Now showing 1 - 10 of 69
  • Publication
    Biometric hash based on statistical features of online signatures
    ( 2002)
    Vielhauer, C.
    ;
    Steinmetz, R.
    ;
    Mayerhöfer, A.
    This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verification systems are threshold-based true-false decisions, based on a comparison between test sample signals and sets of reference signals, our system responds to a signature input with a biometric hash vector, which is calculated based on an individual interval matrix. Especially for applications, which require key management strategies (e.g. e-Commerce, smart cards), hash values are of great interest, as keys can be derived directly from the hash value, whereas a verification decision can only grant or refuse access to a stored key. Further, our new approach does not require storage of templates for reference signatures, thus increases the security of the system. In our prototype implementation, the generated biometric hash values are calculated on a pen-based PDA and used for key generation f or a future secure data communication between a PDA and a server by encryption. First tests show that the system is actually able to generate stable biometric hash values of the users and although the system was exposed to skilled forgeries, no test person was able to reproduce another subject's hash vector. During tests, we were able to tune the system to a FAR of 0% at a FRR level of 7.05%.
  • Publication
    Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich
    ( 2002)
    Kirchner, H.
    ;
    Schönfeld, W.
    ;
    Steinmetz, R.
  • Publication
    Modeling IP-based mobility management
    ( 2002)
    Schönfeld, W.
    ;
    Meissner, A.
    ;
    Kirchner, H.
    ;
    Steinmetz, R.
  • Publication
    Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich
    ( 2002)
    Kirchner, H.
    ;
    Schönfeld, W.
    ;
    Steinmetz, R.
  • Publication
    Biometric authentication for ID cards with hologram watermarks
    ( 2002)
    Croce Ferri, L.
    ;
    Mayerhöfer, A.
    ;
    Frank, M.
    ;
    Vielhauer, C.
    ;
    Steinmetz, R.
  • Publication
    Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication
    ( 2001)
    Dittmann, J.
    ;
    Steinebach, M.
    ;
    Croce Ferri, L.
    ;
    Vielhauer, C.
    ;
    Steinmetz, R.
    ;
    Wohlmacher, P.
  • Publication
    Vulnerabilities and security limitations of current IP telephony systems
    ( 2001)
    Ackermann, R.
    ;
    Schumacher, M.
    ;
    Roedig, U.
    ;
    Steinmetz, R.
    Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part of our future communication infrastructure (e.g. as classical PBX enhancement or replacement) continuous high availability, stable and error-free operation and the protection of the privacy of the spoken word are challenges, that definitely have to be met. Since manufacturers start deploying new end systems and infrastructure components rather fast now - a critical inspection of their security features and vulnerabilities is mandatory. The critical presentation of the theoretical background of certain vulnerabilities, testing and attacking tools and the evaluation results reveals, that well-known security flaws become part of implementations in the new application area again and the security level of a number of examined solutions is rather insufficient.
  • Publication
    Transitivity based enrollment strategy for signature verification systems
    ( 2001)
    Vielhauer, C.
    ;
    Steinmetz, R.
    ;
    Mayerhöfer, A.
  • Publication
  • Publication
    A framework for group integrity management in multimedia multicasting
    ( 2001)
    Meissner, A.
    ;
    Wolf, L.
    ;
    Schönfeld, W.
    ;
    Steinmetz, R.