scispace - formally typeset
Search or ask a question

Showing papers by "Nalini K. Ratha published in 2015"


Journal ArticleDOI
TL;DR: An overview of various cancelable biometric schemes for biometric template protection is provided and the merits and drawbacks of available cancelableBiometric systems are discussed and promising avenues of research are identified.
Abstract: Recent years have seen an exponential growth in the use of various biometric technologies for trusted automatic recognition of humans With the rapid adaptation of biometric systems, there is a growing concern that biometric technologies may compromise the privacy and anonymity of individuals Unlike credit cards and passwords, which can be revoked and reissued when compromised, biometrics are permanently associated with a user and cannot be replaced To prevent the theft of biometric patterns, it is desirable to modify them through revocable and noninvertible transformations to produce cancelable biometric templates In this article, we provide an overview of various cancelable biometric schemes for biometric template protection We discuss the merits and drawbacks of available cancelable biometric systems and identify promising avenues of research in this rapidly evolving field

320 citations


Journal ArticleDOI
TL;DR: Very large-scale biometric systems are becoming mainstream in nationwide identity cards and mobile secure payment methods and are likely to emerge as among the most critical of the Big Data systems.
Abstract: Very large-scale biometric systems are becoming mainstream in nationwide identity cards and mobile secure payment methods. As with other Big Data systems, biometric systems contend with the “four V” challenges that involve the effective managing of the complex life cycle and operations of identity information—despite the immense enrollment database size ( volume ) and rapid transaction response-time ( velocity ) requirements using potentially noisy, fraudulent ( veracity ), and multiple ( variety ) biometric identifiers. We describe representative techniques addressing these challenges in a variety of diverse and realistic biometrics applications such as 1) indexing methods that allow access in near constant time (velocity) irrespective of the scale (volume) of the biometric database, 2) fusing multiple (variety) biometrics to address risk and accuracy concerns, and 3) ensuring the integrity (veracity) of biometric databases by eliminating multiple duplicate records as well as protecting against theft of biometric identifiers. While sharing many commonalities with generic Big Data system-design issues, biometric systems also provide a rich case study involving how these issues manifest and are addressed in a unique, domain-specific way. We believe that by virtue of dealing with some of the most critical entities, namely identity and entitlement, biometric systems are likely to emerge as among the most critical of the Big Data systems.

13 citations


Patent
28 Aug 2015
TL;DR: In this paper, an inherent supervision summarization device is used to collect group-level supervision and instance level supervision within a same chunklet based on a user input of face images for a person.
Abstract: A face clustering system for video face clustering in a video sequence, the system including an inherent supervision summarization device configured to collect group-level supervision and instance level supervision within a same chunklet based on a user input of face images for a person, a discriminative projection learning device configured to embed group constraints of the group-level supervision into a transformed space, and configured to generate an embedding space from the original image feature space, and a clustering device, in the embedding space, configured to execute pair-wise based clustering to cluster the video images into different clusters with the instance level supervision collected by the inherent supervision summarization device.

7 citations


Patent
10 Dec 2015
TL;DR: In this paper, the authors proposed a method of analyzing an image of a user to determine whether the image is authentic, where a first image of the user's face is received with a camera.
Abstract: An embodiment of the invention provides a method of analyzing an image of a user to determine whether the image is authentic, where a first image of a user's face is received with a camera. Four or more two-dimensional feature points can be located that do not lie on the same two-dimensional plane. Additional images of the user's face can be received; and, the at least four two-dimensional feature points can be located on each additional image with the image processor. The image processor can identify displacements between the two-dimensional feature points on the additional image and the two-dimensional feature points on the first image for each additional image. A processor can determine whether the displacements conform to a three-dimensional surface model. The processor can determine whether to authenticate the user based on the determination of whether the displacements conform to the three-dimensional surface model.

7 citations



Patent
06 Nov 2015
TL;DR: In this article, a method for monitoring a user includes the steps of: collecting real-time data from the user, wherein the data is collected via a mobile feedback controller worn by the user; determining whether the data collected from a user indicates impairment; determining appropriate corrective actions to be taken if the collected data from an individual indicates impairment, otherwise continuing to collect data from that individual in real time.
Abstract: Techniques for modifying user behavior and screening for impairment using a mobile feedback controller, such as a smartwatch, are provided. In one aspect, a method for monitoring a user includes the steps of: collecting real-time data from the user, wherein the data is collected via a mobile feedback controller worn by the user; determining whether the data collected from the user indicates impairment; determining appropriate corrective actions to be taken if the data collected from the user indicates impairment, otherwise continuing to collect data from the user in real-time; determining whether any action is needed; and undertaking the appropriate corrective actions if action is needed, otherwise continuing to collect data from the user in real-time.

5 citations


Patent
14 Sep 2015
TL;DR: In this paper, a similarity detection system receiving a plurality of input entities, including a cohesive subgraph identification device configured to calculate, based on attributes of the plurality of entities, a first parameter and a second parameter based on the first parameter, was presented.
Abstract: A similarity detection system receiving a plurality of input entities, the system including a cohesive subgraph identification device configured to calculate, based on attributes of the plurality of input entities, a first parameter and a second parameter based on the first parameter, and further configured to identify a plurality of subgraphs from the second parameter and a subgraph correlation tracking and clustering device configured to determine a relationship between different subgraphs based on a similarity factor between the second parameter and the plurality of subgraphs.

4 citations


Patent
10 Dec 2015
TL;DR: In this paper, a method for providing real-time feedback to a speaker making a presentation to an audience includes the steps of collecting realtime data from the speaker during the presentation, wherein the data is collected via a mobile device worn by the speaker.
Abstract: Techniques for leveraging the capabilities of wearable mobile technology to collect data and to provide real-time feedback to an orator about his/her performance and/or audience interaction are provided. In one aspect, a method for providing real-time feedback to a speaker making a presentation to an audience includes the steps of: collecting real-time data from the speaker during the presentation, wherein the data is collected via a mobile device worn by the speaker; analyzing the real-time data collected from the speaker to determine whether corrective action is needed to improve performance; and generating a real-time alert to the speaker suggesting the corrective action if the real-time data indicates that corrective action is needed to improve performance, otherwise continuing to collect data from the speaker in real-time. Real-time data may also be collected from members of the audience and/or from other speakers (if present) via wearable mobile devices.

2 citations


Patent
18 Nov 2015
TL;DR: In this article, a real-time harm prevention method for wearable mobile technology, such as a smartwatch, is presented. But, the method is limited to the use of wearable devices and requires the user to wear at least one smartwatch.
Abstract: The present invention provides techniques for leveraging the sensing capabilities of wearable mobile technology, such as a smartwatch, to provide real-time harm prevention. In one aspect of the invention, a method for harm prevention is provided. The method includes the steps of: collecting real-time data from at least one user, wherein the data is collected via a mobile device worn by the user (e.g., a smartwatch); analyzing the real-time data collected from the user to determine whether the real-time data indicates an emergency situation exists; and undertaking an appropriate action if the real-time data indicates that an emergency situation exists, otherwise continuing to collect data from the user in real-time. Third party data relating to potential source of harm to the user may also be obtained (e.g., from a weather service, newsfeeds, etc.)

1 citations


Patent
16 Nov 2015
TL;DR: In this article, a method for secure biometrics matching with split phase client-server matching protocol, wherein a first biometric input is received in an electronic device, the first biomet input is stored in the electronic device as a biometric profile; and, the biometric profiles are sent to a server, and the additional biometric inputs are compared to the profile stored on the server to generate a local matching score.
Abstract: An embodiment of the invention provides a method for secure biometrics matching with split phase client-server matching protocol, wherein a first biometric input is received in an electronic device The first biometric input is stored in the electronic device as a biometric profile; and, the biometric profile is sent to a server An additional biometric input is received from a user in the electronic device; and, the additional biometric input is compared to the biometric profile stored in the electronic device to generate a local matching score The additional biometric input is sent to the server The local matching score and a remote matching score generated by the at least one server are compared; and, it is determined whether to authenticate the user based on the comparison of the local matching score and the remote matching score

1 citations