Secure contracts signed by mobile Phone IST-2002-506883 Jacques Koreman, NTNU Andrew Morris, Spinvox International Workshop on Verbal and Nonverbal Communiation.

Slides:



Advertisements
Similar presentations
Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Advertisements

Blue Eye T E C H N O L G Y.
BioSecure & COST 2101 – Smart Cards and Biometric – Lausanne, 2007 Sabah Jassim University of Buckingham, UK. SecurePhone A Multi-Modal Biometric Verifier.
© Fraunhofer FKIE Corinna Harwardt Automatic Speaker Recognition in Military Environment.
AVQ Automatic Volume and eQqualization control Interactive White Paper v1.6.
Phone Product Roadmap snom technology AG, November 2004.
Fusion of HMM’s Likelihood and Viterbi Path for On-line Signature Verification Bao Ly Van - Sonia Garcia Salicetti - Bernadette Dorizzi Institut National.
DARWIN PHONES: THE EVOLUTION OF SENSING AND INFERENCE ON MOBILE PHONES PRESENTED BY: BRANDON OCHS Emiliano Miluzzo, Cory T. Cornelius, Ashwin Ramaswamy,
Abstract This article investigates the importance of the vocal source information for speaker recogni- tion. We propose a novel feature extraction scheme.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Frontiers in Interaction The Power of Multimodal Standards Deborah Dahl Principal, Conversational Technologies Chair, W3C Multimodal Interaction Working.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
BioSec © 2004 BioSec Consortium 1 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages.
SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Speaker Adaptation for Vowel Classification
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
ICASSP'06 1 S. Y. Kung 1 and M. W. Mak 2 1 Dept. of Electrical Engineering, Princeton University 2 Dept. of Electronic and Information Engineering, The.
Biometrics and Authentication Shivani Kirubanandan.
Oral Defense by Sunny Tang 15 Aug 2003
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Your Interactive Guide to the Digital World Discovering Computers 2012.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Biometrics: Voice Recognition
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
MACHINE VISION GROUP Multimodal sensing-based camera applications Miguel Bordallo 1, Jari Hannuksela 1, Olli Silvén 1 and Markku Vehviläinen 2 1 University.
SoundSense: Scalable Sound Sensing for People-Centric Application on Mobile Phones Hon Lu, Wei Pan, Nocholas D. lane, Tanzeem Choudhury and Andrew T. Campbell.
Speech Technology Center Solutions for Mobile Phones.
SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts.
Age and Gender Classification using Modulation Cepstrum Jitendra Ajmera (presented by Christian Müller) Speaker Odyssey 2008.
All features considered separately are relevant in a speech / music classification task. The fusion allows to raise the accuracy rate up to 94% for speech.
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Multimodal Information Access Using Speech and Gestures Norbert Reithinger
Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
PRESENTATION ON BIOMETRICS
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
User ID Feature GAP Mini-Summit
Speaker Verification Using Adapted GMM Presented by CWJ 2000/8/16.
What is Input?  Input  Processing  Output  Storage Everything we enter into the computer to do is Input.
ENTERFACE’08 Multimodal Communication with Robots and Virtual Agents mid-term presentation.
361 Hardware, Software, and Computer Performance Lec 2.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Information Systems Design and Development Security Precautions Computing Science.
Flexible Speaker Adaptation using Maximum Likelihood Linear Regression Authors: C. J. Leggetter P. C. Woodland Presenter: 陳亮宇 Proc. ARPA Spoken Language.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
DESIGN FOR DYNAMIC REQUIREMENT AND DIVERSE USER EXPERIENCE
The School of Antenatal Educators
Architecture for security monitoring in IoT environments
Speech Technology Center Solutions
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Presentation for EEL6586 Automatic Speech Processing
Sfax University, Tunisia
University of West Bohemia – Department of Cybernetics
Presentation transcript:

Secure contracts signed by mobile Phone IST Jacques Koreman, NTNU Andrew Morris, Spinvox International Workshop on Verbal and Nonverbal Communiation Behaviours Vietri sul Mare, March 2007 Multi-modal Biometric Verification for Small and Very Small Devices

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 2 Overview Background and application: SecurePhone Multimodal biometric recognition –face, voice, signature: natural For small devices: PDA –Good performance, short verification time –Security problem For very small devices: SIM card –Global features to run on slow CPU –Short verification time, acceptable performance Conclusion –Further improvements by glottal feature fusion? –Relevance for COST2102

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 3 Background: SecurePhone project Duration: – Aim: “a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly ” SecurePhone consortium: –Management –Research –Implementation –Exploitation Financing: EU 6th framework IST

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 4 SecurePhone GPRS/UMTS e-signature manager SIM card PIN number video camera touch screen microphone data capture biometric preprocessor biometric recogniser

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 5 Multimodal biometric recogniser Haar LL4 wavelets GMM geometric featuresMFCCs Face Voice Signature reject user accept user release private key “biometric recogniser” user profile world model Later: HL4 LL HL LH HH

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 6 PDA: fusion results for PDAtabase DET curves/result table for 5-digit (left), 10-digit (middle) and phrase prompts (right) Modality5-digit10-digitPhrase Voice Face Signature8.01 Fusion (mean) Fusion (sd) Marcos Faundez-Zanuy: Face recognition: an unsolved problem

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 7 From small to very small devices: problem Biometric data cannot be stored or processed on the PDA, because impostors could steal biometric data. Therefore storage and processing must be on SIMcard, which self-destroys when tampered with physically. Instead of a few seconds on the PDA, verification on the SIMcard takes one hour! Bottleneck: large number of comparisons in voice and signature verification (for client model and UBM) –for large number of frames per prompt –for large number of Gaussian mixtures in GMM

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 8 Reducing the frame rate or the number of GMM mixtures cannot reduce the processing time in a sufficient order of magnitude Drastic solution: globalised features (idea taken from static signature representations) –Means (cf. Long-Term Average Spectrum for voice) and standard deviations per vector parameter across all frames; also greatly reduced number of Gaussians required for modelling the vectors –To counteract the effect of averaging, compute globalised features for subparts of the signal From small to very small devices: solution Marcos Faundez-Zanuy: Open your mind: sometimes a simple solution can give a good result“ (and sometimes you cannot get around it)

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 9 PDA results Global feat. Means only Means + sd #Gauss Voice Face Signature fused EER (percent) for globalised means (columns 2-5) and means plus standard deviations (columns 6-9)

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 10 SIM card results EER (percent) for globalised means (columns 2-5) and means plus standard deviations (columns 6-9) for voice and signature divided into two equal subparts Global feat. Means only Means + sd #Gauss Voice Face Signature Fused

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 11 Improvement needed Performance drop: –PDA EER 2.39% (meanwhile improved to 0.9%) –SIM EER 10.05% (8.28 for two equal subparts) Performance can be improved if we do not restrain the GMM models to be the same across all modalities Otherwise: Use of complementary features within a modality –Face: simple face geometric variables –Voice : parameter values of LF model fitted to glottal flow derivative, obtained from inverse filtering of mic signal

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 12 Interest to this COST action Interest in glottal flow derivative for speaker recognition stems from –expected complementarity to MFCC representation of spectrum –applicability in applications which use very little training data (as in SecurePhone, for user-friendliness) But can also be useful for other classification problems, like “the recognition of emotional states, gesture, speech and facial expressions, in anticipation of the implementation of useful application such as intelligent avatars and interactive dialog systems” (quote from aims website of this workshop)

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 13 Last night’s addendum: speech & gestures Source signal parameters can also be used together with other spectral parameters as well as F0, duration, loudness measures to signal prominence. In speech, these signals can be used differently across languages (syllable-timed vs. stress-timed) and speakers (German Research Council “rhythm project” led by Bill Barry, Saarland University, to which NTNU contributes with Norwegian database recordings and analyses). Prominence also signalled by extent/size as well as acceleration of gestures. In how far do gestures and speech signal parameters correlate? When are they used as complementary/ alternative strategies for signalling prominence?

Int’l Workshop on Verbal and Nonverbal Communication Behaviours, Vietri sul Mare, March 2007, slide 14 Thank you for your attention.