Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla Aug 2019

Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla

Dissertations - ALL

We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices' are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary …


Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra Jan 2019

Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new method to deal with automatic speaker verification based on band-limited phaseonly correlation (BLPOC) is proposed. The aim of this study is to validate the use of the BLPOC function as a new limited-data automatic speaker verification technique. Although some speaker verification techniques have high accuracy, efficiency usually depends on the extraction of complex theoretical information from speech signals and the amount of the data for training the algorithms. The BLPOC function is a high-accuracy biometric technique traditionally implemented in human identification by fingerprints (through image-matching). When applying the BLPOC function in automatic speaker verification through …


Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav Jan 2019

Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav

Graduate Theses, Dissertations, and Problem Reports

The widespread use of smartphones has spurred the research in mobile iris devices. Due to their convenience, these mobile devices are also utilized in unconstrained outdoor conditions. At the same time, iris recognition in the visible spectrum has developed into an active area of research. These scenarios have necessitated the development of reliable iris recognition algorithms for such an uncontrolled environment. Additionally, iris presentation attacks such as textured contact lens pose a major challenge to current iris recognition systems.

Motivated by these factors, in this thesis, a detailed analysis of the effect of textured contact lenses on iris recognition in …