0000000000737486

AUTHOR

V. Conti

Usability analysis of a novel biometric authentication approach for android-based mobile devices

Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…

research product

Resource-efficient hardware implementation of a neural-based node for automatic fingerprint classification

Modern mobile communication networks and Internet of Things are paving the way to ubiquitous and mobile computing. On the other hand, several new computing paradigms, such as edge computing, demand for high computational capabilities on specific network nodes. Ubiquitous environments require a large number of distributed user identification nodes enabling a secure platform for resources, services and information management. Biometric systems represent a useful option to the typical identification systems. An accurate automatic fingerprint classification module provides a valuable indexing scheme that allows for effective matching in large fingerprint databases. In this work, an efficient em…

research product

Biometric Features for Mobile Agents Ownership

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

research product

Topological Information, Flux Balance Analysis, and Extreme Pathways Extraction for Metabolic Networks Behaviour Investigation

In recent years biological processes modeling and simulation have become two key issues in analyzing complex cellular systems. Information about metabolic networks is often incomplete, since a large portion of available data is ignored by its probabilistic nature. The main objective of this work is to investigate metabolic networks behavior in terms of their fault tolerance capabilities as random removal of network nodes and high-connectivity-degree node deletion aimed at compromising or modifying network activity. This paper proposes a software framework, namely CEllDataLaB, containing three tasks to perform the structural and functional analysis: topological analysis, flux balance analysi…

research product

Web Directories as a Knowledge Base to Build a Multi-Agent System for Information Sharing

. A neural based multi-agent system, exploiting the Web Directories as a Knowledge Base for information sharing and documents retrieval, is presented. The system is based on the E?Net architecture, a neural network capable of learning the activation function of its hidden units and having good generalization capabilities. System goal is to retrieve, among documents shared by a networked community, documents satisfying a query and dealing with a specific topic. The system is composed by four agents: the Trainer Agent, the Neural Classifier Agent, the Interface Agent, and the Librarian Agent. The sub-symbolic knowledge of the Neural Classifier Agent is automatically updated each time a new, n…

research product

Fuzzy techniques for access and data management in home automation environments

Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…

research product

An Embedded Fingerprints Classification System based on Weightless Neural Networks

Automatic fingerprint classification provides an important indexing scheme to facilitate efficient matching in large-scale fingerprint databases in Automatic Fingerprint Identification Systems (AFISs). The paper presents a new fast fingerprint classification module implementing on embedded Weightless Neural Network (RAM-based neural network). The proposed WNN architecture uses directional maps to classify fingerprint images in the five NIST classes (Left Loop, Right Loop, Whorl, Arch and Tented Arch) without anyone enhancement phase. Starting from the directional map, the WNN architecture computes the fingerprint classification rate. The proposed architecture is implemented on Celoxica RC20…

research product

A fast fusion technique for fingerprint and iris spatial descriptors in multimodal biometric systems

Multimodal biometric identification systems aim to combine two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR). In this paper a new fusion technique for fingerprint and iris spatial descriptors with a low execution time is presented. The report focuses on spatial fusion strategies, offering and proposing a modern perspective on multi-biometrics. In greater detail, a spatial-based approach and a homogeneous biometric vector, integrating iris and fingerprint data, are generated, fused, and processed for the overall system matching score. The goal of this approach is to demonstrate that, by using spatial iris features followin…

research product

Biometrics authentication and reputation based policies in a mas security framework

research product

An embedded iris recognizer for portable and mobile devices

Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…

research product