

  20. Digital Video of Live-Scan Fingerprint Data

    National Institute of Standards and Technology Data Gateway

    NIST Digital Video of Live-Scan Fingerprint Data (PC database for purchase)   NIST Special Database 24 contains MPEG-2 (Moving Picture Experts Group) compressed digital video of live-scan fingerprint data. The database is being distributed for use in developing and testing of fingerprint verification systems.

  1. The research and implementation of a unified identity authentication in e-government network

    NASA Astrophysics Data System (ADS)

    Feng, Zhou

    Current problem existing in e-government network is that the applications of information system are developed independently by various departments, and each has its own specific set of authentication and access control mechanism. To build a comprehensive information system in favor of sharing and exchanging information, a sound and secure unified e-government authentication system is firstly needed. The paper, combining with practical development of e-government network, carries out a thorough discussion on how to achieve data synchronization between unified authentication system and related application systems.

  2. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  3. Simultaneous topography and tomography of latent fingerprints using full-field swept-source optical coherence tomography

    NASA Astrophysics Data System (ADS)

    Dubey, Satish Kumar; Singh Mehta, Dalip; Anand, Arun; Shakher, Chandra

    2008-01-01

    We demonstrate simultaneous topography and tomography of latent fingerprints using full-field swept-source optical coherence tomography (OCT). The swept-source OCT system comprises a superluminescent diode (SLD) as broad-band light source, an acousto-optic tunable filter (AOTF) as frequency tuning device, and a compact, nearly common-path interferometer. Both the amplitude and the phase map of the interference fringe signal are reconstructed. Optical sectioning of the latent fingerprint sample is obtained by selective Fourier filtering and the topography is retrieved from the phase map. Interferometry, selective filtering, low coherence and hence better resolution are some of the advantages of the proposed system over the conventional fingerprint detection techniques. The present technique is non-invasive in nature and does not require any physical or chemical processing. Therefore, the quality of the sample does not alter and hence the same fingerprint can be used for other types of forensic test. Exploitation of low-coherence interferometry for fingerprint detection itself provides an edge over other existing techniques as fingerprints can even be lifted from low-reflecting surfaces. The proposed system is very economical and compact.

  4. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  5. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  6. 75 FR 36678 - In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-697] In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic Devices; Notice of Commission Decision Not to... importation of certain authentication systems, including software and handheld electronic devices, by reason...

  7. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  8. The Role of Counterintelligence in the European Theater of Operations During World War II

    DTIC Science & Technology

    1993-06-04

    revolvers, Minox cameras, portable typewriters, 48 fingerprint cameras, latent fingerprint kits, handcuffs, and listening and recording devices.13 This...Comments from the detachments indicated that the fingerprint equipment, and listening and recording devices were of little use. However, the revolvers...40-49. 138 Moulage* 2 Fingerprinting 2 Latent Fingerprinting 3 System of Identification 1 Codes and Ciphers 1 Handwriting Comparison 2 Documentary

  9. Latent fingerprint matching.

    PubMed

    Jain, Anil K; Feng, Jianjiang

    2011-01-01

    Latent fingerprint identification is of critical importance to law enforcement agencies in identifying suspects: Latent fingerprints are inadvertent impressions left by fingers on surfaces of objects. While tremendous progress has been made in plain and rolled fingerprint matching, latent fingerprint matching continues to be a difficult problem. Poor quality of ridge impressions, small finger area, and large nonlinear distortion are the main difficulties in latent fingerprint matching compared to plain or rolled fingerprint matching. We propose a system for matching latent fingerprints found at crime scenes to rolled fingerprints enrolled in law enforcement databases. In addition to minutiae, we also use extended features, including singularity, ridge quality map, ridge flow map, ridge wavelength map, and skeleton. We tested our system by matching 258 latents in the NIST SD27 database against a background database of 29,257 rolled fingerprints obtained by combining the NIST SD4, SD14, and SD27 databases. The minutiae-based baseline rank-1 identification rate of 34.9 percent was improved to 74 percent when extended features were used. In order to evaluate the relative importance of each extended feature, these features were incrementally used in the order of their cost in marking by latent experts. The experimental results indicate that singularity, ridge quality map, and ridge flow map are the most effective features in improving the matching accuracy.

  10. Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain

    PubMed Central

    Garcia-Hernandez, Jose Juan; Feregrino-Uribe, Claudia; Cumplido, Rene

    2013-01-01

    Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-art collusion-resistant fingerprinting ideas are extended to audio signals and the corresponding parameters and operation conditions are proposed. Moreover, in order to carry out fingerprint detection using just a fraction of the pirate audio clip, block-based embedding and its corresponding detector is proposed. Extensive simulations show the robustness of the proposed system against average collusion attack. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios. PMID:23762455

  11. FBI Fingerprint Image Capture System High-Speed-Front-End throughput modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rathke, P.M.

    1993-09-01

    The Federal Bureau of Investigation (FBI) has undertaken a major modernization effort called the Integrated Automated Fingerprint Identification System (IAFISS). This system will provide centralized identification services using automated fingerprint, subject descriptor, mugshot, and document processing. A high-speed Fingerprint Image Capture System (FICS) is under development as part of the IAFIS program. The FICS will capture digital and microfilm images of FBI fingerprint cards for input into a central database. One FICS design supports two front-end scanning subsystems, known as the High-Speed-Front-End (HSFE) and Low-Speed-Front-End, to supply image data to a common data processing subsystem. The production rate of themore » HSFE is critical to meeting the FBI`s fingerprint card processing schedule. A model of the HSFE has been developed to help identify the issues driving the production rate, assist in the development of component specifications, and guide the evolution of an operations plan. A description of the model development is given, the assumptions are presented, and some HSFE throughput analysis is performed.« less

  12. Evaluation of ice-tea quality by DART-TOF/MS.

    PubMed

    Rajchl, Aleš; Prchalová, Jana; Kružík, Vojtěch; Ševčík, Rudolf; Čížková, Helena

    2015-11-01

    DART (Direct Analysis in Real Time) coupled with Time-of-Flight Mass Spectrometry (TOF/MS) has been used for analyses of ice-teas. The article focuses on quality and authenticity of ice-teas as one of the most important tea-based products on the market. Twenty-one samples of ice-teas (black and green) were analysed. Selected compounds of ice-teas were determined: theobromine, caffeine, total phenolic compounds, total soluble solids, total amino acid concentration, preservatives and saccharides were determined. Fingerprints of DART-TOF/MS spectra were used for comprehensive assessment of the ice-tea samples. The DART-TOF/MS method was used for monitoring the following compounds: citric acid, caffeine, saccharides, artificial sweeteners (saccharin, acesulphame K), and preservatives (sorbic and benzoic acid), phosphoric acid and phenolic compounds. The measured data were subjected to a principal components analysis. The HPLC and DART-TOF/MS methods were compared in terms of determination of selected compounds (caffeine, benzoic acid, sorbic acid and saccharides) in the ice-teas. The DART-TOF/MS technique seems to be a suitable method for fast screening, testing quality and authenticity of tea-based products. Copyright © 2015 John Wiley & Sons, Ltd.

  13. Molecular characterization of neoplastic and normal "sister" lymphoblastoid B-cell lines from chronic lymphocytic leukemia.

    PubMed

    Lanemo Myhrinder, Anna; Hellqvist, Eva; Bergh, Ann-Charlotte; Jansson, Mattias; Nilsson, Kenneth; Hultman, Per; Jonasson, Jon; Buhl, Anne Mette; Bredo Pedersen, Lone; Jurlander, Jesper; Klein, Eva; Weit, Nicole; Herling, Marco; Rosenquist, Richard; Rosén, Anders

    2013-08-01

    Chronic lymphocytic leukemia (CLL) B-cells resemble self-renewing CD5 + B-cells carrying auto/xeno-antigen-reactive B-cell receptors (BCRs) and multiple innate pattern-recognition receptors, such as Toll-like receptors and scavenger receptors. Integration of signals from BCRs with multiple surface membrane receptors determines whether the cells will be proliferating, anergic or apoptotic. To better understand the role of antigen in leukemogenesis, CLL cell lines producing monoclonal antibodies (mAbs) will facilitate structural analysis of antigens and supply DNA for genetic studies. We present here a comprehensive genotypic and phenotypic characterization of available CLL and normal B-cell-derived lymphoblastoid cell lines (LCLs) from the same individuals (n = 17). Authenticity and verification studies of CLL-patient origin were done by IGHV sequencing, fluorescence in situ hybridization (FISH) and DNA/short tandem repeat (STR) fingerprinting. Innate B-cell features, i.e. natural Ab production and CD5 receptors, were present in most CLL cell lines, but in none of the normal LCLs. This panel of immortalized CLL-derived cell lines is a valuable reference representing a renewable source of authentic Abs and DNA.

  14. Security and matching of partial fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.

    2004-08-01

    Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).

  15. Detection and analysis of diamond fingerprinting feature and its application

    NASA Astrophysics Data System (ADS)

    Li, Xin; Huang, Guoliang; Li, Qiang; Chen, Shengyi

    2011-01-01

    Before becoming a jewelry diamonds need to be carved artistically with some special geometric features as the structure of the polyhedron. There are subtle differences in the structure of this polyhedron in each diamond. With the spatial frequency spectrum analysis of diamond surface structure, we can obtain the diamond fingerprint information which represents the "Diamond ID" and has good specificity. Based on the optical Fourier Transform spatial spectrum analysis, the fingerprinting identification of surface structure of diamond in spatial frequency domain was studied in this paper. We constructed both the completely coherent diamond fingerprinting detection system illuminated by laser and the partially coherent diamond fingerprinting detection system illuminated by led, and analyzed the effect of the coherence of light source to the diamond fingerprinting feature. We studied rotation invariance and translation invariance of the diamond fingerprinting and verified the feasibility of real-time and accurate identification of diamond fingerprint. With the profit of this work, we can provide customs, jewelers and consumers with a real-time and reliable diamonds identification instrument, which will curb diamond smuggling, theft and other crimes, and ensure the healthy development of the diamond industry.

  16. Quality assessment of marketed chamomile tea products by a validated HPTLC method combined with multivariate analysis.

    PubMed

    Guzelmeric, Etil; Ristivojević, Petar; Vovk, Irena; Milojković-Opsenica, Dušanka; Yesilada, Erdem

    2017-01-05

    Chamomile tea composed of dried flower heads of Matricaria recutita L. (Asteraceae) is one of the most popular single ingredient herbal teas. Tea industries, spice shops or public bazaars are mostly supplied chamomile as a raw material via cultivation or through nature-picking. However, one of the drawbacks of nature-picking is adulteration. This could be either due to false authentication of the plant materials by ingenuous pickers or intentional/unintentional substitution with other flowers resembling to chamomile in appearance during harvesting. Therefore, quality control of raw chamomile materials before marketing should be carefully considered not only by quantification of apigenin 7-O-glucoside (active marker) but also by fingerprinting of chemical composition. This work presents both quantification of apigenin 7-O-glucoside and chemical fingerprinting of commercial chamomile tea products obtained from different food stores and spice shops by a validated HPTLC method. In addition, HPTLC profiles of investigated chamomile tea samples were compared with HPLC method stated in the European Pharmacopoeia and it was found that HPTLC method was superior to HPLC method in the field of adulteration confirmation. Therefore, fingerprint profiles performed on the silica gel 60 NH 2 F 254 s HPTLC plates combined with pattern recognition techniques of these marketed products were comparatively evaluated with wild and cultivar chamomile samples and also chamomile-like species from Asteraceae. Consequently, not chamomile tea bags but crude flowers sold on market were found to be adulterated with other plant materials. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Report: Results of Technical Vulnerability Assessment: EPA’s Directory Service System Authentication and Authorization Servers

    EPA Pesticide Factsheets

    Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.

  18. Fingerprint Change: Not Visible, But Tangible.

    PubMed

    Negri, Francesca V; De Giorgi, Annamaria; Bozzetti, Cecilia; Squadrilli, Anna; Petronini, Pier Giorgio; Leonardi, Francesco; Bisogno, Luigi; Garofano, Luciano

    2017-09-01

    Hand-foot syndrome, a chemotherapy-induced cutaneous toxicity, can cause an alteration in fingerprints causing a setback for cancer patients due to the occurrence of false rejections. A colon cancer patient was fingerprinted after not having been able to use fingerprint recognition devices after 6 months of adjuvant chemotherapy. The fingerprint images were digitally processed to improve fingerprint definition without altering the papillary design. No evidence of skin toxicity was present. Two months later, the situation returned to normal. The fingerprint evaluation conducted on 15 identification points highlighted the quantitative and qualitative fingerprint alteration details detected after the end of chemotherapy and 2 months later. Fingerprint alteration during chemotherapy has been reported, but to our knowledge, this particular case is the first ever reported without evident clinical signs. Alternative fingerprint identification methods as well as improved biometric identification systems are needed in case of unexpected situations. © 2017 American Academy of Forensic Sciences.

  19. Comparison of chemical and heating methods to enhance latent fingerprint deposits on thermal paper.

    PubMed

    Bond, John W

    2014-03-01

    A comparison is made of proprietary methods to develop latent fingerprint deposits on the inked side of thermal paper using either chemical treatment (Thermanin) or the application of heat to the paper (Hot Print System). Results with a trial of five donors show that the application of heat produces statistically significantly more fingerprint ridge detail than the chemical treatment for both fingerprint deposits aged up to 4 weeks and for a nine sequence depletion series. Subjecting the thermal paper to heat treatment with the Hot Print System did not inhibit subsequent ninhydrin chemical development of fingerprint deposits on the noninked side of the paper. A further benefit of the application of heat is the rapid development of fingerprint deposits (less than a minute) compared with up to 12 h for the Thermanin chemical treatment.

  20. 78 FR 2473 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ..., fingerprint card and a combined payment of fees to FINRA. Through the CRD system, FINRA maintains the... incorporate the applicability of the fee to Form BD processing. Increasing the manual fingerprint processing... posting to the CRD system each set of fingerprint results and identifying information that have been...

  1. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.

    PubMed

    Wang, Z Jane; Wu, Min; Zhao, Hong Vicky; Trappe, Wade; Liu, K J Ray

    2005-06-01

    Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users combine their copies of the same content to attenuate/remove the original fingerprints. In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation. We introduce the maximum detector and the thresholding detector for colluder identification. We then analyze the collusion resistance of a system to the averaging collusion attack for the performance criteria represented by the probability of a false negative and the probability of a false positive. Lower and upper bounds for the maximum number of colluders K(max) are derived. We then show that the detectors are robust to different collusion attacks. We further study different sets of performance criteria, and our results indicate that attacks based on a few dozen independent copies can confound such a fingerprinting system. We also propose a likelihood-based approach to estimate the number of colluders. Finally, we demonstrate the performance for detecting colluders through experiments using real images.

  2. A hybrid solution using computational prediction and measured data to accurately determine process corrections with reduced overlay sampling

    NASA Astrophysics Data System (ADS)

    Noyes, Ben F.; Mokaberi, Babak; Mandoy, Ram; Pate, Alex; Huijgen, Ralph; McBurney, Mike; Chen, Owen

    2017-03-01

    Reducing overlay error via an accurate APC feedback system is one of the main challenges in high volume production of the current and future nodes in the semiconductor industry. The overlay feedback system directly affects the number of dies meeting overlay specification and the number of layers requiring dedicated exposure tools through the fabrication flow. Increasing the former number and reducing the latter number is beneficial for the overall efficiency and yield of the fabrication process. An overlay feedback system requires accurate determination of the overlay error, or fingerprint, on exposed wafers in order to determine corrections to be automatically and dynamically applied to the exposure of future wafers. Since current and future nodes require correction per exposure (CPE), the resolution of the overlay fingerprint must be high enough to accommodate CPE in the overlay feedback system, or overlay control module (OCM). Determining a high resolution fingerprint from measured data requires extremely dense overlay sampling that takes a significant amount of measurement time. For static corrections this is acceptable, but in an automated dynamic correction system this method creates extreme bottlenecks for the throughput of said system as new lots have to wait until the previous lot is measured. One solution is using a less dense overlay sampling scheme and employing computationally up-sampled data to a dense fingerprint. That method uses a global fingerprint model over the entire wafer; measured localized overlay errors are therefore not always represented in its up-sampled output. This paper will discuss a hybrid system shown in Fig. 1 that combines a computationally up-sampled fingerprint with the measured data to more accurately capture the actual fingerprint, including local overlay errors. Such a hybrid system is shown to result in reduced modelled residuals while determining the fingerprint, and better on-product overlay performance.

  3. First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data.

    PubMed

    Serwaa-Bonsu, Adwoa; Herbst, Abraham J; Reniers, Georges; Ijaa, Wilfred; Clark, Benjamin; Kabudula, Chodziwadziwa; Sankoh, Osman

    2010-02-24

    In developing countries, Health and Demographic Surveillance Systems (HDSSs) provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS). Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. Adult (18-65 years) fingerprint enrolment rates varied between 94.1% (95% CI 93.6-94.5) for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9-97.6) for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site) were only 55.1% (95% CI 52.7-57.4). By age 5, child fingerprint enrolment rates were comparable to those of adults. This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the more restrictive health service perspective.

  4. Addressing the Tension Between Strong Perimeter Control an Usability

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris

    2006-01-01

    This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.

  5. Defining the questions: a research agenda for nontraditional authentication in arms control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less

  6. Advanced fingerprint verification software

    NASA Astrophysics Data System (ADS)

    Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.

    2016-05-01

    We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.

  7. HERMA-Heartbeat Microwave Authentication

    NASA Technical Reports Server (NTRS)

    Haque, Salman-ul Mohammed (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Tkacenko, Andre (Inventor); Lux, James Paul (Inventor)

    2018-01-01

    Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.

  8. Chemo-sensitivity in a panel of B-cell precursor acute lymphoblastic leukemia cell lines, YCUB series, derived from children.

    PubMed

    Goto, Hiroaki; Naruto, Takuya; Tanoshima, Reo; Kato, Hiromi; Yokosuka, Tomoko; Yanagimachi, Masakatsu; Fujii, Hisaki; Yokota, Shumpei; Komine, Hiromi

    2009-10-01

    Sensitivity to 10 anticancer drugs was evaluated in 6 childhood B-cell precursor acute lymphoblastic leukemia (BCP-ALL) cell lines. Authenticity of newly established cell lines was confirmed by genomic fingerprinting. The line YCUB-5R established at relapse was more resistant to 4-hydroperoxy-cyclophosphamide, cytarabine, L-asparaginase, topotecan, fludarabine, and etoposide than YCUB-5 from the same patient at diagnosis. Of the drugs tested, etoposide and SN-38 (irinotecan) showed highest efficacy in the panel, with 50% growth inhibition at 0.22-1.8 microg/ml and 0.57-3.6 ng/ml, respectively. This cell line panel offers an in vitro model for the development of new therapies for childhood BCP-ALL.

  9. Nosewitness Identification: Effects of Negative Emotion

    PubMed Central

    Ferreira, Jacqueline; Rocha, Marta; Silva, Carlos F.; Olsson, Mats J.

    2015-01-01

    Every individual has a unique body odor (BO), similar to a fingerprint. In forensic research, identification of culprit BOs has been performed by trained dogs, but not by humans. We introduce the concept of nosewitness identification and present the first experimental results on BO memory in witness situations involving violent crimes. Two experiments indicated that BO associated with male characters in authentic videos could later be identified in BO lineup tests well above chance. Moreover, culprit BO in emotional crime videos could be identified considerably better than the BO of a male person in neutral videos. This indicates that nosewitness identification benefits from emotional encoding. Altogether, the study testifies to the virtue of body odor as a cue to identify individuals observed under negative emotion. PMID:25612211

  10. Three-dimensional imaging of artificial fingerprint by optical coherence tomography

    NASA Astrophysics Data System (ADS)

    Larin, Kirill V.; Cheng, Yezeng

    2008-03-01

    Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.

  11. Soil properties, strontium isotopic signatures and multi-element profiles to authenticate the origin of vegetables from small-scale regions: illustration with early potatoes from southern Italy.

    PubMed

    Zampella, Mariavittoria; Quétel, Christophe R; Paredes, Eduardo; Goitom Asfaha, Daniel; Vingiani, Simona; Adamo, Paola

    2011-10-15

    We propose a method for the authentication of the origin of vegetables grown under similar weather conditions, in sites less than 10 km distance from the sea and distributed over a rather small scale area (58651 km(2)). We studied how the strontium (Sr) isotopic signature and selected elemental concentrations ([Mn], [Cu], [Zn], [Rb], [Sr] and [Cd]) in early potatoes from three neighbouring administrative regions in the south of Italy were related to the geological substrate (alluvial sediments, volcanic substrates and carbonate rocks) and to selected soil chemical properties influencing the bioavailability of elements in soils (pH, cation exchange capacity and total carbonate content). Through multiple-step multivariate statistics (PLS-DA) we could assign 26 potatoes (including two already commercialised samples) to their respective eight sites of production, corresponding to the first two types of geological substrates. The other 12 potatoes from four sites of production had similar characteristics in terms of the geological substrate (third type) and these soil properties could be grouped together. In this case, more discriminative parameters would be required to allow the differentiation between sites. The validation of our models included external prediction tests with data of potatoes harvested the year before and a study on the robustness of the uncertainties of the measurement results. Annual variations between multi-elemental and Sr isotopic fingerprints were observed in potatoes harvested from soils overlying carbonate rocks, stressing the importance of testing long term variations in authentication studies. Copyright © 2011 John Wiley & Sons, Ltd. and European Union [2011].

  12. A novel method for rotation invariant palm print image stitching

    NASA Astrophysics Data System (ADS)

    Rao, Shishir Paramathma; Panetta, Karen; Agaian, Sos S.

    2017-05-01

    Although not as popular as fingerprint biometrics, palm prints have garnered interest in scientific community for the rich amount of distinctive information available on the palm. In this paper, a novel method for touchless palm print stitching to increase the effective area is presented. The method is not only rotation invariant but also able to robustly handle many distortions of touchless systems like illumination variations, pose variations etc. The proposed method also can handle partial palmprints, which have a high chance of occurrence in a scene of crime, by stitching them together to produce a much larger-to-full size palmprint for authentication purpose. Experiment results are shown for IIT-D palmprint database, from which pseudo partial palmprints were generated by cropping and randomly rotating them. Furthermore, the quality of stitching algorithm is determined by extensive computer simulations and visual analysis of the stitched image. Experimental results also show that the stitching significantly increases the area of palm image for feature point detection and hence provides a way to increase the accuracy and reliability of detection.

  13. 78 FR 2467 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ..., fingerprint card and a combined payment of fees to FINRA. Through the CRD system, FINRA maintains the... Member Organizations. $15 for processing and posting to the CRD system each set of fingerprints submitted... processing each set of fingerprints; \\11\\ \\11\\ See Section (4)(b)(4) of Schedule A to the FINRA By-laws...

  14. Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth

    NASA Astrophysics Data System (ADS)

    Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.

    2008-02-01

    Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.

  15. Transparent Fingerprint Sensor System for Large Flat Panel Display.

    PubMed

    Seo, Wonkuk; Pi, Jae-Eun; Cho, Sung Haeung; Kang, Seung-Youl; Ahn, Seong-Deok; Hwang, Chi-Sun; Jeon, Ho-Sik; Kim, Jong-Uk; Lee, Myunghee

    2018-01-19

    In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT) sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO) TFT sensor array and associated custom Read-Out IC (ROIC) are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE) amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC). To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger's ridges and valleys through the fingerprint sensor array.

  16. Transparent Fingerprint Sensor System for Large Flat Panel Display

    PubMed Central

    Seo, Wonkuk; Pi, Jae-Eun; Cho, Sung Haeung; Kang, Seung-Youl; Ahn, Seong-Deok; Hwang, Chi-Sun; Jeon, Ho-Sik; Kim, Jong-Uk

    2018-01-01

    In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT) sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO) TFT sensor array and associated custom Read-Out IC (ROIC) are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE) amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC). To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger’s ridges and valleys through the fingerprint sensor array. PMID:29351218

  17. Ultrafast fingerprint indexing for embedded systems

    NASA Astrophysics Data System (ADS)

    Zhou, Ru; Sin, Sang Woo; Li, Dongju; Isshiki, Tsuyoshi; Kunieda, Hiroaki

    2011-10-01

    A novel core-based fingerprint indexing scheme for embedded systems is presented in this paper. Our approach is enabled by our new precise and fast core-detection algorithm with the direction map. It introduces the feature of CMP (core minutiae pair), which describes the coordinates of minutiae and the direction of ridges associated with the minutiae based on the uniquely defined core coordinates. Since each CMP is identical against the shift and rotation of the fingerprint image, the CMP comparison between a template and an input image can be performed without any alignment. The proposed indexing algorithm based on CMP is suitable for embedded systems because the tremendous speed up and the memory reduction are achieved. In fact, the experiments with the fingerprint database FVC2002 show that its speed for the identifications becomes about 40 times faster than conventional approaches, even though the database includes fingerprints with no core.

  18. Chemical Fingerprinting of Materials Developed Due to Environmental Issues

    NASA Technical Reports Server (NTRS)

    Smith, Doris A.; McCool, A. (Technical Monitor)

    2000-01-01

    Instrumental chemical analysis methods are developed and used to chemically fingerprint new and modified External Tank materials made necessary by changing environmental requirements. Chemical fingerprinting can detect and diagnose variations in material composition. To chemically characterize each material, fingerprint methods are selected from an extensive toolbox based on the material's chemistry and the ability of the specific methods to detect the material's critical ingredients. Fingerprint methods have been developed for a variety of materials including Thermal Protection System foams, adhesives, primers, and composites.

  19. Fingerprinting of Materials: Technical Supplement

    NASA Technical Reports Server (NTRS)

    Workman, Gary L.

    1992-01-01

    This supplement to the Guidelines for Maintaining a Chemical Fingerprinting Program has been developed to assist NASA personnel, contractors, and sub-contractors in defining the technical aspects and basic concepts which can be used in chemical fingerprinting programs. This material is not meant to be totally inclusive to all chemical fingerprinting programs, but merely to present current concepts. Each program will be tailored to meet the needs of the individual organizations using chemical fingerprinting to improve their quality and reliability in the production of aerospace systems.

  20. 28 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... supervision, and release. The term does not include identification information such as fingerprint records if.... (l) Fingerprint Identification Records System or “FIRS” means the following FBI records: Criminal fingerprints and/or related criminal justice information submitted by authorized agencies having criminal...

  1. 28 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... supervision, and release. The term does not include identification information such as fingerprint records if.... (l) Fingerprint Identification Records System or “FIRS” means the following FBI records: Criminal fingerprints and/or related criminal justice information submitted by authorized agencies having criminal...

  2. 28 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... supervision, and release. The term does not include identification information such as fingerprint records if.... (l) Fingerprint Identification Records System or “FIRS” means the following FBI records: Criminal fingerprints and/or related criminal justice information submitted by authorized agencies having criminal...

  3. 28 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... supervision, and release. The term does not include identification information such as fingerprint records if.... (l) Fingerprint Identification Records System or “FIRS” means the following FBI records: Criminal fingerprints and/or related criminal justice information submitted by authorized agencies having criminal...

  4. 28 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... supervision, and release. The term does not include identification information such as fingerprint records if.... (l) Fingerprint Identification Records System or “FIRS” means the following FBI records: Criminal fingerprints and/or related criminal justice information submitted by authorized agencies having criminal...

  5. The construction of a public key infrastructure for healthcare information networks in Japan.

    PubMed

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  6. A Hybrid Authentication and Authorization Process for Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less

  7. [InlineEquation not available: see fulltext.]-Means Based Fingerprint Segmentation with Sensor Interoperability

    NASA Astrophysics Data System (ADS)

    Yang, Gongping; Zhou, Guang-Tong; Yin, Yilong; Yang, Xiukun

    2010-12-01

    A critical step in an automatic fingerprint recognition system is the segmentation of fingerprint images. Existing methods are usually designed to segment fingerprint images originated from a certain sensor. Thus their performances are significantly affected when dealing with fingerprints collected by different sensors. This work studies the sensor interoperability of fingerprint segmentation algorithms, which refers to the algorithm's ability to adapt to the raw fingerprints obtained from different sensors. We empirically analyze the sensor interoperability problem, and effectively address the issue by proposing a [InlineEquation not available: see fulltext.]-means based segmentation method called SKI. SKI clusters foreground and background blocks of a fingerprint image based on the [InlineEquation not available: see fulltext.]-means algorithm, where a fingerprint block is represented by a 3-dimensional feature vector consisting of block-wise coherence, mean, and variance (abbreviated as CMV). SKI also employs morphological postprocessing to achieve favorable segmentation results. We perform SKI on each fingerprint to ensure sensor interoperability. The interoperability and robustness of our method are validated by experiments performed on a number of fingerprint databases which are obtained from various sensors.

  8. Acquiring a 2D rolled equivalent fingerprint image from a non-contact 3D finger scan

    NASA Astrophysics Data System (ADS)

    Fatehpuria, Abhishika; Lau, Daniel L.; Hassebrook, Laurence G.

    2006-04-01

    The use of fingerprints as a biometric is both the oldest mode of computer aided personal identification and the most relied-upon technology in use today. But current fingerprint scanning systems have some challenging and peculiar difficulties. Often skin conditions and imperfect acquisition circumstances cause the captured fingerprint image to be far from ideal. Also some of the acquisition techniques can be slow and cumbersome to use and may not provide the complete information required for reliable feature extraction and fingerprint matching. Most of the difficulties arise due to the contact of the fingerprint surface with the sensor platen. To attain a fast-capture, non-contact, fingerprint scanning technology, we are developing a scanning system that employs structured light illumination as a means for acquiring a 3-D scan of the finger with sufficiently high resolution to record ridge-level details. In this paper, we describe the postprocessing steps used for converting the acquired 3-D scan of the subject's finger into a 2-D rolled equivalent image.

  9. Low-Speed Fingerprint Image Capture System User`s Guide, June 1, 1993

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitus, B.R.; Goddard, J.S.; Jatko, W.B.

    1993-06-01

    The Low-Speed Fingerprint Image Capture System (LS-FICS) uses a Sun workstation controlling a Lenzar ElectroOptics Opacity 1000 imaging system to digitize fingerprint card images to support the Federal Bureau of Investigation`s (FBI`s) Automated Fingerprint Identification System (AFIS) program. The system also supports the operations performed by the Oak Ridge National Laboratory- (ORNL-) developed Image Transmission Network (ITN) prototype card scanning system. The input to the system is a single FBI fingerprint card of the agreed-upon standard format and a user-specified identification number. The output is a file formatted to be compatible with the National Institute of Standards and Technology (NIST)more » draft standard for fingerprint data exchange dated June 10, 1992. These NIST compatible files contain the required print and text images. The LS-FICS is designed to provide the FBI with the capability of scanning fingerprint cards into a digital format. The FBI will replicate the system to generate a data base of test images. The Host Workstation contains the image data paths and the compression algorithm. A local area network interface, disk storage, and tape drive are used for the image storage and retrieval, and the Lenzar Opacity 1000 scanner is used to acquire the image. The scanner is capable of resolving 500 pixels/in. in both x and y directions. The print images are maintained in full 8-bit gray scale and compressed with an FBI-approved wavelet-based compression algorithm. The text fields are downsampled to 250 pixels/in. and 2-bit gray scale. The text images are then compressed using a lossless Huffman coding scheme. The text fields retrieved from the output files are easily interpreted when displayed on the screen. Detailed procedures are provided for system calibration and operation. Software tools are provided to verify proper system operation.« less

  10. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals

    PubMed Central

    Wu, Qunjian; Zeng, Ying; Zhang, Chi; Tong, Li; Yan, Bin

    2018-01-01

    The electroencephalogram (EEG) signal represents a subject’s specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP). The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP) features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR) of 3.90% and a mean false rejected rate (FRR) of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems. PMID:29364848

  11. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals.

    PubMed

    Wu, Qunjian; Zeng, Ying; Zhang, Chi; Tong, Li; Yan, Bin

    2018-01-24

    The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP). The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP) features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR) of 3.90% and a mean false rejected rate (FRR) of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems.

  12. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    NASA Astrophysics Data System (ADS)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  13. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  14. Tools for quality control of fingerprint databases

    NASA Astrophysics Data System (ADS)

    Swann, B. Scott; Libert, John M.; Lepley, Margaret A.

    2010-04-01

    Integrity of fingerprint data is essential to biometric and forensic applications. Accordingly, the FBI's Criminal Justice Information Services (CJIS) Division has sponsored development of software tools to facilitate quality control functions relative to maintaining its fingerprint data assets inherent to the Integrated Automated Fingerprint Identification System (IAFIS) and Next Generation Identification (NGI). This paper provides an introduction of two such tools. The first FBI-sponsored tool was developed by the National Institute of Standards and Technology (NIST) and examines and detects the spectral signature of the ridge-flow structure characteristic of friction ridge skin. The Spectral Image Validation/Verification (SIVV) utility differentiates fingerprints from non-fingerprints, including blank frames or segmentation failures erroneously included in data; provides a "first look" at image quality; and can identify anomalies in sample rates of scanned images. The SIVV utility might detect errors in individual 10-print fingerprints inaccurately segmented from the flat, multi-finger image acquired by one of the automated collection systems increasing in availability and usage. In such cases, the lost fingerprint can be recovered by re-segmentation from the now compressed multi-finger image record. The second FBI-sponsored tool, CropCoeff was developed by MITRE and thoroughly tested via NIST. CropCoeff enables cropping of the replacement single print directly from the compressed data file, thus avoiding decompression and recompression of images that might degrade fingerprint features necessary for matching.

  15. Image authentication using distributed source coding.

    PubMed

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  16. Plain and Rolled Images from Paired Fingerprint Cards

    National Institute of Standards and Technology Data Gateway

    NIST Plain and Rolled Images from Paired Fingerprint Cards (Web, free access)   NIST Special Database 29 is being distributed for use in development and testing fingerprint matching systems. The data consist of 216 ten-print fingerprint card pairs with both the rolled and plains (from a bottom of the fingerprint card) scanned at 19.7 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  17. Fast subsurface fingerprint imaging with full-field optical coherence tomography system equipped with a silicon camera

    NASA Astrophysics Data System (ADS)

    Auksorius, Egidijus; Boccara, A. Claude

    2017-09-01

    Images recorded below the surface of a finger can have more details and be of higher quality than the conventional surface fingerprint images. This is particularly true when the quality of the surface fingerprints is compromised by, for example, moisture or surface damage. However, there is an unmet need for an inexpensive fingerprint sensor that is able to acquire high-quality images deep below the surface in short time. To this end, we report on a cost-effective full-field optical coherent tomography system comprised of a silicon camera and a powerful near-infrared LED light source. The system, for example, is able to record 1.7 cm×1.7 cm en face images in 0.12 s with the spatial sampling rate of 2116 dots per inch and the sensitivity of 93 dB. We show that the system can be used to image internal fingerprints and sweat ducts with good contrast. Finally, to demonstrate its biometric performance, we acquired subsurface fingerprint images from 240 individual fingers and estimated the equal-error-rate to be ˜0.8%. The developed instrument could also be used in other en face deep-tissue imaging applications because of its high sensitivity, such as in vivo skin imaging.

  18. Chromatographic profiles of Phyllanthus aqueous extracts samples: a proposition of classification using chemometric models.

    PubMed

    Martins, Lucia Regina Rocha; Pereira-Filho, Edenir Rodrigues; Cass, Quezia Bezerra

    2011-04-01

    Taking in consideration the global analysis of complex samples, proposed by the metabolomic approach, the chromatographic fingerprint encompasses an attractive chemical characterization of herbal medicines. Thus, it can be used as a tool in quality control analysis of phytomedicines. The generated multivariate data are better evaluated by chemometric analyses, and they can be modeled by classification methods. "Stone breaker" is a popular Brazilian plant of Phyllanthus genus, used worldwide to treat renal calculus, hepatitis, and many other diseases. In this study, gradient elution at reversed-phase conditions with detection at ultraviolet region were used to obtain chemical profiles (fingerprints) of botanically identified samples of six Phyllanthus species. The obtained chromatograms, at 275 nm, were organized in data matrices, and the time shifts of peaks were adjusted using the Correlation Optimized Warping algorithm. Principal Component Analyses were performed to evaluate similarities among cultivated and uncultivated samples and the discrimination among the species and, after that, the samples were used to compose three classification models using Soft Independent Modeling of Class analogy, K-Nearest Neighbor, and Partial Least Squares for Discriminant Analysis. The ability of classification models were discussed after their successful application for authenticity evaluation of 25 commercial samples of "stone breaker."

  19. Electrostatic-spray ionization mass spectrometry sniffing for perfume fingerprinting.

    PubMed

    Tobolkina, Elena; Qiao, Liang; Xu, Guobin; Girault, Hubert H

    2013-11-15

    The perfume market is growing significantly, and it is easy to find imitative fragrances of probably all types of perfume. Such imitative fragrances are usually of lower quality than the authentic ones, creating a possible threat for perfume companies. Therefore, it is important to develop efficient chemical analysis techniques to screen rapidly perfume samples. Electrostatic-spray ionization (ESTASI) was used to analyze directly samples sprayed or deposited on different types of paper. A linear ion trap mass spectrometer was used to detect the ions produced by ESTASI with a modified extended transfer capillary for 'sniffing' ions from the paper. Several commercial perfumes and a model perfume were analyzed by ESTASI-sniffing. The results obtained by paper ESTASI-MS of commercial fragrances were compared with those obtained from ESI-MS. In addition, a commercial fragrance was first nebulized on the hand and then soaked up by blotting paper, which was afterwards placed on an insulating plate for ESTASI-MS analysis. Analysis of peptides and proteins was also performed to show that the paper ESTASI-MS could be used for samples with very different molecular masses. Paper ESTASI-MS yields a rapid fingerprinting characterization of perfume fragrances, avoiding time-consuming sample-preparation steps, and thereby performing a rapid screening in a few seconds. Copyright © 2013 John Wiley & Sons, Ltd.

  20. Rational quality assessment procedure for less-investigated herbal medicines: Case of a Congolese antimalarial drug with an analytical report.

    PubMed

    Tshitenge, Dieudonné Tshitenge; Ioset, Karine Ndjoko; Lami, José Nzunzu; Ndelo-di-Phanzu, Josaphat; Mufusama, Jean-Pierre Koy Sita; Bringmann, Gerhard

    2016-04-01

    Herbal medicines are the most globally used type of medical drugs. Their high cultural acceptability is due to the experienced safety and efficiency over centuries of use. Many of them are still phytochemically less-investigated, and are used without standardization or quality control. Choosing SIROP KILMA, an authorized Congolese antimalarial phytomedicine, as a model case, our study describes an interdisciplinary approach for a rational quality assessment of herbal drugs in general. It combines an authentication step of the herbal remedy prior to any fingerprinting, the isolation of the major constituents, the development and validation of an HPLC-DAD analytical method with internal markers, and the application of the method to several batches of the herbal medicine (here KILMA) thus permitting the establishment of a quantitative fingerprint. From the constitutive plants of KILMA, acteoside, isoacteoside, stachannin A, and pectolinarigenin-7-O-glucoside were isolated, and acteoside was used as the prime marker for the validation of an analytical method. This study contributes to the efforts of the WHO for the establishment of standards enabling the analytical evaluation of herbal materials. Moreover, the paper describes the first phytochemical and analytical report on a marketed Congolese phytomedicine. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data

    PubMed Central

    Serwaa-Bonsu, Adwoa; Herbst, Abraham J.; Reniers, Georges; Ijaa, Wilfred; Clark, Benjamin; Kabudula, Chodziwadziwa; Sankoh, Osman

    2010-01-01

    Background In developing countries, Health and Demographic Surveillance Systems (HDSSs) provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS). Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. Objective To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. Methodology Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. Results Adult (18–65 years) fingerprint enrolment rates varied between 94.1% (95% CI 93.6–94.5) for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9–97.6) for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site) were only 55.1% (95% CI 52.7–57.4). By age 5, child fingerprint enrolment rates were comparable to those of adults. Conclusion This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the more restrictive health service perspective. PMID:20200659

  2. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  3. Determination of wine authenticity and geographical origin by measuring non-exchangeable hydrogen stable isotopes in wine ethanol with EIM-IRMS® methodology in combination with δ18O values obtained from wine water.

    NASA Astrophysics Data System (ADS)

    Smajlovic, Ivan; Glavanovic, Mirko; Sparks, Kimberlee L.; Sparks, Jed P.; Jovic, Slobodan

    2014-05-01

    Wine consumption has grown significantly in the last two decades, with the United States being the leading consumer of wine in the world. It is also the second largest wine producer and importer after the European Union, which consists of 27 European countries. The world has seen a significant increase in production from new world countries, especially the United States, Australia and Chile, and wine imports have grown significantly with this globalization. The quality and authenticity of products have become critical concerns. With the amount of wine being imported the need for verifying wine authenticity and understanding procedures used in wine making has become more important than ever. Understanding the origin of consumed wine in rapidly expanding global economy has become fundamental in order to control quality and protect consumers. In our previous scientific work we have shown that EIM-IRMS®, Ethanol Isotope Measurement - Isotope Ratio Mass Spectrometry (EIM-IRMS®), is capable of providing unique molecular fingerprint that cannot be reproduced or counterfeited. Today we know that δ18O value from the wine water is one of the most important parameters which can give information about wine geographical origin. Earlier we have suggested that grape juice or grape pulp is a closed biochemical system in which all chemical compounds stand in dynamic equilibrium and are in direct connection with each other. Taking that into consideration we have concluded that if system is genuine and if no water, or no sugar has been added to the grape must or grape juice prior to alcoholic fermentation, then ethanol which is made in process of alcoholic fermentation will have specific δD value of non-exchangeable hydrogen stable isotopes which will be in range from -205 to -215 ‰ vs. V-SMOW. In this work we will show that this value, which we named δDn (non-exchangeable hydrogen stable isotopes in ethanol), is very important because it can support or refute conclusions drawn from the wine water δ18O value. If water is added prior or during alcoholic fermentation, final ethanol δDn value will fall outside of the range of -205 to -215 ‰ vs. V-SMOW, while wine water δ18O value may still appear valid for the wine origin. We are certain that measuring wine water δ18O alone could give wrong impression about wine origin. With the new set of ethanol δDn and wine water δ18O results obtained from genuine wine samples from different vintages and from different geographic destinations (Serbia and USA), we are more certain that EIM-IRMS® method can help in determination of geographical origin and give additional information about wine authenticity and also important information about illegal production practices (addition of sugar and/or dilution with water) in wine production. Keywords: Isotope Ratio Mass Spectrometry (IRMS), Wine, Authenticity, determination of origin

  4. Video fingerprinting for copy identification: from research to industry applications

    NASA Astrophysics Data System (ADS)

    Lu, Jian

    2009-02-01

    Research that began a decade ago in video copy detection has developed into a technology known as "video fingerprinting". Today, video fingerprinting is an essential and enabling tool adopted by the industry for video content identification and management in online video distribution. This paper provides a comprehensive review of video fingerprinting technology and its applications in identifying, tracking, and managing copyrighted content on the Internet. The review includes a survey on video fingerprinting algorithms and some fundamental design considerations, such as robustness, discriminability, and compactness. It also discusses fingerprint matching algorithms, including complexity analysis, and approximation and optimization for fast fingerprint matching. On the application side, it provides an overview of a number of industry-driven applications that rely on video fingerprinting. Examples are given based on real-world systems and workflows to demonstrate applications in detecting and managing copyrighted content, and in monitoring and tracking video distribution on the Internet.

  5. Vulnerabilities of fingerprint reader to fake fingerprints attacks.

    PubMed

    Espinoza, Marcela; Champod, Christophe; Margot, Pierre

    2011-01-30

    The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  6. 75 FR 9435 - Agency Information Collection Activities: Existing collection, Comments Requested

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-02

    ... collection for renewal. Three Fingerprint Cards: Arrest and Institution; Applicant; Personal Identification...-0046. (2) The title of the form/collection: Three Fingerprint Cards: Arrest and Institution; Applicant... Integrated Automated Fingerprint Identification System (IAFIS) of the FBI. (5) An estimate of the total...

  7. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  8. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  9. Optical coherence tomography used for internal biometrics

    NASA Astrophysics Data System (ADS)

    Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel

    2007-06-01

    Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.

  10. Line-scanning Raman imaging spectroscopy for detection of fingerprints.

    PubMed

    Deng, Sunan; Liu, Le; Liu, Zhiyi; Shen, Zhiyuan; Li, Guohua; He, Yonghong

    2012-06-10

    Fingerprints are the best form of personal identification for criminal investigation purposes. We present a line-scanning Raman imaging system and use it to detect fingerprints composed of β-carotene and fish oil on different substrates. Although the line-scanning Raman system has been used to map the distribution of materials such as polystyrene spheres and minerals within geological samples, this is the first time to our knowledge that the method is used in imaging fingerprints. Two Raman peaks of β-carotene (501.2, 510.3 nm) are detected and the results demonstrate that both peaks can generate excellent images with little difference between them. The system operates at a spectra resolution of about 0.4 nm and can detect β-carotene signals in petroleum ether solution with the limit of detection of 3.4×10(-9) mol/L. The results show that the line-scanning Raman imaging spectroscopy we have built has a high accuracy and can be used in the detection of latent fingerprints in the future.

  11. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  12. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  13. Keystroke dynamics in the pre-touchscreen era

    PubMed Central

    Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A.

    2013-01-01

    Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals’ typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts. PMID:24391568

  14. Pyrrole Alkaloids with Potential Cancer Chemopreventive Activity Isolated from a Goji Berry-Contaminated Commercial Sample of African Mango

    PubMed Central

    2015-01-01

    Bioassay-guided fractionation of a commercial sample of African mango (Irvingia gabonensis) that was later shown to be contaminated with goji berry (Lycium sp.) led to the isolation of a new pyrrole alkaloid, methyl 2-[2-formyl-5-(hydroxymethyl)-1H-pyrrol-1-yl]propanoate, 1, along with seven known compounds, 2–8. The structures of the isolated compounds were established by analysis of their spectroscopic data. The new compound 1g showed hydroxyl radical-scavenging activity with an ED50 value of 16.7 μM, whereas 4-[formyl-5-(methoxymethyl)-1H-pyrrol-1-yl]butanoic acid (2) was active in both the hydroxyl radical-scavenging (ED50 11.9 μM) and quinone reductase-induction [CD (concentration required to double QR activity) 2.4 μM)] assays used. The isolated compounds were shown to be absent in a taxonomically authenticated African mango sample but present in three separate authentic samples of goji berry (Lycium barbarum) using LC-MS and 1H NMR fingerprinting analysis, including one sample that previously showed inhibitory activity in vivo in a rat esophageal cancer model induced with N-nitrosomethylbenzylamine. Additionally, microscopic features characteristic of goji berry were observed in the commercial African mango sample. PMID:24792835

  15. Multivariate Calibration Approach for Quantitative Determination of Cell-Line Cross Contamination by Intact Cell Mass Spectrometry and Artificial Neural Networks.

    PubMed

    Valletta, Elisa; Kučera, Lukáš; Prokeš, Lubomír; Amato, Filippo; Pivetta, Tiziana; Hampl, Aleš; Havel, Josef; Vaňhara, Petr

    2016-01-01

    Cross-contamination of eukaryotic cell lines used in biomedical research represents a highly relevant problem. Analysis of repetitive DNA sequences, such as Short Tandem Repeats (STR), or Simple Sequence Repeats (SSR), is a widely accepted, simple, and commercially available technique to authenticate cell lines. However, it provides only qualitative information that depends on the extent of reference databases for interpretation. In this work, we developed and validated a rapid and routinely applicable method for evaluation of cell culture cross-contamination levels based on mass spectrometric fingerprints of intact mammalian cells coupled with artificial neural networks (ANNs). We used human embryonic stem cells (hESCs) contaminated by either mouse embryonic stem cells (mESCs) or mouse embryonic fibroblasts (MEFs) as a model. We determined the contamination level using a mass spectra database of known calibration mixtures that served as training input for an ANN. The ANN was then capable of correct quantification of the level of contamination of hESCs by mESCs or MEFs. We demonstrate that MS analysis, when linked to proper mathematical instruments, is a tangible tool for unraveling and quantifying heterogeneity in cell cultures. The analysis is applicable in routine scenarios for cell authentication and/or cell phenotyping in general.

  16. Multivariate Calibration Approach for Quantitative Determination of Cell-Line Cross Contamination by Intact Cell Mass Spectrometry and Artificial Neural Networks

    PubMed Central

    Prokeš, Lubomír; Amato, Filippo; Pivetta, Tiziana; Hampl, Aleš; Havel, Josef; Vaňhara, Petr

    2016-01-01

    Cross-contamination of eukaryotic cell lines used in biomedical research represents a highly relevant problem. Analysis of repetitive DNA sequences, such as Short Tandem Repeats (STR), or Simple Sequence Repeats (SSR), is a widely accepted, simple, and commercially available technique to authenticate cell lines. However, it provides only qualitative information that depends on the extent of reference databases for interpretation. In this work, we developed and validated a rapid and routinely applicable method for evaluation of cell culture cross-contamination levels based on mass spectrometric fingerprints of intact mammalian cells coupled with artificial neural networks (ANNs). We used human embryonic stem cells (hESCs) contaminated by either mouse embryonic stem cells (mESCs) or mouse embryonic fibroblasts (MEFs) as a model. We determined the contamination level using a mass spectra database of known calibration mixtures that served as training input for an ANN. The ANN was then capable of correct quantification of the level of contamination of hESCs by mESCs or MEFs. We demonstrate that MS analysis, when linked to proper mathematical instruments, is a tangible tool for unraveling and quantifying heterogeneity in cell cultures. The analysis is applicable in routine scenarios for cell authentication and/or cell phenotyping in general. PMID:26821236

  17. Keystroke dynamics in the pre-touchscreen era.

    PubMed

    Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A

    2013-12-19

    Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.

  18. Uses of software in digital image analysis: a forensic report

    NASA Astrophysics Data System (ADS)

    Sharma, Mukesh; Jha, Shailendra

    2010-02-01

    Forensic image analysis is required an expertise to interpret the content of an image or the image itself in legal matters. Major sub-disciplines of forensic image analysis with law enforcement applications include photo-grammetry, photographic comparison, content analysis and image authentication. It has wide applications in forensic science range from documenting crime scenes to enhancing faint or indistinct patterns such as partial fingerprints. The process of forensic image analysis can involve several different tasks, regardless of the type of image analysis performed. Through this paper authors have tried to explain these tasks, which are described in to three categories: Image Compression, Image Enhancement & Restoration and Measurement Extraction. With the help of examples like signature comparison, counterfeit currency comparison and foot-wear sole impression using the software Canvas and Corel Draw.

  19. Fingerprint Recognition with Identical Twin Fingerprints

    PubMed Central

    Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar. PMID:22558204

  20. Fingerprint recognition with identical twin fingerprints.

    PubMed

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  1. Password-free network security through joint use of audio and video

    NASA Astrophysics Data System (ADS)

    Civanlar, Mehmet R.; Chen, Tsuhan

    1997-01-01

    REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.

  2. Limitations and requirements of content-based multimedia authentication systems

    NASA Astrophysics Data System (ADS)

    Wu, Chai W.

    2001-08-01

    Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.

  3. Quality Traceability System of Traditional Chinese Medicine Based on Two Dimensional Barcode Using Mobile Intelligent Technology.

    PubMed

    Cai, Yong; Li, Xiwen; Wang, Runmiao; Yang, Qing; Li, Peng; Hu, Hao

    2016-01-01

    Currently, the chemical fingerprint comparison and analysis is mainly based on professional equipment and software, it's expensive and inconvenient. This study aims to integrate QR (Quick Response) code with quality data and mobile intelligent technology to develop a convenient query terminal for tracing quality in the whole industrial chain of TCM (traditional Chinese medicine). Three herbal medicines were randomly selected and their chemical two-dimensional barcode (2D) barcodes fingerprints were constructed. Smartphone application (APP) based on Android system was developed to read initial data of 2D chemical barcodes, and compared multiple fingerprints from different batches of same species or different species. It was demonstrated that there were no significant differences between original and scanned TCM chemical fingerprints. Meanwhile, different TCM chemical fingerprint QR codes could be rendered in the same coordinate and showed the differences very intuitively. To be able to distinguish the variations of chemical fingerprint more directly, linear interpolation angle cosine similarity algorithm (LIACSA) was proposed to get similarity ratio. This study showed that QR codes can be used as an effective information carrier to transfer quality data. Smartphone application can rapidly read quality information in QR codes and convert data into TCM chemical fingerprints.

  4. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  5. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  6. 42 CFR 424.518 - Screening levels for Medicare providers and suppliers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...

  7. 42 CFR 424.518 - Screening levels for Medicare providers and suppliers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...

  8. 42 CFR 424.518 - Screening levels for Medicare providers and suppliers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Requires the submission of a set of fingerprints for a national background check from all individuals who...) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who maintain a 5 percent or greater...

  9. 42 CFR 424.518 - Screening levels for Medicare providers and suppliers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...

  10. Quality assurance of herbal raw materials in supply chain: challenges and opportunities.

    PubMed

    Govindaraghavan, Suresh

    2008-01-01

    The herbal medicine industry is presently adopting modern scientific tools to substantiate the guarantee of efficacy that, in the past, rested only on anecdotal evidence derived from traditional knowledge systems. This is particularly true for the processes of identification of herbal raw materials adopting modern tools for phytochemical fingerprinting. The successful adaptation of available technologies and practices depends on an understanding of the phytochemical complexity and variability innate in biological material. It challenges the "mainstream medicinal mindset" that "tend(s) to reject …. therapies for which mechanisms of action do not fit within Newtonian, biochemical orientation" (Dumoff, 2003). The herbal medicinal industry is independently evolving its own rigid quality assurance and control systems using Good Manufacturing Practice (GMP) and Good Laboratory Practice (GLP) guidelines, but it faces unique difficulties. These include lack of Good Agricultural and Collection Practice (GACP), lack of transparency in the raw material supply chain so as to preclude the use of unsafe practices, problems in the authentication of herbal raw materials, and a general lack of understanding of the need to reduce phytochemical variability in these materials. This paper explores these difficulties and outlines strategies to overcome them, but these strategies will require coordinated international government regulations to be fully effective.

  11. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  12. Earthquake Fingerprints: Representing Earthquake Waveforms for Similarity-Based Detection

    NASA Astrophysics Data System (ADS)

    Bergen, K.; Beroza, G. C.

    2016-12-01

    New earthquake detection methods, such as Fingerprint and Similarity Thresholding (FAST), use fast approximate similarity search to identify similar waveforms in long-duration data without templates (Yoon et al. 2015). These methods have two key components: fingerprint extraction and an efficient search algorithm. Fingerprint extraction converts waveforms into fingerprints, compact signatures that represent short-duration waveforms for identification and search. Earthquakes are detected using an efficient indexing and search scheme, such as locality-sensitive hashing, that identifies similar waveforms in a fingerprint database. The quality of the search results, and thus the earthquake detection results, is strongly dependent on the fingerprinting scheme. Fingerprint extraction should map similar earthquake waveforms to similar waveform fingerprints to ensure a high detection rate, even under additive noise and small distortions. Additionally, fingerprints corresponding to noise intervals should have mutually dissimilar fingerprints to minimize false detections. In this work, we compare the performance of multiple fingerprint extraction approaches for the earthquake waveform similarity search problem. We apply existing audio fingerprinting (used in content-based audio identification systems) and time series indexing techniques and present modified versions that are specifically adapted for seismic data. We also explore data-driven fingerprinting approaches that can take advantage of labeled or unlabeled waveform data. For each fingerprinting approach we measure its ability to identify similar waveforms in a low signal-to-noise setting, and quantify the trade-off between true and false detection rates in the presence of persistent noise sources. We compare the performance using known event waveforms from eight independent stations in the Northern California Seismic Network.

  13. Fast subsurface fingerprint imaging with full-field optical coherence tomography system equipped with a silicon camera.

    PubMed

    Auksorius, Egidijus; Boccara, A Claude

    2017-09-01

    Images recorded below the surface of a finger can have more details and be of higher quality than the conventional surface fingerprint images. This is particularly true when the quality of the surface fingerprints is compromised by, for example, moisture or surface damage. However, there is an unmet need for an inexpensive fingerprint sensor that is able to acquire high-quality images deep below the surface in short time. To this end, we report on a cost-effective full-field optical coherent tomography system comprised of a silicon camera and a powerful near-infrared LED light source. The system, for example, is able to record 1.7  cm×1.7  cmen face images in 0.12 s with the spatial sampling rate of 2116 dots per inch and the sensitivity of 93 dB. We show that the system can be used to image internal fingerprints and sweat ducts with good contrast. Finally, to demonstrate its biometric performance, we acquired subsurface fingerprint images from 240 individual fingers and estimated the equal-error-rate to be ∼0.8%. The developed instrument could also be used in other en face deep-tissue imaging applications because of its high sensitivity, such as in vivo skin imaging. (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE).

  14. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  15. A Design of Irregular Grid Map for Large-Scale Wi-Fi LAN Fingerprint Positioning Systems

    PubMed Central

    Kim, Jae-Hoon; Min, Kyoung Sik; Yeo, Woon-Young

    2014-01-01

    The rapid growth of mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The Wi-Fi positioning system (WPS) is a new positioning method that measures received signal strength indication (RSSI) data from all Wi-Fi access points (APs) and stores them in a large database as a form of radio fingerprint map. Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. Therefore, we present a novel irregular grid structure and data analytics for efficient fingerprint map management. The usefulness of the proposed methodology is presented using the actual radio fingerprint measurements taken throughout Seoul, Korea. PMID:25302315

  16. A design of irregular grid map for large-scale Wi-Fi LAN fingerprint positioning systems.

    PubMed

    Kim, Jae-Hoon; Min, Kyoung Sik; Yeo, Woon-Young

    2014-01-01

    The rapid growth of mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The Wi-Fi positioning system (WPS) is a new positioning method that measures received signal strength indication (RSSI) data from all Wi-Fi access points (APs) and stores them in a large database as a form of radio fingerprint map. Because of the millions of APs in urban areas, radio fingerprints are seriously contaminated and confused. Moreover, the algorithmic advances for positioning face computational limitation. Therefore, we present a novel irregular grid structure and data analytics for efficient fingerprint map management. The usefulness of the proposed methodology is presented using the actual radio fingerprint measurements taken throughout Seoul, Korea.

  17. Fingerprint multicast in secure video streaming.

    PubMed

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shimizu, Y; Yoon, Y; Iwase, K

    Purpose: We are trying to develop an image-searching technique to identify misfiled images in a picture archiving and communication system (PACS) server by using five biological fingerprints: the whole lung field, cardiac shadow, superior mediastinum, lung apex, and right lower lung. Each biological fingerprint in a chest radiograph includes distinctive anatomical structures to identify misfiled images. The whole lung field was less effective for evaluating the similarity between two images than the other biological fingerprints. This was mainly due to the variation in the positioning for chest radiographs. The purpose of this study is to develop new biological fingerprints thatmore » could reduce influence of differences in the positioning for chest radiography. Methods: Two hundred patients were selected randomly from our database (36,212 patients). These patients had two images each (current and previous images). Current images were used as the misfiled images in this study. A circumscribed rectangular area of the lung and the upper half of the rectangle were selected automatically as new biological fingerprints. These biological fingerprints were matched to all previous images in the database. The degrees of similarity between the two images were calculated for the same and different patients. The usefulness of new the biological fingerprints for automated patient recognition was examined in terms of receiver operating characteristic (ROC) analysis. Results: Area under the ROC curves (AUCs) for the circumscribed rectangle of the lung, upper half of the rectangle, and whole lung field were 0.980, 0.994, and 0.950, respectively. The new biological fingerprints showed better performance in identifying the patients correctly than the whole lung field. Conclusion: We have developed new biological fingerprints: circumscribed rectangle of the lung and upper half of the rectangle. These new biological fingerprints would be useful for automated patient identification system because they are less affected by positioning differences during imaging.« less

  19. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks

    PubMed Central

    2016-01-01

    Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness). Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes it suitable for partial-copy detection; that is, by processing only short segments of 1 second length. PMID:27861492

  20. Comparative study of palm print authentication system using geometric features

    NASA Astrophysics Data System (ADS)

    Shreyas, Kamath K. M.; Rajeev, Srijith; Panetta, Karen; Agaian, Sos S.

    2017-05-01

    Biometrics, particularly palm print authentication has been a stimulating research area due to its abundance of features. Stable features and effective matching are the most crucial steps for an authentication system. In conventional palm print authentication systems, matching is based on flexion creases, friction ridges, and minutiae points. Currently, contactless palm print imaging is an emerging technology. However, they tend to involve fluctuations in the image quality and texture loss due to factors such as varying illumination conditions, occlusions, noise, pose, and ghosting. These variations decrease the performance of the authentication systems. Furthermore, real-time palm print authentication in large databases continue to be a challenging task. In order to effectively solve these problems, features which are invariant to these anomalies are required. This paper proposes a robust palm print matching framework by making a comparative study of different local geometric features such as Difference-of-Gaussian, Hessian, Hessian-Laplace, Harris-Laplace, and Multiscale Harris for feature detection. These detectors are coupled with Scale Invariant Feature Transformation (SIFT) descriptor to describe the identified features. Additionally, a two-stage refinement process is carried out to obtain the best stable matches. Computer simulations demonstrate that the accuracy of the system has increased effectively with an EER of 0.86% when Harris-Laplace detector is used on IITD database.

  1. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  2. SVM-Based Synthetic Fingerprint Discrimination Algorithm and Quantitative Optimization Strategy

    PubMed Central

    Chen, Suhang; Chang, Sheng; Huang, Qijun; He, Jin; Wang, Hao; Huang, Qiangui

    2014-01-01

    Synthetic fingerprints are a potential threat to automatic fingerprint identification systems (AFISs). In this paper, we propose an algorithm to discriminate synthetic fingerprints from real ones. First, four typical characteristic factors—the ridge distance features, global gray features, frequency feature and Harris Corner feature—are extracted. Then, a support vector machine (SVM) is used to distinguish synthetic fingerprints from real fingerprints. The experiments demonstrate that this method can achieve a recognition accuracy rate of over 98% for two discrete synthetic fingerprint databases as well as a mixed database. Furthermore, a performance factor that can evaluate the SVM's accuracy and efficiency is presented, and a quantitative optimization strategy is established for the first time. After the optimization of our synthetic fingerprint discrimination task, the polynomial kernel with a training sample proportion of 5% is the optimized value when the minimum accuracy requirement is 95%. The radial basis function (RBF) kernel with a training sample proportion of 15% is a more suitable choice when the minimum accuracy requirement is 98%. PMID:25347063

  3. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.

    PubMed

    Juang, Kevin; Greenstein, Joel

    2018-04-01

    We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.

  4. 6 CFR 37.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... and grant provisions, of the Violence Against Women and Department of Justice Reauthorization Act of... Automated Fingerprint Identification System, a national fingerprint and criminal history system maintained..., universal definitions and grant provisions, of the Violence Against Women and Department of Justice...

  5. 6 CFR 37.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and grant provisions, of the Violence Against Women and Department of Justice Reauthorization Act of... Automated Fingerprint Identification System, a national fingerprint and criminal history system maintained..., universal definitions and grant provisions, of the Violence Against Women and Department of Justice...

  6. 6 CFR 37.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and grant provisions, of the Violence Against Women and Department of Justice Reauthorization Act of... Automated Fingerprint Identification System, a national fingerprint and criminal history system maintained..., universal definitions and grant provisions, of the Violence Against Women and Department of Justice...

  7. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  8. 76 FR 35169 - Validation of Merchant Mariners' Vital Information and Issuance of Coast Guard Merchant Mariner's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... both temporary and permanent. Locations such as post offices can take secure fingerprints for purposes... large number of applicants might require fingerprints and identification checks, and that the Coast... interim rule and work with industry to come up with a better system for fingerprint and identification...

  9. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  10. Scanning the pressure-induced distortion of fingerprints.

    PubMed

    Mil'shtein, S; Doshi, U

    2004-01-01

    Fingerprint recognition technology is an important part of criminal investigations it is the basis of some security systems and an important tool of government operations such as the Immigration and Naturalization Services, registration procedures in the Armed Forces, and so forth. After the tragic events of September 11, 2001, the importance of reliable fingerprint recognition technology became even more obvious. In the current study, pressure-induced changes of distances between ridges of a fingerprint were measured. Using calibrated silicon pressure sensors we scanned the distribution of pressure across a finger pixel by pixel, and also generated maps of an average pressure distribution during fingerprinting. Emulating the fingerprinting procedure employed with widely used optical scanners, we found that on average the distance between ridges decreases by about 20% when a finger is positioned on a scanner. Controlled loading of a finger demonstrated that it is impossible to reproduce the same distribution of pressure across a given finger during repeated fingerprinting procedures.

  11. Effective Fingerprint Quality Estimation for Diverse Capture Sensors

    PubMed Central

    Xie, Shan Juan; Yoon, Sook; Shin, Jinwook; Park, Dong Sun

    2010-01-01

    Recognizing the quality of fingerprints in advance can be beneficial for improving the performance of fingerprint recognition systems. The representative features to assess the quality of fingerprint images from different types of capture sensors are known to vary. In this paper, an effective quality estimation system that can be adapted for different types of capture sensors is designed by modifying and combining a set of features including orientation certainty, local orientation quality and consistency. The proposed system extracts basic features, and generates next level features which are applicable for various types of capture sensors. The system then uses the Support Vector Machine (SVM) classifier to determine whether or not an image should be accepted as input to the recognition system. The experimental results show that the proposed method can perform better than previous methods in terms of accuracy. In the meanwhile, the proposed method has an ability to eliminate residue images from the optical and capacitive sensors, and the coarse images from thermal sensors. PMID:22163632

  12. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  13. Generating One Biometric Feature from Another: Faces from Fingerprints

    PubMed Central

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  14. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  15. Mated Fingerprint Card Pairs 2 (MFCP2)

    National Institute of Standards and Technology Data Gateway

    NIST Mated Fingerprint Card Pairs 2 (MFCP2) (Web, free access)   NIST Special Database 14 is being distributed for use in development and testing of automated fingerprint classification and matching systems on a set of images which approximate a natural horizontal distribution of the National Crime Information Center (NCIC) fingerprint classes. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  16. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bradley, J.N.; Brislawn, C.M.; Hopper, T.

    1993-05-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI`s Integrated Automated Fingerprint Identification System.

  17. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bradley, J.N.; Brislawn, C.M.; Hopper, T.

    1993-01-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI's Integrated Automated Fingerprint Identification System.

  18. Quality Traceability System of Traditional Chinese Medicine Based on Two Dimensional Barcode Using Mobile Intelligent Technology

    PubMed Central

    Cai, Yong; Li, Xiwen; Wang, Runmiao; Yang, Qing; Li, Peng; Hu, Hao

    2016-01-01

    Currently, the chemical fingerprint comparison and analysis is mainly based on professional equipment and software, it’s expensive and inconvenient. This study aims to integrate QR (Quick Response) code with quality data and mobile intelligent technology to develop a convenient query terminal for tracing quality in the whole industrial chain of TCM (traditional Chinese medicine). Three herbal medicines were randomly selected and their chemical two-dimensional barcode (2D) barcodes fingerprints were constructed. Smartphone application (APP) based on Android system was developed to read initial data of 2D chemical barcodes, and compared multiple fingerprints from different batches of same species or different species. It was demonstrated that there were no significant differences between original and scanned TCM chemical fingerprints. Meanwhile, different TCM chemical fingerprint QR codes could be rendered in the same coordinate and showed the differences very intuitively. To be able to distinguish the variations of chemical fingerprint more directly, linear interpolation angle cosine similarity algorithm (LIACSA) was proposed to get similarity ratio. This study showed that QR codes can be used as an effective information carrier to transfer quality data. Smartphone application can rapidly read quality information in QR codes and convert data into TCM chemical fingerprints. PMID:27780256

  19. 78 FR 2465 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ..., fingerprint card and a combined payment of fees to FINRA. Through the CRD system, FINRA maintains the... applicability of the fee to Form BD processing. Increasing the manual fingerprint processing fee from $13 to $30... each set of fingerprint results and identifying information that have been processed through another...

  20. 78 FR 3947 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-17

    ..., fingerprint card and a combined payment of fees to FINRA. Through the CRD system, FINRA maintains the... applicability of the fee to Form BD processing. Increasing the manual fingerprint processing fee from $13 to $30... each set of fingerprint results and identifying information that have been processed through another...

  1. Fingerprint pattern restoration by digital image processing techniques.

    PubMed

    Wen, Che-Yen; Yu, Chiu-Chung

    2003-09-01

    Fingerprint evidence plays an important role in solving criminal problems. However, defective (lacking information needed for completeness) or contaminated (undesirable information included) fingerprint patterns make identifying and recognizing processes difficult. Unfortunately. this is the usual case. In the recognizing process (enhancement of patterns, or elimination of "false alarms" so that a fingerprint pattern can be searched in the Automated Fingerprint Identification System (AFIS)), chemical and physical techniques have been proposed to improve pattern legibility. In the identifying process, a fingerprint examiner can enhance contaminated (but not defective) fingerprint patterns under guidelines provided by the Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST), the Scientific Working Group on Imaging Technology (SWGIT), and an AFIS working group within the National Institute of Justice. Recently, the image processing techniques have been successfully applied in forensic science. For example, we have applied image enhancement methods to improve the legibility of digital images such as fingerprints and vehicle plate numbers. In this paper, we propose a novel digital image restoration technique based on the AM (amplitude modulation)-FM (frequency modulation) reaction-diffusion method to restore defective or contaminated fingerprint patterns. This method shows its potential application to fingerprint pattern enhancement in the recognizing process (but not for the identifying process). Synthetic and real images are used to show the capability of the proposed method. The results of enhancing fingerprint patterns by the manual process and our method are evaluated and compared.

  2. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    PubMed

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  3. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  4. Possibility of spoof attack against robustness of multibiometric authentication systems

    NASA Astrophysics Data System (ADS)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  5. Evaluation of the automatic optical authentication technologies for control systems of objects

    NASA Astrophysics Data System (ADS)

    Averkin, Vladimir V.; Volegov, Peter L.; Podgornov, Vladimir A.

    2000-03-01

    The report considers the evaluation of the automatic optical authentication technologies for the automated integrated system of physical protection, control and accounting of nuclear materials at RFNC-VNIITF, and for providing of the nuclear materials nonproliferation regime. The report presents the nuclear object authentication objectives and strategies, the methodology of the automatic optical authentication and results of the development of pattern recognition techniques carried out under the ISTC project #772 with the purpose of identification of unique features of surface structure of a controlled object and effects of its random treatment. The current decision of following functional control tasks is described in the report: confirmation of the item authenticity (proof of the absence of its substitution by an item of similar shape), control over unforeseen change of item state, control over unauthorized access to the item. The most important distinctive feature of all techniques is not comprehensive description of some properties of controlled item, but unique identification of item using minimum necessary set of parameters, properly comprising identification attribute of the item. The main emphasis in the technical approach is made on the development of rather simple technological methods for the first time intended for use in the systems of physical protection, control and accounting of nuclear materials. The developed authentication devices and system are described.

  6. [Relationship between HPLC fingerprint chromatogram and inhibitory effect on respiratory burst of rat PMN of leaves of crataegus].

    PubMed

    Liu, Rong-hua; Yu, Bo-yang; Chen, Lan-ying; Liu, Ji-hua; Shao, Feng; Ma, Zhi-lin; Yang, Ming

    2008-08-01

    To study the relationship between HPLC fingerprint chromatogram and inhibitory effect on respiratory burst of rat PMN of leaves of crataegus L. HPLC fingerprint peaks of different species of hawthorn leaves were isolated and used for the effective experiment on the respiratory burst of rat PMN. The mathematic models of the relationship between the area and the effect of fingerprint peaks were established. According to the mathematic models, the HPLC fingerprint were change into bioactive fingerprint (include effective fingerprint and potency fingerprint) with the helps of mathematics, chemometrics, computer program simulation and etc. The chromatogram-effect relationship of leaves of crataegus. on respiratory burst of rat PMN was established. According to this relationship, the activities of fourteen samples of leaves of crataegus. were forecasted. It was positive correlation between the expected value and the practical value. And the correlation coefficients was 0.968 (P < 0.01). An all-around evaluative system, which includes not only chemical identification but also effective evaluation for traditional Chinese medicine was established. It will provide a new idea for study on fingerprint chromatogram of traditional Chinese medicine.

  7. From template to image: reconstructing fingerprints from minutiae points.

    PubMed

    Ross, Arun; Shah, Jidnya; Jain, Anil K

    2007-04-01

    Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. In this paper, we challenge this notion and show that three levels of information about the parent fingerprint can be elicited from the minutiae template alone, viz., 1) the orientation field information, 2) the class or type information, and 3) the friction ridge structure. The orientation estimation algorithm determines the direction of local ridges using the evidence of minutiae triplets. The estimated orientation field, along with the given minutiae distribution, is then used to predict the class of the fingerprint. Finally, the ridge structure of the parent fingerprint is generated using streamlines that are based on the estimated orientation field. Line Integral Convolution is used to impart texture to the ensuing ridges, resulting in a ridge map resembling the parent fingerprint. The salient feature of this noniterative method to generate ridges is its ability to preserve the minutiae at specified locations in the reconstructed ridge map. Experiments using a commercial fingerprint matcher suggest that the reconstructed ridge structure bears close resemblance to the parent fingerprint.

  8. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  9. Integration of Directional Antennas in an RSS Fingerprinting-Based Indoor Localization System

    PubMed Central

    Guzmán-Quirós, Raúl; Martínez-Sala, Alejandro; Gómez-Tornero, José Luis; García-Haro, Joan

    2015-01-01

    In this paper, the integration of directional antennas in a room-level received signal strength (RSS) fingerprinting-based indoor localization system (ILS) is studied. The sensor reader (SR), which is in charge of capturing the RSS to infer the tag position, can be attached to an omnidirectional or directional antenna. Unlike commonly-employed omnidirectional antennas, directional antennas can receive a stronger signal from the direction in which they are pointed, resulting in a different RSS distributions in space and, hence, more distinguishable fingerprints. A simulation tool and a system management software have been also developed to control the system and assist the initial antenna deployment, reducing time-consuming costs. A prototype was mounted in a real scenario, with a number of SRs with omnidirectional and directional antennas properly positioned. Different antenna configurations have been studied, evidencing a promising capability of directional antennas to enhance the performance of RSS fingerprinting-based ILS, reducing the number of required SRs and also increasing the localization success. PMID:26703620

  10. Quality and matching performance analysis of three-dimensional unraveled fingerprints

    NASA Astrophysics Data System (ADS)

    Wang, Yongchang; Hao, Qi; Fatehpuria, Abhishika; Hassebrook, Laurence G.; Lau, Daniel L.

    2010-07-01

    The use of fingerprints as a biometric is both the oldest mode of computer-aided personal identification and the most-relied-on technology in use today. However, current acquisition methods have some challenging and peculiar difficulties. For higher performance fingerprint data acquisition and verification, a novel noncontact 3-D fingerprint scanner is investigated, where both the detailed 3-D and albedo information of the finger is obtained. The obtained high-resolution 3-D prints are further converted into 3-D unraveled prints, to be compatible with traditional 2-D automatic fingerprint identification systems. As a result, many limitations imposed on conventional fingerprint capture and processing can be reduced by the unobtrusiveness of this approach and the extra depth information acquired. To compare the quality and matching performances of 3-D unraveled with traditional 2-D plain fingerprints, we collect both 3-D prints and their 2-D plain counterparts. The print quality and matching performances are evaluated and analyzed by using National Institute of Standard Technology fingerprint software. Experimental results show that the 3-D unraveled print outperforms the 2-D print in both quality and matching performances.

  11. Phenolic profiles of raw apricots, pumpkins, and their purees in the evaluation of apricot nectar and jam authenticity.

    PubMed

    Dragovic-Uzelac, Verica; Delonga, Karmela; Levaj, Branka; Djakovic, Senka; Pospisil, Jasna

    2005-06-15

    The possibility of proving the undeclared addition of pumpkin puree in apricot nectars and jams has been investigated by using the phenol compound fingerprint and sensory evaluation. The cheaper pumpkin admixtures in apricot nectars and jams could not be detected by the sensory evaluation, particularly if present in quantities of <15%. The lower admixtures of pumpkin puree in apricot nectars and jams could be detected by the presence of syringic acid, a phenolic compound characteristic of the investigated pumpkins (Cucurbita pepo cv. Gleisdorff and Table Gold, Cucurbita maxima cv. Turkinja, and Cucurbita moschata cv. Argenta). Syringic acid was isolated from pumpkin puree and determined by using HPLC with diode array detection. By using the phenolic profile, undeclared pumpkin admixture (> or =5%) in the apricot nectars and jams could be proven.

  12. Cell phone camera ballistics: attacks and countermeasures

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Liu, Huajian; Fan, Peishuai; Katzenbeisser, Stefan

    2010-01-01

    Multimedia forensics deals with the analysis of multimedia data to gather information on its origin and authenticity. One therefore needs to distinguish classical criminal forensics (which today also uses multimedia data as evidence) and multimedia forensics where the actual case is based on a media file. One example for the latter is camera forensics where pixel error patters are used as fingerprints identifying a camera as the source of an image. Of course multimedia forensics can become a tool for criminal forensics when evidence used in a criminal investigation is likely to be manipulated. At this point an important question arises: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? In this work we show how camera forensics can be attacked and introduce a potential countermeasure against these attacks.

  13. Perfume fingerprinting by easy ambient sonic-spray ionization mass spectrometry: nearly instantaneous typification and counterfeit detection.

    PubMed

    Haddad, Renato; Catharino, Rodrigo Ramos; Marques, Lygia Azevedo; Eberlin, Marcos Nogueira

    2008-11-01

    Perfume counterfeiting is an illegal worldwide practice that involves huge economic losses and potential consumer risk. EASI is a simple, easily performed and rapidly implemented desorption/ionization technique for ambient mass spectrometry (MS). Herein we demonstrate that EASI-MS allows nearly instantaneous perfume typification and counterfeit detection. Samples are simply sprayed onto a glass rod or paper surface and, after a few seconds of ambient drying, a profile of the most polar components of the perfume is acquired. These components provide unique and reproducible chemical signatures for authentic perfume samples. Counterfeiting is readily recognized since the exact set and relative proportions of the more polar chemicals, sometimes at low concentrations, are unknown or hard to reproduce by the counterfeiters and hence very distinct and variable EASI-MS profiles are observed for the counterfeit samples.

  14. Cyclic polyalcohols: fingerprints to identify the botanical origin of natural woods used in wine aging.

    PubMed

    Alañón, M Elena; Díaz-Maroto, M Consuelo; Díaz-Maroto, Ignacio J; Vila-Lameiro, Pablo; Pérez-Coello, M Soledad

    2011-02-23

    Cyclic polyalcohol composition of 80 natural wood samples from different botanical species, with the majority of them used in the oenology industry for aging purposes, has been studied by gas chromatography-mass spectrometry (GC-MS) after its conversion into their trimethylsilyloxime derivatives. Each botanical species showed a different and specific cyclic polyalcohol profile. Oak wood samples were characterized by the richness in deoxyinositols, especially proto-quercitol. Meanwhile, other botanical species showed a very low content of cyclic polyalcohols. The qualitative and quantitative study of cyclic polyalcohols was a useful tool to characterize and differentiate woods of different botanical origin to guarantee the authenticity of chips used in the wine-aging process. Monosaccharide composition was also analyzed, showing some quantitative differences among species, but cyclic polyalcohols were the compounds that revealed the main differentiation power.

  15. A Sensitive and Effective Proteomic Approach to Identify She-Donkey’s and Goat’s Milk Adulterations by MALDI-TOF MS Fingerprinting

    PubMed Central

    Di Girolamo, Francesco; Masotti, Andrea; Salvatori, Guglielmo; Scapaticci, Margherita; Muraca, Maurizio; Putignani, Lorenza

    2014-01-01

    She-donkey’s milk (DM) and goat’s milk (GM) are commonly used in newborn and infant feeding because they are less allergenic than other milk types. It is, therefore, mandatory to avoid adulteration and contamination by other milk allergens, developing fast and efficient analytical methods to assess the authenticity of these precious nutrients. In this experimental work, a sensitive and robust matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) profiling was designed to assess the genuineness of DM and GM milks. This workflow allows the identification of DM and GM adulteration at levels of 0.5%, thus, representing a sensitive tool for milk adulteration analysis, if compared with other laborious and time-consuming analytical procedures. PMID:25110863

  16. Dual Resolution Images from Paired Fingerprint Cards

    National Institute of Standards and Technology Data Gateway

    NIST Dual Resolution Images from Paired Fingerprint Cards (Web, free access)   NIST Special Database 30 is being distributed for use in development and testing of fingerprint compression and fingerprint matching systems. The database allows the user to develop and evaluate data compression algorithms for fingerprint images scanned at both 19.7 ppmm (500 dpi) and 39.4 ppmm (1000 dpi). The data consist of 36 ten-print paired cards with both the rolled and plain images scanned at 19.7 and 39.4 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  17. CUE: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns

    NASA Astrophysics Data System (ADS)

    Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.

    2012-06-01

    The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.

  18. Comparative analysis of lip with thumbprints: An identification tool in personal authentication.

    PubMed

    Naik, Rashmi; Ahmed Mujib, B R; Telagi, Neethu; Hallur, Jaydeva

    2017-01-01

    Identification of person living or dead using diverse characteristics is the basis in forensic science. The uniqueness of lip and fingerprints and further, association between them can be useful in establishing facts in legal issues. The present study was carried out to determine the distribution of different lip print patterns among subjects having different thumbprint patterns and to determine the correlation between lip print patterns and thumbprint patterns. The study sample comprised 100 students randomly selected from Bapuji Dental College Hospital, Davangere, Karnataka, 50 males and 50 females aged between 18 and 20 years. Red colored lipstick was applied on the lips by a lipstick applicator brush. Lip and thumb impressions were made on No. 1 Whatman filter paper and visualized using magnifying lens. Three main types of fingerprints (loop, whorl and arch) were identified; Tsuchihashi Y classification of lip print patterns was followed in the study. Chi-square test was used to see the association between lip and thumbprints. The correlation between lip and left thumb print patterns for gender identification was statistically significant. In both males and females, Type II lip pattern associated with loop finger pattern were most significant and in males, Type III lip pattern with whorl type of finger pattern showed statistical significance. We conclude that the correlation found between lip print and thumbprint can be utilized in the field of forensic science for gender identification.

  19. Quality evaluation of medicinal products and health foods containing chaste berry (Vitex agnus-castus) in Japanese, European and American markets.

    PubMed

    Fukahori, Masahiro; Kobayashi, Shojiro; Naraki, Yoko; Sasaki, Takahiro; Oka, Hideki; Seki, Masaharu; Masada-Atsumi, Sayaka; Hakamatsuka, Takashi; Goda, Yukihiro

    2014-01-01

    The aim of present study was to evaluate the qualities of chaste berry (fruit of Vitex agnus-castus L.) preparations using HPLC fingerprint analysis. Seven medicinal products 1 from Japan and 6 from Europe, and 17 health foods, 6 from Japan and 11 from the United States were analyzed. HPLC profile and 26 authentic peaks were compared medicinal products and health foods. Whereas medicinal products had similar HPLC profiles, health foods had various profiles and each peak was also greatly different. The measured amounts of two markers in 5 traditional medicinal products, agnuside and casticin specified in the European Pharmacopoeia (EP), the U.S. Pharmacopoeia (USP) or the WHO monographs of chaste berry, were much lower than those in 2 medicinal products defined as "well-established use" by the European Medicines Agency. The amounts of two markers for 17 health foods differed in a great deal from 14-5054% and 3-1272%, respectively. Furthermore the amount ratios of two markers, agnuside/casticin, in about half of the health foods were remarkably larger than the standard crude drug and the ratios were closer to one of the related Chinese herbs, Vitex negundo L. It is concluded that a combination of HPLC fingerprints and the amount ratios of the marker compounds of chaste berry preparations serves as a useful tool to evaluate the qualities of these preparations.

  20. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  1. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  2. [Development of indel markers for molecular authentication of Panax ginseng and P. quinquefolius].

    PubMed

    Wang, Rong-Bo; Tian, Hui-Li; Wang, Hong-Tao; Li, Gui-Sheng

    2018-04-01

    Panax ginseng and P. quinquefolius are two kinds of important medicinal herbs. They are morphologically similar but have different pharmacological effects. Therefore, botanical origin authentication of these two ginsengs is of great importance for ensuring pharmaceutical efficacy and food safety. Based on the fact that intron position in orthologous genes is highly conserved across plant species, intron length polymorphisms were exploited from unigenes of ginseng. Specific primers were respectively designed for these two species based on their insertion/deletion sequences of cytochrome P450 and glyceraldehyde 3-phosphate dehydrogenase, and multiplex PCR was conducted for molecular authentication of P.ginseng and P. quinquefolius. The results showed that the developed multiplex PCR assay was effective for molecular authentication of P.ginseng and P. quinquefolius without strict PCR condition and the optimization of reaction system.This study provides a preferred ideal marker system for molecular authentication of ginseng,and the presented method can be employed in origin authentication of other herbal preparations. Copyright© by the Chinese Pharmaceutical Association.

  3. Optical authentication based on moiré effect of nonlinear gratings in phase space

    NASA Astrophysics Data System (ADS)

    Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang

    2015-12-01

    An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.

  4. Can the RUVIS reflected UV imaging system visualize fingerprint corrosion on brass cartridge casings postfiring?

    PubMed

    Leintz, Rachel; Bond, John W

    2013-05-01

    Comparisons are made between the visualization of fingerprint corrosion ridge detail on fired brass cartridge casings, where fingerprint sweat was deposited prefiring, using both ultraviolet (UV) and visible (natural daylight) light sources. A reflected ultraviolet imaging system (RUVIS), normally used for visualizing latent fingerprint sweat deposits, is compared with optical interference and digital color mapping of visible light, the latter using apparatus constructed to easily enable selection of the optimum viewing angle. Results show that reflected UV, with a monochromatic UV source of 254 nm, was unable to visualize fingerprint ridge detail on any of 12 casings analyzed, whereas optical interference and digital color mapping using natural daylight yielded ridge detail on three casings. Reasons for the lack of success with RUVIS are discussed in terms of the variation in thickness of the thin film of metal oxide corrosion and absorption wavelengths for the corrosion products of brass. © 2013 American Academy of Forensic Sciences.

  5. Framework Design of Unified Cross-Authentication Based on the Fourth Platform Integrated Payment

    NASA Astrophysics Data System (ADS)

    Yong, Xu; Yujin, He

    The essay advances a unified authentication based on the fourth integrated payment platform. The research aims at improving the compatibility of the authentication in electronic business and providing a reference for the establishment of credit system by seeking a way to carry out a standard unified authentication on a integrated payment platform. The essay introduces the concept of the forth integrated payment platform and finally put forward the whole structure and different components. The main issue of the essay is about the design of the credit system of the fourth integrated payment platform and the PKI/CA structure design.

  6. Signature-based store checking buffer

    DOEpatents

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  7. 78 FR 2470 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ... to do so by submitting a single form, fingerprint card and a combined payment of fees to FINRA... the manual fingerprint processing fee from $13 to $30.\\10\\ \\10\\ See Section (4)(b)(6) of Schedule A to... fee would be ``processing and posting to the CRD system each set of fingerprint results and...

  8. 78 FR 4506 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... submitting a single form, fingerprint card and a combined payment of fees to FINRA. Through the CRD system... fingerprints submitted electronically to FINRA, plus any other charge that may be imposed by the U.S. Department of Justice for processing each set of fingerprints; \\20\\ \\20\\ See Section (4)(b)(4) of Schedule A...

  9. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  10. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    PubMed

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  11. Development, optimization and validation of gas chromatographic fingerprinting of Brazilian commercial diesel fuel for quality control.

    PubMed

    dos Santos, Bruno César Diniz Brito; Flumignan, Danilo Luiz; de Oliveira, José Eduardo

    2012-10-01

    A three-step development, optimization and validation strategy is described for gas chromatography (GC) fingerprints of Brazilian commercial diesel fuel. A suitable GC-flame ionization detection (FID) system was selected to assay a complex matrix such as diesel. The next step was to improve acceptable chromatographic resolution with reduced analysis time, which is recommended for routine applications. Full three-level factorial designs were performed to improve flow rate, oven ramps, injection volume and split ratio in the GC system. Finally, several validation parameters were performed. The GC fingerprinting can be coupled with pattern recognition and multivariate regressions analyses to determine fuel quality and fuel physicochemical parameters. This strategy can also be applied to develop fingerprints for quality control of other fuel types.

  12. Developing the Interstate Identification Index/Federal Bureau of Investigation (III/FBI) system for providing timely criminal and civil identification and criminal history information to the nation's law enforcement agencies

    NASA Astrophysics Data System (ADS)

    Copeland, Patricia L.; Shugars, James

    1997-02-01

    The Federal Bureau of Investigation (FBI) is currently developing a new system to provide timely criminal and civil identities and criminal history information to the nation's local, state, and federal users. The Integrated Automated Fingerprint Identification System (IAFIS), an upgrade to the existing Identification Division Automated Services (IDAS) System, is scheduled for implementation in 1999 at the new FBI facility in Clarksburg, West Virginia. IAFIS will offer new capabilities for electronic transmittal of fingerprint cards to the FBI, an improved fingerprint matching algorithm, and electronic maintenance of fingerprints and photo images. The Interstate Identification Index (III/FBI) System is one of three segments comprising the umbrella IAFIS System. III/FBI provides repository, maintenance, and dissemination capabilities for the 40 million subject national criminal history database. III/FBI will perform over 1 million name searches each day. Demanding performance, reliability/maintainability/availability, and flexibility/expandability requirements make III/FBI an architectural challenge to the system developers. This paper will discuss these driving requirements and present the technical solutions in terms of leading edge hardware and software.

  13. Development and optimization of an efficient qPCR system for olive authentication in edible oils.

    PubMed

    Alonso-Rebollo, Alba; Ramos-Gómez, Sonia; Busto, María D; Ortega, Natividad

    2017-10-01

    The applicability of qPCR in olive-oil authentication depends on the DNA obtained from the oils and the amplification primers. Therefore, four olive-specific amplification systems based on the trnL gene were designed (A-, B-, C- and D-trnL systems). The qPCR conditions, primer concentration and annealing temperature, were optimized. The systems were tested for efficiency and sensitivity to select the most suitable for olive oil authentication. The selected system (D-trnL) demonstrated specificity toward olive in contrast to other oleaginous species (canola, soybean, sunflower, maize, peanut and coconut) and showed high sensitivity in a broad linear dynamic range (LOD and LOQ: 500ng - 0.0625pg). This qPCR system enabled detection, with high sensitivity and specificity, of olive DNA isolated from oils processed in different ways, establishing it as an efficient method for the authentication of olive oil regardless of its category. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    PubMed Central

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  15. FingerScanner: Embedding a Fingerprint Scanner in a Raspberry Pi.

    PubMed

    Sapes, Jordi; Solsona, Francesc

    2016-02-06

    Nowadays, researchers are paying increasing attention to embedding systems. Cost reduction has lead to an increase in the number of platforms supporting the operating system Linux, jointly with the Raspberry Pi motherboard. Thus, embedding devices on Raspberry-Linux systems is a goal in order to make competitive commercial products. This paper presents a low-cost fingerprint recognition system embedded into a Raspberry Pi with Linux.

  16. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    PubMed

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  17. A simple low cost latent fingerprint sensor based on deflectometry and WFT analysis

    NASA Astrophysics Data System (ADS)

    Dhanotia, Jitendra; Chatterjee, Amit; Bhatia, Vimal; Prakash, Shashi

    2018-02-01

    In criminal investigations, latent fingerprints are one of the most significant forms of evidence and most commonly used forensic investigation tool worldwide. The existing non-contact latent fingerprint detection systems are bulky, expensive and require environment which is shock and vibration resistant, thereby limiting their usability outside the laboratory. In this article, a compact, full field, low cost technique for profiling of fingerprints using deflectometry is proposed. Using inexpensive mobile phone screen based structured illumination, and windowed Fourier transform (WFT) based phase retrieval mechanism, the 2D and 3D phase plots reconstruct the profile information of the fingerprint. The phase information is also used to confirm a match between two fingerprints in real time. Since the proposed technique is non-interferometric, the measurements are least affected by environmental perturbations. Using the proposed technique, a portable sensor capable of field deployment has been realized.

  18. Finger-vein and fingerprint recognition based on a feature-level fusion method

    NASA Astrophysics Data System (ADS)

    Yang, Jinfeng; Hong, Bofeng

    2013-07-01

    Multimodal biometrics based on the finger identification is a hot topic in recent years. In this paper, a novel fingerprint-vein based biometric method is proposed to improve the reliability and accuracy of the finger recognition system. First, the second order steerable filters are used here to enhance and extract the minutiae features of the fingerprint (FP) and finger-vein (FV). Second, the texture features of fingerprint and finger-vein are extracted by a bank of Gabor filter. Third, a new triangle-region fusion method is proposed to integrate all the fingerprint and finger-vein features in feature-level. Thus, the fusion features contain both the finger texture-information and the minutiae triangular geometry structure. Finally, experimental results performed on the self-constructed finger-vein and fingerprint databases are shown that the proposed method is reliable and precise in personal identification.

  19. Collaborative WiFi Fingerprinting Using Sensor-Based Navigation on Smartphones.

    PubMed

    Zhang, Peng; Zhao, Qile; Li, You; Niu, Xiaoji; Zhuang, Yuan; Liu, Jingnan

    2015-07-20

    This paper presents a method that trains the WiFi fingerprint database using sensor-based navigation solutions. Since micro-electromechanical systems (MEMS) sensors provide only a short-term accuracy but suffer from the accuracy degradation with time, we restrict the time length of available indoor navigation trajectories, and conduct post-processing to improve the sensor-based navigation solution. Different middle-term navigation trajectories that move in and out of an indoor area are combined to make up the database. Furthermore, we evaluate the effect of WiFi database shifts on WiFi fingerprinting using the database generated by the proposed method. Results show that the fingerprinting errors will not increase linearly according to database (DB) errors in smartphone-based WiFi fingerprinting applications.

  20. Collaborative WiFi Fingerprinting Using Sensor-Based Navigation on Smartphones

    PubMed Central

    Zhang, Peng; Zhao, Qile; Li, You; Niu, Xiaoji; Zhuang, Yuan; Liu, Jingnan

    2015-01-01

    This paper presents a method that trains the WiFi fingerprint database using sensor-based navigation solutions. Since micro-electromechanical systems (MEMS) sensors provide only a short-term accuracy but suffer from the accuracy degradation with time, we restrict the time length of available indoor navigation trajectories, and conduct post-processing to improve the sensor-based navigation solution. Different middle-term navigation trajectories that move in and out of an indoor area are combined to make up the database. Furthermore, we evaluate the effect of WiFi database shifts on WiFi fingerprinting using the database generated by the proposed method. Results show that the fingerprinting errors will not increase linearly according to database (DB) errors in smartphone-based WiFi fingerprinting applications. PMID:26205269

  1. An optical authentication system based on imaging of excitation-selected lanthanide luminescence.

    PubMed

    Carro-Temboury, Miguel R; Arppe, Riikka; Vosch, Tom; Sørensen, Thomas Just

    2018-01-01

    Secure data encryption relies heavily on one-way functions, and copy protection relies on features that are difficult to reproduce. We present an optical authentication system based on lanthanide luminescence from physical one-way functions or physical unclonable functions (PUFs). They cannot be reproduced and thus enable unbreakable encryption. Further, PUFs will prevent counterfeiting if tags with unique PUFs are grafted onto products. We have developed an authentication system that comprises a hardware reader, image analysis, and authentication software and physical keys that we demonstrate as an anticounterfeiting system. The physical keys are PUFs made from random patterns of taggants in polymer films on glass that can be imaged following selected excitation of particular lanthanide(III) ions doped into the individual taggants. This form of excitation-selected imaging ensures that by using at least two lanthanide(III) ion dopants, the random patterns cannot be copied, because the excitation selection will fail when using any other emitter. With the developed reader and software, the random patterns are read and digitized, which allows a digital pattern to be stored. This digital pattern or digital key can be used to authenticate the physical key in anticounterfeiting or to encrypt any message. The PUF key was produced with a staggering nominal encoding capacity of 7 3600 . Although the encoding capacity of the realized authentication system reduces to 6 × 10 104 , it is more than sufficient to completely preclude counterfeiting of products.

  2. Tablet and Face-to-Face Hybrid Professional Development: Providing Earth Systems Science Educators Authentic Research Opportunities through The GLOBE Program at Purdue University

    NASA Astrophysics Data System (ADS)

    Wegner, K.; Branch, B. D.; Smith, S. C.

    2013-12-01

    The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure

  3. National Authentication Framework Implementation Study

    DTIC Science & Technology

    2009-12-01

    Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...written on  paper  disclosed;  passwords stored in electronic file  copied. 1,2,3,4 Eaves‐  dropping The token secret or authenticator is  revealed to...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which

  4. High-speed biometrics ultrasonic system for 3D fingerprint imaging

    NASA Astrophysics Data System (ADS)

    Maev, Roman G.; Severin, Fedar

    2012-10-01

    The objective of this research is to develop a new robust fingerprint identification technology based upon forming surface-subsurface (under skin) ultrasonic 3D images of the finger pads. The presented work aims to create specialized ultrasonic scanning methods for biometric purposes. Preliminary research has demonstrated the applicability of acoustic microscopy for fingerprint reading. The additional information from internal skin layers and dermis structures contained in the scan can essentially improve confidence in the identification. Advantages of this system include high resolution and quick scanning time. Operating in pulse-echo mode provides spatial resolution up to 0.05 mm. Technology advantages of the proposed technology are the following: • Full-range scanning of the fingerprint area "nail to nail" (2.5 x 2.5 cm) can be done in less than 5 sec with a resolution of up to 1000 dpi. • Collection of information about the in-depth structure of the fingerprint realized by the set of spherically focused 50 MHz acoustic lens provide the resolution ~ 0.05 mm or better • In addition to fingerprints, this technology can identify sweat porous at the surface and under the skin • No sensitivity to the contamination of the finger's surface • Detection of blood velocity using Doppler effect can be implemented to distinguish living specimens • Utilization as polygraph device • Simple connectivity to fingerprint databases obtained with other techniques • The digitally interpolated images can then be enhanced allowing for greater resolution • Method can be applied to fingernails and underlying tissues, providing more information • A laboratory prototype of the biometrics system based on these described principles was designed, built and tested. It is the first step toward a practical implementation of this technique.

  5. Next Generation Trusted Radiation Identification System (NG-TRIS).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flynn, Adam J.; Amai, Wendy A.; Merkle, Peter Benedict

    2010-05-01

    The original Trusted Radiation Identification System (TRIS) was developed from 1999-2001, featuring information barrier technology to collect gamma radiation template measurements useful for arms control regime operations. The first TRIS design relied upon a multichannel analyzer (MCA) that was external to the protected volume of the system enclosure, undesirable from a system security perspective. An internal complex programmable logic device (CPLD) contained data which was not subject to software authentication. Physical authentication of the TRIS instrument case was performed by a sensitive but slow eddy-current inspection method. This paper describes progress to date for the Next Generation TRIS (NG-TRIS), whichmore » improves the TRIS design. We have incorporated the MCA internal to the trusted system volume, achieved full authentication of CPLD data, and have devised rapid methods to authenticate the system enclosure and weld seals of the NG-TRIS enclosure. For a complete discussion of the TRIS system and components upon which NG-TRIS is based, the reader is directed to the comprehensive user's manual and system reference of Seager, et al.« less

  6. Classification and authentication of unknown water samples using machine learning algorithms.

    PubMed

    Kundu, Palash K; Panchariya, P C; Kundu, Madhusree

    2011-07-01

    This paper proposes the development of water sample classification and authentication, in real life which is based on machine learning algorithms. The proposed techniques used experimental measurements from a pulse voltametry method which is based on an electronic tongue (E-tongue) instrumentation system with silver and platinum electrodes. E-tongue include arrays of solid state ion sensors, transducers even of different types, data collectors and data analysis tools, all oriented to the classification of liquid samples and authentication of unknown liquid samples. The time series signal and the corresponding raw data represent the measurement from a multi-sensor system. The E-tongue system, implemented in a laboratory environment for 6 numbers of different ISI (Bureau of Indian standard) certified water samples (Aquafina, Bisleri, Kingfisher, Oasis, Dolphin, and McDowell) was the data source for developing two types of machine learning algorithms like classification and regression. A water data set consisting of 6 numbers of sample classes containing 4402 numbers of features were considered. A PCA (principal component analysis) based classification and authentication tool was developed in this study as the machine learning component of the E-tongue system. A proposed partial least squares (PLS) based classifier, which was dedicated as well; to authenticate a specific category of water sample evolved out as an integral part of the E-tongue instrumentation system. The developed PCA and PLS based E-tongue system emancipated an overall encouraging authentication percentage accuracy with their excellent performances for the aforesaid categories of water samples. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  7. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  8. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  9. Video-Based Fingerprint Verification

    PubMed Central

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-01-01

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, “inside similarity” and “outside similarity” are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

  10. Optical multiple-image authentication based on cascaded phase filtering structure

    NASA Astrophysics Data System (ADS)

    Wang, Q.; Alfalou, A.; Brosseau, C.

    2016-10-01

    In this study, we report on the recent developments of optical image authentication algorithms. Compared with conventional optical encryption, optical image authentication achieves more security strength because such methods do not need to recover information of plaintext totally during the decryption period. Several recently proposed authentication systems are briefly introduced. We also propose a novel multiple-image authentication system, where multiple original images are encoded into a photon-limited encoded image by using a triple-plane based phase retrieval algorithm and photon counting imaging (PCI) technique. One can only recover a noise-like image using correct keys. To check authority of multiple images, a nonlinear fractional correlation is employed to recognize the original information hidden in the decrypted results. The proposal can be implemented optically using a cascaded phase filtering configuration. Computer simulation results are presented to evaluate the performance of this proposal and its effectiveness.

  11. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  12. The application of UV multispectral technology in extract trace evdidence

    NASA Astrophysics Data System (ADS)

    Guo, Jingjing; Xu, Xiaojing; Li, Zhihui; Xu, Lei; Xie, Lanchi

    2015-11-01

    Multispectral imaging is becoming more and more important in the field of examination of material evidence, especially the ultraviolet spectral imaging. Fingerprints development, questioned document detection, trace evidence examination-all can used of it. This paper introduce a UV multispectral equipment which was developed by BITU & IFSC, it can extract trace evidence-extract fingerprints. The result showed that this technology can develop latent sweat-sebum mixed fingerprint on photo and ID card blood fingerprint on steel hold. We used the UV spectrum data analysis system to make the UV spectral image clear to identify and analyse.

  13. Continuous Space Estimation: Increasing WiFi-Based Indoor Localization Resolution without Increasing the Site-Survey Effort.

    PubMed

    Hernández, Noelia; Ocaña, Manuel; Alonso, Jose M; Kim, Euntai

    2017-01-13

    Although much research has taken place in WiFi indoor localization systems, their accuracy can still be improved. When designing this kind of system, fingerprint-based methods are a common choice. The problem with fingerprint-based methods comes with the need of site surveying the environment, which is effort consuming. In this work, we propose an approach, based on support vector regression, to estimate the received signal strength at non-site-surveyed positions of the environment. Experiments, performed in a real environment, show that the proposed method could be used to improve the resolution of fingerprint-based indoor WiFi localization systems without increasing the site survey effort.

  14. Continuous Space Estimation: Increasing WiFi-Based Indoor Localization Resolution without Increasing the Site-Survey Effort †

    PubMed Central

    Hernández, Noelia; Ocaña, Manuel; Alonso, Jose M.; Kim, Euntai

    2017-01-01

    Although much research has taken place in WiFi indoor localization systems, their accuracy can still be improved. When designing this kind of system, fingerprint-based methods are a common choice. The problem with fingerprint-based methods comes with the need of site surveying the environment, which is effort consuming. In this work, we propose an approach, based on support vector regression, to estimate the received signal strength at non-site-surveyed positions of the environment. Experiments, performed in a real environment, show that the proposed method could be used to improve the resolution of fingerprint-based indoor WiFi localization systems without increasing the site survey effort. PMID:28098773

  15. Authentication System for Electrical Charging of Electrical Vehicles in the Housing Development

    NASA Astrophysics Data System (ADS)

    Song, Wang-Cheol

    Recently the smart grid has been a hot issue in the research area. The Electric Vehicle (EV) is the most important component in the Smart Grid, having a role of the battery component with high capacity. We have thought how to introduce the EV in the housing development, and for proper operation of the smart grid systems in the housing area the authentication system is essential for the individual houses. We propose an authentication system to discriminate an individual houses, so that the account management component can appropriately operate the electrical charging and billing in the housing estate. The proposed system has an architecture to integrate the charging system outside a house and the monitoring system inside a house.

  16. Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level

    NASA Astrophysics Data System (ADS)

    Gharami, Snigdha; Dinakaran, M.

    2017-11-01

    We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.

  17. Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity

    NASA Astrophysics Data System (ADS)

    Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc

    A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).

  18. FingerScanner: Embedding a Fingerprint Scanner in a Raspberry Pi

    PubMed Central

    Sapes, Jordi; Solsona, Francesc

    2016-01-01

    Nowadays, researchers are paying increasing attention to embedding systems. Cost reduction has lead to an increase in the number of platforms supporting the operating system Linux, jointly with the Raspberry Pi motherboard. Thus, embedding devices on Raspberry-Linux systems is a goal in order to make competitive commercial products. This paper presents a low-cost fingerprint recognition system embedded into a Raspberry Pi with Linux. PMID:26861340

  19. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  20. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  1. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  2. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  3. Comparing Intentions to Use University-Provided vs Vendor-Provided Multibiometric Authentication in Online Exams

    ERIC Educational Resources Information Center

    Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L.

    2011-01-01

    Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…

  4. Interpretation of fingerprint image quality features extracted by self-organizing maps

    NASA Astrophysics Data System (ADS)

    Danov, Ivan; Olsen, Martin A.; Busch, Christoph

    2014-05-01

    Accurate prediction of fingerprint quality is of significant importance to any fingerprint-based biometric system. Ensuring high quality samples for both probe and reference can substantially improve the system's performance by lowering false non-matches, thus allowing finer adjustment of the decision threshold of the biometric system. Furthermore, the increasing usage of biometrics in mobile contexts demands development of lightweight methods for operational environment. A novel two-tier computationally efficient approach was recently proposed based on modelling block-wise fingerprint image data using Self-Organizing Map (SOM) to extract specific ridge pattern features, which are then used as an input to a Random Forests (RF) classifier trained to predict the quality score of a propagated sample. This paper conducts an investigative comparative analysis on a publicly available dataset for the improvement of the two-tier approach by proposing additionally three feature interpretation methods, based respectively on SOM, Generative Topographic Mapping and RF. The analysis shows that two of the proposed methods produce promising results on the given dataset.

  5. Laser speckle decorrelation for fingerprint acquisition

    NASA Astrophysics Data System (ADS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-09-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases.

  6. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  7. Authentication Without Secrets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, Lyndon G.; Robertson, Perry J.

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less

  8. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  9. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  10. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  12. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  13. Fluorescence, electrophoretic and chromatographic fingerprints of herbal medicines and their comparative chemometric analysis.

    PubMed

    Mazina, Jekaterina; Vaher, Merike; Kuhtinskaja, Maria; Poryvkina, Larisa; Kaljurand, Mihkel

    2015-07-01

    The aim of the present study was to compare the polyphenolic compositions of 47 medicinal herbs (HM) and four herbal tea mixtures from Central Estonia by rapid, reliable and sensitive Spectral Fluorescence Signature (SFS) method in a front face mode. The SFS method was validated for the main identified HM representatives including detection limits (0.037mgL(-1) for catechin, 0.052mgL(-1) for protocatechuic acid, 0.136mgL(-1) for chlorogenic acid, 0.058mgL(-1) for syringic acid and 0.256mgL(-1) for ferulic acid), linearity (up to 5.0-15mgL(-1)), intra-day precision (RSDs=6.6-10.6%), inter-day precision (RSDs=6.4-13.8%), matrix effect (-15.8 to +5.5) and recovery (85-107%). The phytochemical fingerprints were differentiated by parallel factor analysis (PARAFAC) combined with hierarchical cluster analysis (CA) and principal component analysis (PCA). HM were clustered into four main clusters (catechin-like, hydroxycinnamic acid-like, dihydrobenzoic acid-like derivatives containing HM and HM with low/very low content of fluorescent constituents) and 14 subclusters (rich, medium, low/very low contents). The average accuracy and precision of CA for validation HM set were 97.4% (within 85.2-100%) and 89.6%, (within 66.7-100%), respectively. PARAFAC-PCA/CA has improved the analysis of HM by the SFS method. The results were verified by two separation methods CE-DAD and HPLC-DAD-MS also combined with PARAFAC-PCA/CA. The SFS-PARAFAC-PCA/CA method has potential as a rapid and reliable tool for investigating the fingerprints and predicting the composition of HM or evaluating the quality and authenticity of different standardised formulas. Moreover, SFS-PARAFAC-PCA/CA can be implemented as a laboratory and/or an onsite method. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. An INS/WiFi Indoor Localization System Based on the Weighted Least Squares.

    PubMed

    Chen, Jian; Ou, Gang; Peng, Ao; Zheng, Lingxiang; Shi, Jianghong

    2018-05-07

    For smartphone indoor localization, an INS/WiFi hybrid localization system is proposed in this paper. Acceleration and angular velocity are used to estimate step lengths and headings. The problem with INS is that positioning errors grow with time. Using radio signal strength as a fingerprint is a widely used technology. The main problem with fingerprint matching is mismatching due to noise. Taking into account the different shortcomings and advantages, inertial sensors and WiFi from smartphones are integrated into indoor positioning. For a hybrid localization system, pre-processing techniques are used to enhance the WiFi signal quality. An inertial navigation system limits the range of WiFi matching. A Multi-dimensional Dynamic Time Warping (MDTW) is proposed to calculate the distance between the measured signals and the fingerprint in the database. A MDTW-based weighted least squares (WLS) is proposed for fusing multiple fingerprint localization results to improve positioning accuracy and robustness. Using four modes (calling, dangling, handheld and pocket), we carried out walking experiments in a corridor, a study room and a library stack room. Experimental results show that average localization accuracy for the hybrid system is about 2.03 m.

  15. An INS/WiFi Indoor Localization System Based on the Weighted Least Squares

    PubMed Central

    Chen, Jian; Ou, Gang; Zheng, Lingxiang; Shi, Jianghong

    2018-01-01

    For smartphone indoor localization, an INS/WiFi hybrid localization system is proposed in this paper. Acceleration and angular velocity are used to estimate step lengths and headings. The problem with INS is that positioning errors grow with time. Using radio signal strength as a fingerprint is a widely used technology. The main problem with fingerprint matching is mismatching due to noise. Taking into account the different shortcomings and advantages, inertial sensors and WiFi from smartphones are integrated into indoor positioning. For a hybrid localization system, pre-processing techniques are used to enhance the WiFi signal quality. An inertial navigation system limits the range of WiFi matching. A Multi-dimensional Dynamic Time Warping (MDTW) is proposed to calculate the distance between the measured signals and the fingerprint in the database. A MDTW-based weighted least squares (WLS) is proposed for fusing multiple fingerprint localization results to improve positioning accuracy and robustness. Using four modes (calling, dangling, handheld and pocket), we carried out walking experiments in a corridor, a study room and a library stack room. Experimental results show that average localization accuracy for the hybrid system is about 2.03 m. PMID:29735960

  16. Characterization and quantification of grape variety by means of shikimic acid concentration and protein fingerprint in still white wines.

    PubMed

    Chabreyrie, David; Chauvet, Serge; Guyon, François; Salagoïty, Marie-Hélène; Antinelli, Jean-François; Medina, Bernard

    2008-08-27

    Protein profiles, obtained by high-performance capillary electrophoresis (HPCE) on white wines previously dialyzed, combined with shikimic acid concentration and multivariate analysis, were used for the determination of grape variety composition of a still white wine. Six varieties were studied through monovarietal wines elaborated in the laboratory: Chardonnay (24 samples), Chenin (24), Petit Manseng (7), Sauvignon (37), Semillon (24), and Ugni Blanc (9). Homemade mixtures were elaborated from authentic monovarietal wines according to a Plackett-Burman sampling plan. After protein peak area normalization, a matrix was elaborated containing protein results of wines (mixtures and monovarietal). Partial least-squares processing was applied to this matrix allowing the elaboration of a model that provided a varietal quantification precision of around 20% for most of the grape varieties studied. The model was applied to commercial samples from various geographical origins, providing encouraging results for control purposes.

  17. Optical identification using imperfections in 2D materials

    NASA Astrophysics Data System (ADS)

    Cao, Yameng; Robson, Alexander J.; Alharbi, Abdullah; Roberts, Jonathan; Woodhead, Christopher S.; Noori, Yasir J.; Bernardo-Gavito, Ramón; Shahrjerdi, Davood; Roedig, Utz; Fal'ko, Vladimir I.; Young, Robert J.

    2017-12-01

    The ability to uniquely identify an object or device is important for authentication. Imperfections, locked into structures during fabrication, can be used to provide a fingerprint that is challenging to reproduce. In this paper, we propose a simple optical technique to read unique information from nanometer-scale defects in 2D materials. Imperfections created during crystal growth or fabrication lead to spatial variations in the bandgap of 2D materials that can be characterized through photoluminescence measurements. We show a simple setup involving an angle-adjustable transmission filter, simple optics and a CCD camera can capture spatially-dependent photoluminescence to produce complex maps of unique information from 2D monolayers. Atomic force microscopy is used to verify the origin of the optical signature measured, demonstrating that it results from nanometer-scale imperfections. This solution to optical identification with 2D materials could be employed as a robust security measure to prevent counterfeiting.

  18. Role of Lanthanides in the Traceability of the Milk Production Chain.

    PubMed

    Aceto, Maurizio; Musso, Davide; Calà, Elisa; Arieri, Fabio; Oddone, Matteo

    2017-05-24

    The traceability and authentication of milk were studied using trace and ultratrace elements as chemical markers. Among these variables, the group of lanthanides resulted in being particularly useful for this purpose as a result of their homogeneous distribution inside milk, which showed on the contrary to be intrinsically inhomogeneous from the elemental point of view. Using in this pilot study milk samples from a factory in Piedmont (Italy), we demonstrated that the distribution of lanthanides can be used as a fingerprint to put into relation the soil of the pasture land on which cows graze and the bottled milk produced in the factory. In fact, the distribution is maintained nearly unaltered along the production chain of milk, apart from the passage into the stomachs of the cows. Using the same variables, it was possible to discriminate between milk produced in the factory and milk samples taken from the large-scale retail trade.

  19. Multi-element fingerprinting as a tool in origin authentication of four east China marine species.

    PubMed

    Guo, Lipan; Gong, Like; Yu, Yanlei; Zhang, Hong

    2013-12-01

    The contents of 25 elements in 4 types of commercial marine species from the East China Sea were determined by inductively coupled plasma mass spectrometry and atomic absorption spectrometry. The elemental composition was used to differentiate marine species according to geographical origin by multivariate statistical analysis. The results showed that principal component analysis could distinguish samples from different areas and reveal the elements which played the most important role in origin diversity. The established models by partial least squares discriminant analysis (PLS-DA) and by probabilistic neural network (PNN) can both precisely predict the origin of the marine species. Further study indicated that PLS-DA and PNN were efficacious in regional discrimination. The models from these 2 statistical methods, with an accuracy of 97.92% and 100%, respectively, could both distinguish samples from different areas without the need for species differentiation. © 2013 Institute of Food Technologists®

  20. Combination of complementary data mining methods for geographical characterization of extra virgin olive oils based on mineral composition.

    PubMed

    Sayago, Ana; González-Domínguez, Raúl; Beltrán, Rafael; Fernández-Recamales, Ángeles

    2018-09-30

    This work explores the potential of multi-element fingerprinting in combination with advanced data mining strategies to assess the geographical origin of extra virgin olive oil samples. For this purpose, the concentrations of 55 elements were determined in 125 oil samples from multiple Spanish geographic areas. Several unsupervised and supervised multivariate statistical techniques were used to build classification models and investigate the relationship between mineral composition of olive oils and their provenance. Results showed that Spanish extra virgin olive oils exhibit characteristic element profiles, which can be differentiated on the basis of their origin in accordance with three geographical areas: Atlantic coast (Huelva province), Mediterranean coast and inland regions. Furthermore, statistical modelling yielded high sensitivity and specificity, principally when random forest and support vector machines were employed, thus demonstrating the utility of these techniques in food traceability and authenticity research. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. GenomeFingerprinter: the genome fingerprint and the universal genome fingerprint analysis for systematic comparative genomics.

    PubMed

    Ai, Yuncan; Ai, Hannan; Meng, Fanmei; Zhao, Lei

    2013-01-01

    No attention has been paid on comparing a set of genome sequences crossing genetic components and biological categories with far divergence over large size range. We define it as the systematic comparative genomics and aim to develop the methodology. First, we create a method, GenomeFingerprinter, to unambiguously produce a set of three-dimensional coordinates from a sequence, followed by one three-dimensional plot and six two-dimensional trajectory projections, to illustrate the genome fingerprint of a given genome sequence. Second, we develop a set of concepts and tools, and thereby establish a method called the universal genome fingerprint analysis (UGFA). Particularly, we define the total genetic component configuration (TGCC) (including chromosome, plasmid, and phage) for describing a strain as a systematic unit, the universal genome fingerprint map (UGFM) of TGCC for differentiating strains as a universal system, and the systematic comparative genomics (SCG) for comparing a set of genomes crossing genetic components and biological categories. Third, we construct a method of quantitative analysis to compare two genomes by using the outcome dataset of genome fingerprint analysis. Specifically, we define the geometric center and its geometric mean for a given genome fingerprint map, followed by the Euclidean distance, the differentiate rate, and the weighted differentiate rate to quantitatively describe the difference between two genomes of comparison. Moreover, we demonstrate the applications through case studies on various genome sequences, giving tremendous insights into the critical issues in microbial genomics and taxonomy. We have created a method, GenomeFingerprinter, for rapidly computing, geometrically visualizing, intuitively comparing a set of genomes at genome fingerprint level, and hence established a method called the universal genome fingerprint analysis, as well as developed a method of quantitative analysis of the outcome dataset. These have set up the methodology of systematic comparative genomics based on the genome fingerprint analysis.

  2. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  3. 78 FR 69447 - Agency Information Collection Activities; Existing Collection, Comments Requested: Friction Ridge...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Integrated Automated Fingerprint Identification System (IAFIS) of the FBI. (5) An estimate of the total... approximately 74,793 agencies as respondents at 10 minutes per fingerprint card completed. (6) An estimate of...

  4. Fingerprinting with Wow

    NASA Astrophysics Data System (ADS)

    Yu, Eugene; Craver, Scott

    2006-02-01

    Wow, or time warping caused by speed fluctuations in analog audio equipment, provides a wealth of applications in watermarking. Very subtle temporal distortion has been used to defeat watermarks, and as components in watermarking systems. In the image domain, the analogous warping of an image's canvas has been used both to defeat watermarks and also proposed to prevent collusion attacks on fingerprinting systems. In this paper, we explore how subliminal levels of wow can be used for steganography and fingerprinting. We present both a low-bitrate robust solution and a higher-bitrate solution intended for steganographic communication. As already observed, such a fingerprinting algorithm naturally discourages collusion by averaging, owing to flanging effects when misaligned audio is averaged. Another advantage of warping is that even when imperceptible, it can be beyond the reach of compression algorithms. We use this opportunity to debunk the common misconception that steganography is impossible under "perfect compression."

  5. Audio fingerprint extraction for content identification

    NASA Astrophysics Data System (ADS)

    Shiu, Yu; Yeh, Chia-Hung; Kuo, C. C. J.

    2003-11-01

    In this work, we present an audio content identification system that identifies some unknown audio material by comparing its fingerprint with those extracted off-line and saved in the music database. We will describe in detail the procedure to extract audio fingerprints and demonstrate that they are robust to noise and content-preserving manipulations. The main feature in the proposed system is the zero-crossing rate extracted with the octave-band filter bank. The zero-crossing rate can be used to describe the dominant frequency in each subband with a very low computational cost. The size of audio fingerprint is small and can be efficiently stored along with the compressed files in the database. It is also robust to many modifications such as tempo change and time-alignment distortion. Besides, the octave-band filter bank is used to enhance the robustness to distortion, especially those localized on some frequency regions.

  6. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  7. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    PubMed

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  8. Analysis of Document Authentication Technique using Soft Magnetic Fibers

    NASA Astrophysics Data System (ADS)

    Aoki, Ayumi; Ikeda, Takashi; Yamada, Tsutomu; Takemura, Yasushi; Matsumoto, Tsutomu

    An artifact-metric system using magnetic fibers can be applied for authentications of stock certificate, bill, passport, plastic cards and other documents. Security of the system is guaranteed by its feature of difficulty in copy. This authentication system is based on randomly dispersed magnetic fibers embedded in documents. In this paper, a theoretical analysis was performed in order to evaluate this system. The position of the magnetic fibers was determined by a conventional function of random number generator. By measuring output waveforms by a magnetoresistance (MR) sensor, a false match rate (FMR) could be calculated. Optimizations of the density of the magnetic fibers and the dimension of the MR sensor were achieved.

  9. Assignment of EC Numbers to Enzymatic Reactions with Reaction Difference Fingerprints

    PubMed Central

    Hu, Qian-Nan; Zhu, Hui; Li, Xiaobing; Zhang, Manman; Deng, Zhe; Yang, Xiaoyan; Deng, Zixin

    2012-01-01

    The EC numbers represent enzymes and enzyme genes (genomic information), but they are also utilized as identifiers of enzymatic reactions (chemical information). In the present work (ECAssigner), our newly proposed reaction difference fingerprints (RDF) are applied to assign EC numbers to enzymatic reactions. The fingerprints of reactant molecules minus the fingerprints of product molecules will generate reaction difference fingerprints, which are then used to calculate reaction Euclidean distance, a reaction similarity measurement, of two reactions. The EC number of the most similar training reaction will be assigned to an input reaction. For 5120 balanced enzymatic reactions, the RDF with a fingerprint length at 3 obtained at the sub-subclass, subclass, and main class level with cross-validation accuracies of 83.1%, 86.7%, and 92.6% respectively. Compared with three published methods, ECAssigner is the first fully automatic server for EC number assignment. The EC assignment system (ECAssigner) is freely available via: http://cadd.whu.edu.cn/ecassigner/. PMID:23285222

  10. ChemoPy: freely available python package for computational biology and chemoinformatics.

    PubMed

    Cao, Dong-Sheng; Xu, Qing-Song; Hu, Qian-Nan; Liang, Yi-Zeng

    2013-04-15

    Molecular representation for small molecules has been routinely used in QSAR/SAR, virtual screening, database search, ranking, drug ADME/T prediction and other drug discovery processes. To facilitate extensive studies of drug molecules, we developed a freely available, open-source python package called chemoinformatics in python (ChemoPy) for calculating the commonly used structural and physicochemical features. It computes 16 drug feature groups composed of 19 descriptors that include 1135 descriptor values. In addition, it provides seven types of molecular fingerprint systems for drug molecules, including topological fingerprints, electro-topological state (E-state) fingerprints, MACCS keys, FP4 keys, atom pairs fingerprints, topological torsion fingerprints and Morgan/circular fingerprints. By applying a semi-empirical quantum chemistry program MOPAC, ChemoPy can also compute a large number of 3D molecular descriptors conveniently. The python package, ChemoPy, is freely available via http://code.google.com/p/pychem/downloads/list, and it runs on Linux and MS-Windows. Supplementary data are available at Bioinformatics online.

  11. A Secure and Robust Object-Based Video Authentication System

    NASA Astrophysics Data System (ADS)

    He, Dajun; Sun, Qibin; Tian, Qi

    2004-12-01

    An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI).

  12. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Device interoperability and authentication for telemedical appliance based on the ISO/IEEE 11073 Personal Health Device (PHD) Standards.

    PubMed

    Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G

    2012-01-01

    In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.

  14. Correction of the data generated by mass spectrometry analyses of biological tissues: application to food authentication.

    PubMed

    Engel, Erwan; Ratel, Jérémy

    2007-06-22

    The objective of the work was to assess the relevance for the authentication of food of a novel chemometric method developed to correct mass spectrometry (MS) data from instrumental drifts, namely, the comprehensive combinatory standard correction (CCSC). Applied to gas chromatography (GC)-MS data, the method consists in analyzing a liquid sample with a mixture of n internal standards and in using the best combination of standards to correct the MS signal provided by each compound. The paper focuses on the authentication of the type of feeding in farm animals based on the composition in volatile constituents of their adipose tissues. The first step of the work enabled on one hand to ensure the feasibility of the conversion of the adipose tissue sample into a liquid phase required for the use of the CCSC method and on the other hand, to determine the key parameters of the extraction of the volatile fraction from this liquid phase by dynamic headspace. The second step showed the relevance of the CCSC pre-processing of the MS fingerprints generated by dynamic headspace-MS analysis of lamb tissues, for the discrimination of animals fed exclusively with pasture (n=8) or concentrate (n=8). When compared with filtering of raw data, internal normalization and correction by a single standard, the CCSC method increased by 17.1-, 3.3- and 1.3-fold, respectively, the number of mass fragments which discriminated the type of feeding. The final step confirmed the advantage of the CCSC pre-processing of dynamic headspace-gas chromatography-MS data for revealing molecular tracers of the type of feeding those number (n=72) was greater when compared to the number of tracers obtained with raw data (n=42), internal normalization (n=63) and correction by a single standard (n=57). The relevance of the information gained by using the CCSC method is discussed.

  15. Roughness encoding in human and biomimetic artificial touch: spatiotemporal frequency modulation and structural anisotropy of fingerprints.

    PubMed

    Oddo, Calogero Maria; Beccai, Lucia; Wessberg, Johan; Wasling, Helena Backlund; Mattioli, Fabio; Carrozza, Maria Chiara

    2011-01-01

    The influence of fingerprints and their curvature in tactile sensing performance is investigated by comparative analysis of different design parameters in a biomimetic artificial fingertip, having straight or curved fingerprints. The strength in the encoding of the principal spatial period of ridged tactile stimuli (gratings) is evaluated by indenting and sliding the surfaces at controlled normal contact force and tangential sliding velocity, as a function of fingertip rotation along the indentation axis. Curved fingerprints guaranteed higher directional isotropy than straight fingerprints in the encoding of the principal frequency resulting from the ratio between the sliding velocity and the spatial periodicity of the grating. In parallel, human microneurography experiments were performed and a selection of results is included in this work in order to support the significance of the biorobotic study with the artificial tactile system.

  16. The Ins and Outs of DNA Fingerprinting the Infectious Fungi

    PubMed Central

    Soll, David R.

    2000-01-01

    DNA fingerprinting methods have evolved as major tools in fungal epidemiology. However, no single method has emerged as the method of choice, and some methods perform better than others at different levels of resolution. In this review, requirements for an effective DNA fingerprinting method are proposed and procedures are described for testing the efficacy of a method. In light of the proposed requirements, the most common methods now being used to DNA fingerprint the infectious fungi are described and assessed. These methods include restriction fragment length polymorphisms (RFLP), RFLP with hybridization probes, randomly amplified polymorphic DNA and other PCR-based methods, electrophoretic karyotyping, and sequencing-based methods. Procedures for computing similarity coefficients, generating phylogenetic trees, and testing the stability of clusters are then described. To facilitate the analysis of DNA fingerprinting data, computer-assisted methods are described. Finally, the problems inherent in the collection of test and control isolates are considered, and DNA fingerprinting studies of strain maintenance during persistent or recurrent infections, microevolution in infecting strains, and the origin of nosocomial infections are assessed in light of the preceding discussion of the ins and outs of DNA fingerprinting. The intent of this review is to generate an awareness of the need to verify the efficacy of each DNA fingerprinting method for the level of genetic relatedness necessary to answer the epidemiological question posed, to use quantitative methods to analyze DNA fingerprint data, to use computer-assisted DNA fingerprint analysis systems to analyze data, and to file data in a form that can be used in the future for retrospective and comparative studies. PMID:10756003

  17. Inverse multipath fingerprinting for millimeter wave V2I beam alignment.

    DOT National Transportation Integrated Search

    2017-05-01

    Efficient beam alignment is a crucial component in millimeter wave systems with analog beamforming, especially in fast-changing vehicular settings. This paper uses the vehicles position (e.g., available via GPS) to query the multipath fingerprint ...

  18. Edge detection techniques for iris recognition system

    NASA Astrophysics Data System (ADS)

    Tania, U. T.; Motakabber, S. M. A.; Ibrahimy, M. I.

    2013-12-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate.

  19. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  20. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    PubMed Central

    Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.

    2011-01-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485

  1. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.

    PubMed

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2015-03-09

    In this paper, we develop a new optical information authentication system based on compressed double-random-phase-encoded images and quick-response (QR) codes, where the parameters of optical lightwave are used as keys for optical decryption and the QR code is a key for verification. An input image attached with QR code is first optically encoded in a simplified double random phase encoding (DRPE) scheme without using interferometric setup. From the single encoded intensity pattern recorded by a CCD camera, a compressed double-random-phase-encoded image, i.e., the sparse phase distribution used for optical decryption, is generated by using an iterative phase retrieval technique with QR code. We compare this technique to the other two methods proposed in literature, i.e., Fresnel domain information authentication based on the classical DRPE with holographic technique and information authentication based on DRPE and phase retrieval algorithm. Simulation results show that QR codes are effective on improving the security and data sparsity of optical information encryption and authentication system.

  2. Network information security in a phase III Integrated Academic Information Management System (IAIMS).

    PubMed

    Shea, S; Sengupta, S; Crosswell, A; Clayton, P D

    1992-01-01

    The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.

  3. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    PubMed

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  4. Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI

    NASA Astrophysics Data System (ADS)

    Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva

    This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.

  5. Rapid authentication of different ages of tissue-cultured and wild Dendrobium huoshanense as well as wild Dendrobium henanense using FTIR and 2D-COS IR

    NASA Astrophysics Data System (ADS)

    Chen, Nai-Dong; Chen, Nai-Fu; Li, Jun; Cao, Cai-Yun; Wang, Jin-Mei

    2015-12-01

    The accumulating of pharmaceutical chemicals in medicinal plants would greatly be affected by their ages and establishing a fast quality-identification method to evaluate the similarity of medicinal herbs at different cultivated ages is a critical step for assurance of quality and safety in the TCM industry. In this work, tri-step IR macro-fingerprinting and 2D-COS IR spectrum techniques combined with statistical pattern recognition were applied for discrimination and similarity evaluation of different ages of tissue-cultured and wild Dendrobium huoshanense C. Z. Tang et S. J. Cheng as well as Dendrobium henanense J.L.Lu et L.X Gao. Both tissue-cultured and wild D. huoshanense were easily differentiated from D. henanense by FTIR and SD-IR spectra, while it's quite difficult to discriminate different cultivated years of the three investigated Dendrobiums. In 2D-COS IR spectra, 1-5 auto-peaks with different indensity and positions were located in the region 1160-1030 cm-1 of the twelve Dendrobium samples and thus could be used to identify Dendrobium samples at different ages. Principle component analysis (PCA) of synchronous 2D-COS data showed that the twelve samples were effectively identified and evaluated. The results indicated that the tri-step infrared macro-fingerprinting combined with PCA method was suitable to differentiate the cultivated ages of Dendrobiums with species and orgins rapidly and nondestructively.

  6. Identification of RNA molecules by specific enzyme digestion and mass spectrometry: software for and implementation of RNA mass mapping

    PubMed Central

    Matthiesen, Rune; Kirpekar, Finn

    2009-01-01

    The idea of identifying or characterizing an RNA molecule based on a mass spectrum of specifically generated RNA fragments has been used in various forms for well over a decade. We have developed software—named RRM for ‘RNA mass mapping’—which can search whole prokaryotic genomes or RNA FASTA sequence databases to identify the origin of a given RNA based on a mass spectrum of RNA fragments. As input, the program uses the masses of specific RNase cleavage of the RNA under investigation. RNase T1 digestion is used here as a demonstration of the usability of the method for RNA identification. The concept for identification is that the masses of the digestion products constitute a specific fingerprint, which characterize the given RNA. The search algorithm is based on the same principles as those used in peptide mass fingerprinting, but has here been extended to work for both RNA sequence databases and for genome searches. A simple and powerful probability model for ranking RNA matches is proposed. We demonstrate viability of the entire setup by identifying the DNA template of a series of RNAs of biological and of in vitro transcriptional origin in complete microbial genomes and by identifying authentic 16S ribosomal RNAs in a ‘small ribosomal subunit RNA’ database. Thus, we present a new tool for a rapid identification of unknown RNAs using only a few picomoles of starting material. PMID:19264806

  7. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  8. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  9. Line-scan system for continuous hand authentication

    NASA Astrophysics Data System (ADS)

    Liu, Xiaofeng; Kong, Lingsheng; Diao, Zhihui; Jia, Ping

    2017-03-01

    An increasing number of heavy machinery and vehicles have come into service, giving rise to a significant concern over protecting these high-security systems from misuse. Conventionally, authentication performed merely at the initial login may not be sufficient for detecting intruders throughout the operating session. To address this critical security flaw, a line-scan continuous hand authentication system with the appearance of an operating rod is proposed. Given that the operating rod is occupied throughout the operating period, it can be a possible solution for unobtrusively recording the personal characteristics for continuous monitoring. The ergonomics in the physiological and psychological aspects are fully considered. Under the shape constraints, a highly integrated line-scan sensor, a controller unit, and a gear motor with encoder are utilized. This system is suitable for both the desktop and embedded platforms with a universal serial bus interface. The volume of the proposed system is smaller than 15% of current multispectral area-based camera systems. Based on experiments on a database with 4000 images from 200 volunteers, a competitive equal error rate of 0.1179% is achieved, which is far more accurate than the state-of-the-art continuous authentication systems using other modalities.

  10. [Study on HPLC fingerprint of flavonoids from Houttuynia cordata by comparing with fingerprint reference].

    PubMed

    Zhang, Ting-Ting; Wu, Yi; Hang, Tai-Jun

    2009-05-01

    To establish a stable and repeatable HPLC fingerprint standard and evaluate the flavonoids from Houttuynia cordata qualitatively and quantitatively. HPLC separation was performed on a C18 column with methanol-0.1% phosphoric acid mixed solution as mobile phase in gradient elution mode. The fingerprint reference was determined as one of the most typical chromatograms and used to be compared with other samples through Cosine and Relative Euclid Distance methods, thus the chromatographic fingerprints of flavonoids from Houttuynia cordata were evaluated by constitutes and contents, respectively. Fourteen mutual peaks were fixed in the HPLC fingerprint of flavonoids from Houttaynia cordata. It showed good results in validation tests in which the quercitrin's peak was set as the reference peak to calculate relative retention time and area of other peaks in the chromatograms, and the RSD were less than 0.2% and 5.0%, respectively. The linear ranges for quercitrin was 1.07-83.4 microg/mL (r=0.9999) and the average recovery was 100.3%. The method shows good repeatability, ruggedness and reliability. Comparing with the established reference fingerprint, the evaluation system including Cosine and Relative Euclid Distance methods lays dependable foundation for controlling the quality of Houttuynia cordata.

  11. Evaluation of fingerprint deformation using optical coherence tomography

    NASA Astrophysics Data System (ADS)

    Gutierrez da Costa, Henrique S.; Maxey, Jessica R.; Silva, Luciano; Ellerbee, Audrey K.

    2014-02-01

    Biometric identification systems have important applications to privacy and security. The most widely used of these, print identification, is based on imaging patterns present in the fingers, hands and feet that are formed by the ridges, valleys and pores of the skin. Most modern print sensors acquire images of the finger when pressed against a sensor surface. Unfortunately, this pressure may result in deformations, characterized by changes in the sizes and relative distances of the print patterns, and such changes have been shown to negatively affect the performance of fingerprint identification algorithms. Optical coherence tomography (OCT) is a novel imaging technique that is capable of imaging the subsurface of biological tissue. Hence, OCT may be used to obtain images of subdermal skin structures from which one can extract an internal fingerprint. The internal fingerprint is very similar in structure to the commonly used external fingerprint and is of increasing interest in investigations of identify fraud. We proposed and tested metrics based on measurements calculated from external and internal fingerprints to evaluate the amount of deformation of the skin. Such metrics were used to test hypotheses about the differences of deformation between the internal and external images, variations with the type of finger and location inside the fingerprint.

  12. Application of a brain-computer interface for person authentication using EEG responses to photo stimuli.

    PubMed

    Mu, Zhendong; Yin, Jinhai; Hu, Jianfeng

    2018-01-01

    In this paper, a person authentication system that can effectively identify individuals by generating unique electroencephalogram signal features in response to self-face and non-self-face photos is presented. In order to achieve a good stability performance, the sequence of self-face photo including first-occurrence position and non-first-occurrence position are taken into account in the serial occurrence of visual stimuli. In addition, a Fisher linear classification method and event-related potential technique for feature analysis is adapted to yield remarkably better outcomes than that by most of the existing methods in the field. The results have shown that the EEG-based person authentications via brain-computer interface can be considered as a suitable approach for biometric authentication system.

  13. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  14. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  15. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  16. Compact & Ultra-High Resolution Terahertz Spectroscopic/Fingerprint System

    DTIC Science & Technology

    2011-05-11

    successfully fusion - spliced with commercial silica fibers for the first time, which makes the whole MOPA system monolithic. Fig. 7 (a) shows the output...QPM-GaP crystals and the proposed THz crystal fiber converters for high power parametric THz source, THz waveguide modeling for high efficiency and...THz spectroscopic/fingerprinting system. We have achieved 0.212 mJ fiber laser pulses with transform-limited linewidth, bonded QPM-GaP crystals and

  17. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  18. Roughness Encoding in Human and Biomimetic Artificial Touch: Spatiotemporal Frequency Modulation and Structural Anisotropy of Fingerprints

    PubMed Central

    Oddo, Calogero Maria; Beccai, Lucia; Wessberg, Johan; Wasling, Helena Backlund; Mattioli, Fabio; Carrozza, Maria Chiara

    2011-01-01

    The influence of fingerprints and their curvature in tactile sensing performance is investigated by comparative analysis of different design parameters in a biomimetic artificial fingertip, having straight or curved fingerprints. The strength in the encoding of the principal spatial period of ridged tactile stimuli (gratings) is evaluated by indenting and sliding the surfaces at controlled normal contact force and tangential sliding velocity, as a function of fingertip rotation along the indentation axis. Curved fingerprints guaranteed higher directional isotropy than straight fingerprints in the encoding of the principal frequency resulting from the ratio between the sliding velocity and the spatial periodicity of the grating. In parallel, human microneurography experiments were performed and a selection of results is included in this work in order to support the significance of the biorobotic study with the artificial tactile system. PMID:22163915

  19. Forensic Identification of Gender from Fingerprints.

    PubMed

    Huynh, Crystal; Brunelle, Erica; Halámková, Lenka; Agudelo, Juliana; Halámek, Jan

    2015-11-17

    In the past century, forensic investigators have universally accepted fingerprinting as a reliable identification method, which relies mainly on pictorial comparisons. Despite developments to software systems in order to increase the probability and speed of identification, there has been limited success in the efforts that have been made to move away from the discipline's absolute dependence on the existence of a prerecorded matching fingerprint. Here, we have revealed that an information-rich latent fingerprint has not been used to its full potential. In our approach, the content present in the sweat left behind-namely the amino acids-can be used to determine physical such as gender of the originator. As a result, we were able to focus on the biochemical content in the fingerprint using a biocatalytic assay, coupled with a specially designed extraction protocol, for determining gender rather than focusing solely on the physical image.

  20. Performance characterization of structured light-based fingerprint scanner

    NASA Astrophysics Data System (ADS)

    Hassebrook, Laurence G.; Wang, Minghao; Daley, Raymond C.

    2013-05-01

    Our group believes that the evolution of fingerprint capture technology is in transition to include 3-D non-contact fingerprint capture. More specifically we believe that systems based on structured light illumination provide the highest level of depth measurement accuracy. However, for these new technologies to be fully accepted by the biometric community, they must be compliant with federal standards of performance. At present these standards do not exist for this new biometric technology. We propose and define a set of test procedures to be used to verify compliance with the Federal Bureau of Investigation's image quality specification for Personal Identity Verification single fingerprint capture devices. The proposed test procedures include: geometric accuracy, lateral resolution based on intensity or depth, gray level uniformity and flattened fingerprint image quality. Several 2-D contact analogies, performance tradeoffs and optimization dilemmas are evaluated and proposed solutions are presented.

  1. Visualization of latent fingerprints beneath opaque electrical tapes by optical coherence tomography

    NASA Astrophysics Data System (ADS)

    Liu, Kangkang; Zhang, Ning; Meng, Li; Li, Zhigang; Xu, Xiaojing

    2018-03-01

    Electrical tape is found as one type of important trace evidence in crime scene. For example, it is very frequently used to insulate wires in explosive devices in many criminal cases. The fingerprints of the suspects were often left on the adhesive side of the tapes, which can provide very useful clues for the investigation and make it possible for individual identification. The most commonly used method to detect and visualize those latent fingerprints is to peel off each layer of the tapes first and then adopt the chemical methods to develop the fingerprints on the tapes. However, the peeling-off and chemical development process would degrade and contaminate the fingerprints and thus adversely affect the accuracy of identification. Optical coherence tomography (OCT) is a novel forensic imaging modality based on lowcoherence interferometry, which has the advantages of non-destruction, micrometer-level high resolution and crosssectional imaging. In this study, a fiber-based spectral-domain OCT (SD-OCT) system with {6μm resolution was employed to obtain the image of fingerprint sandwiched between two opaque electrical tapes without any pre-processing procedure like peeling-off. Three-dimensional (3D) OCT reconstruction was performed and the subsurface image was produced to visualize the latent fingerprints. The results demonstrate that OCT is a promising tool for recovering the latent fingerprints hidden beneath opaque electrical tape non-destructively and rapidly.

  2. Optical identity authentication technique based on compressive ghost imaging with QR code

    NASA Astrophysics Data System (ADS)

    Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang

    2018-04-01

    With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.

  3. Disambiguating authenticity: Interpretations of value and appeal.

    PubMed

    O'Connor, Kieran; Carroll, Glenn R; Kovács, Balázs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  4. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  5. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  6. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  7. The influence of authentic leadership on safety climate in nursing.

    PubMed

    Dirik, Hasan Fehmi; Seren Intepeler, Seyda

    2017-07-01

    This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.

  8. Object migration and authentication. [in computer operating systems design

    NASA Technical Reports Server (NTRS)

    Gligor, V. D.; Lindsay, B. G.

    1979-01-01

    The paper presents a mechanism permitting a type manager to fabricate a migrated object representation which can be entrusted to other subsystems or transmitted outside of the control of a local computer system. The migrated object representation is signed by the type manager in such a way that the type manager's signature cannot be forged and the manager is able to authenticate its own signature. Subsequently, the type manager can retrieve the migrated representation and validate its contents before reconstructing the object in its original representation. This facility allows type managers to authenticate the contents of off-line or network storage and solves problems stemming from the hierarchical structure of the system itself.

  9. Environmental impact to multimedia systems on the example of fingerprint aging behavior at crime scenes

    NASA Astrophysics Data System (ADS)

    Merkel, Ronny; Breuhan, Andy; Hildebrandt, Mario; Vielhauer, Claus; Bräutigam, Anja

    2012-06-01

    In the field of crime scene forensics, current methods of evidence collection, such as the acquisition of shoe-marks, tireimpressions, palm-prints or fingerprints are in most cases still performed in an analogue way. For example, fingerprints are captured by powdering and sticky tape lifting, ninhydrine bathing or cyanoacrylate fuming and subsequent photographing. Images of the evidence are then further processed by forensic experts. With the upcoming use of new multimedia systems for the digital capturing and processing of crime scene traces in forensics, higher resolutions can be achieved, leading to a much better quality of forensic images. Furthermore, the fast and mostly automated preprocessing of such data using digital signal processing techniques is an emerging field. Also, by the optical and non-destructive lifting of forensic evidence, traces are not destroyed and therefore can be re-captured, e.g. by creating time series of a trace, to extract its aging behavior and maybe determine the time the trace was left. However, such new methods and tools face different challenges, which need to be addressed before a practical application in the field. Based on the example of fingerprint age determination, which is an unresolved research challenge to forensic experts since decades, we evaluate the influences of different environmental conditions as well as different types of sweating and their implications to the capturing sensory, preprocessing methods and feature extraction. We use a Chromatic White Light (CWL) sensor to exemplary represent such a new optical and contactless measurement device and investigate the influence of 16 different environmental conditions, 8 different sweat types and 11 different preprocessing methods on the aging behavior of 48 fingerprint time series (2592 fingerprint scans in total). We show the challenges that arise for such new multimedia systems capturing and processing forensic evidence

  10. Communicating food safety, authenticity and consumer choice. Field experiences.

    PubMed

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  11. Preservation Environments

    NASA Technical Reports Server (NTRS)

    Moore, Reagan W.

    2004-01-01

    The long-term preservation of digital entities requires mechanisms to manage the authenticity of massive data collections that are written to archival storage systems. Preservation environments impose authenticity constraints and manage the evolution of the storage system technology by building infrastructure independent solutions. This seeming paradox, the need for large archives, while avoiding dependence upon vendor specific solutions, is resolved through use of data grid technology. Data grids provide the storage repository abstractions that make it possible to migrate collections between vendor specific products, while ensuring the authenticity of the archived data. Data grids provide the software infrastructure that interfaces vendor-specific storage archives to preservation environments.

  12. An Optimized DNA Analysis Workflow for the Sampling, Extraction, and Concentration of DNA obtained from Archived Latent Fingerprints.

    PubMed

    Solomon, April D; Hytinen, Madison E; McClain, Aryn M; Miller, Marilyn T; Dawson Cruz, Tracey

    2018-01-01

    DNA profiles have been obtained from fingerprints, but there is limited knowledge regarding DNA analysis from archived latent fingerprints-touch DNA "sandwiched" between adhesive and paper. Thus, this study sought to comparatively analyze a variety of collection and analytical methods in an effort to seek an optimized workflow for this specific sample type. Untreated and treated archived latent fingerprints were utilized to compare different biological sampling techniques, swab diluents, DNA extraction systems, DNA concentration practices, and post-amplification purification methods. Archived latent fingerprints disassembled and sampled via direct cutting, followed by DNA extracted using the QIAamp® DNA Investigator Kit, and concentration with Centri-Sep™ columns increased the odds of obtaining an STR profile. Using the recommended DNA workflow, 9 of the 10 samples provided STR profiles, which included 7-100% of the expected STR alleles and two full profiles. Thus, with carefully selected procedures, archived latent fingerprints can be a viable DNA source for criminal investigations including cold/postconviction cases. © 2017 American Academy of Forensic Sciences.

  13. Security authentication using phase-encoded nanoparticle structures and polarized light.

    PubMed

    Carnicer, Artur; Hassanfiroozi, Amir; Latorre-Carmona, Pedro; Huang, Yi-Pai; Javidi, Bahram

    2015-01-15

    Phase-encoded nanostructures such as quick response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase-encoded QR codes. The system is illuminated using polarized light, and the QR code is encoded using a phase-only random mask. Using classification algorithms, it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase-encoded QR codes using polarimetric signatures.

  14. Multi-Band Received Signal Strength Fingerprinting Based Indoor Location System

    NASA Astrophysics Data System (ADS)

    Sertthin, Chinnapat; Fujii, Takeo; Ohtsuki, Tomoaki; Nakagawa, Masao

    This paper proposes a new multi-band received signal strength (MRSS) fingerprinting based indoor location system, which employs the frequency diversity on the conventional single-band received signal strength (RSS) fingerprinting based indoor location system. In the proposed system, the impacts of frequency diversity on the enhancements of positioning accuracy are analyzed. Effectiveness of the proposed system is proved by experimental approach, which was conducted in non line-of-sight (NLOS) environment under the area of 103m2 at Yagami Campus, Keio University. WLAN access points, which simultaneously transmit dual-band signal of 2.4 and 5.2GHz, are utilized as transmitters. Likewise, a dual-band WLAN receiver is utilized as a receiver. Signal distances calculated by both Manhattan and Euclidean were classified by K-Nearest Neighbor (KNN) classifier to illustrate the performance of the proposed system. The results confirmed that Frequency diversity attributions of multi-band signal provide accuracy improvement over 50% of the conventional single-band.

  15. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  16. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  17. An Evaluation of Authentic Learning in an Electronic Medical Records System

    ERIC Educational Resources Information Center

    Stuart, Sandra L.

    2013-01-01

    This study examined participants' perceptions of the effectiveness of a new job-training program designed to enhance the authentic learning in adult learners using an electronic medical records system at a naval health clinic. This job-training program lacked data about participants' perceptions of this learning process by which to gauge its…

  18. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    PubMed Central

    Park, Namje; Kang, Namhi

    2015-01-01

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759

  19. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    PubMed Central

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  20. Unsupervised Indoor Localization Based on Smartphone Sensors, iBeacon and Wi-Fi.

    PubMed

    Chen, Jing; Zhang, Yi; Xue, Wei

    2018-04-28

    In this paper, we propose UILoc, an unsupervised indoor localization scheme that uses a combination of smartphone sensors, iBeacons and Wi-Fi fingerprints for reliable and accurate indoor localization with zero labor cost. Firstly, compared with the fingerprint-based method, the UILoc system can build a fingerprint database automatically without any site survey and the database will be applied in the fingerprint localization algorithm. Secondly, since the initial position is vital to the system, UILoc will provide the basic location estimation through the pedestrian dead reckoning (PDR) method. To provide accurate initial localization, this paper proposes an initial localization module, a weighted fusion algorithm combined with a k-nearest neighbors (KNN) algorithm and a least squares algorithm. In UILoc, we have also designed a reliable model to reduce the landmark correction error. Experimental results show that the UILoc can provide accurate positioning, the average localization error is about 1.1 m in the steady state, and the maximum error is 2.77 m.

Top