Now showing 1 - 10 of 69
No Thumbnail Available
Publication

Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich

2002 , Kirchner, H. , Schönfeld, W. , Steinmetz, R.

No Thumbnail Available
Publication

Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich

2002 , Kirchner, H. , Schönfeld, W. , Steinmetz, R.

No Thumbnail Available
Publication

Transitivity based enrollment strategy for signature verification systems

2001 , Vielhauer, C. , Steinmetz, R. , Mayerhöfer, A.

No Thumbnail Available
Publication

Coherence in the learning system k-Med

2001 , Steinmetz, R. , Steinacker, A. , Seeberg, C.

No Thumbnail Available
Publication

Biometric hash based on statistical features of online signatures

2002 , Vielhauer, C. , Steinmetz, R. , Mayerhöfer, A.

This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verification systems are threshold-based true-false decisions, based on a comparison between test sample signals and sets of reference signals, our system responds to a signature input with a biometric hash vector, which is calculated based on an individual interval matrix. Especially for applications, which require key management strategies (e.g. e-Commerce, smart cards), hash values are of great interest, as keys can be derived directly from the hash value, whereas a verification decision can only grant or refuse access to a stored key. Further, our new approach does not require storage of templates for reference signatures, thus increases the security of the system. In our prototype implementation, the generated biometric hash values are calculated on a pen-based PDA and used for key generation f or a future secure data communication between a PDA and a server by encryption. First tests show that the system is actually able to generate stable biometric hash values of the users and although the system was exposed to skilled forgeries, no test person was able to reproduce another subject's hash vector. During tests, we were able to tune the system to a FAR of 0% at a FRR level of 7.05%.

No Thumbnail Available
Publication

Biometric authentication for ID cards with hologram watermarks

2002 , Croce Ferri, L. , Mayerhöfer, A. , Frank, M. , Vielhauer, C. , Steinmetz, R.

No Thumbnail Available
Publication

Vulnerabilities and security limitations of current IP telephony systems

2001 , Ackermann, R. , Schumacher, M. , Roedig, U. , Steinmetz, R.

Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part of our future communication infrastructure (e.g. as classical PBX enhancement or replacement) continuous high availability, stable and error-free operation and the protection of the privacy of the spoken word are challenges, that definitely have to be met. Since manufacturers start deploying new end systems and infrastructure components rather fast now - a critical inspection of their security features and vulnerabilities is mandatory. The critical presentation of the theoretical background of certain vulnerabilities, testing and attacking tools and the evaluation results reveals, that well-known security flaws become part of implementations in the new application area again and the security level of a number of examined solutions is rather insufficient.

No Thumbnail Available
Publication

Modeling IP-based mobility management

2002 , Schönfeld, W. , Meissner, A. , Kirchner, H. , Steinmetz, R.

No Thumbnail Available
Publication

Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication

2001 , Dittmann, J. , Steinebach, M. , Croce Ferri, L. , Vielhauer, C. , Steinmetz, R. , Wohlmacher, P.

No Thumbnail Available
Publication

A framework for group integrity management in multimedia multicasting

2001 , Meissner, A. , Wolf, L. , Schönfeld, W. , Steinmetz, R.