Tao YU Azril HANIZ Kentaro SANO Ryosuke IWATA Ryouta KOSAKA Yusuke KUKI Gia Khanh TRAN Jun-ichi TAKADA Kei SAKAGUCHI
Location information is essential to varieties of applications. It is one of the most important context to be detected by wireless distributed sensors, which is a key technology in Internet-of-Things. Fingerprint-based methods, which compare location unique fingerprints collected beforehand with the fingerprint measured from the target, have attracted much attention recently in both of academia and industry. They have been successfully used for many location-based applications. From the viewpoint of practical applications, in this paper, four different typical approaches of fingerprint-based radio emitter localization system are introduced with four different representative applications: localization of LTE smart phone used for anti-cheating in exams, indoor localization of Wi-Fi terminals, localized light control in BEMS using location information of occupants, and illegal radio localization in outdoor environments. Based on the different practical application scenarios, different solutions, which are designed to enhance the localization performance, are discussed in detail. To the best of the authors' knowledge, this is the first paper to give a guideline for readers about fingerprint-based localization system in terms of fingerprint selection, hardware architecture design and algorithm enhancement.
Advances in fingerprint authentication technology have led to it being used in a growing range of personal devices such as PCs and smartphones. However, they have also made it possible to capture fingerprints remotely with a digital camera, putting the target person at risk of illegal log-ins and identity theft. This article shows how fingerprint captured in this manner can be authenticated and how people can protect their fingerprints against surreptitious photography. First we show that photographed fingerprints have enough information to spoof fingerprint authentication systems by demonstrating with “fake fingers” made from such photographs. Then we present a method that defeats the use of surreptitious photography without preventing the use of legitimate fingerprint authentication devices. Finally, we demonstrate that an implementation of the proposed method called “BiometricJammer,” a wearable device put on a fingertip, can effectively prevent the illegal acquisition of fingerprints by surreptitious photography while still enabling contact-based fingerprint sensors to respond normally.
Minoru KURIBAYASHI Nobuo FUNABIKI
The study of universal detector for fingerprinting code is strongly dependent on the design of scoring function. The optimal detector is known as MAP detector that calculates an optimal correlation score for a given single user's codeword. However, the knowledge about the number of colluders and their collusion strategy are inevitable. In this paper, we propose a new scoring function that equalizes the bias between symbols of codeword, which is called bias equalizer. We further investigate an efficient scoring function based on the bias equalizer under the relaxed marking assumption such that white Gaussian noise is added to a pirated codeword. The performance is compared with the MAP detector as well as some state-of-the-art scoring functions.
Haruna HIGO Toshiyuki ISSHIKI Kengo MORI Satoshi OBANA
This paper proposes a novel secure biometric authentication scheme. The scheme deals with fingerprint minutiae as the biometric feature and the matching is checked by a widely used technique. To discuss security, we formalize the model of secure biometric authentication scheme by abstracting the related and proposed schemes. The schemes which satisfy all the proposed security requirements are guaranteed to prevent leakage of biometric information and impersonation. In particular, the definition captures well-known and practical attacks including replay attacks and hill-climbing attacks. We prove that the proposed scheme achieves all the requirements if the additive homomorphic encryption scheme used in the scheme satisfies some additional properties. As far as we know, the proposed scheme is the first one that satisfies all the requirements. Also, we show that modified Elgamal cryptosystem satisfies all the properties under the decisional Diffie-Hellman assumption.
Yong Qiang JIA Lu GAN Hong Shu LIAO
Radio signals show characteristics of minute differences, which result from various idiosyncratic hardware properties between different radio emitters. A robust detector based on exponentially weighted distances is proposed to detect the exact reference instants of the burst communication signals. Based on the exact detection of the reference instant, in which the radio emitter finishes the power-up ramp and enters the first symbol of its preamble, the features of the radio fingerprint can be extracted from the transient signal section and the steady-state signal section for radiometric identification. Experiments on real data sets demonstrate that the proposed method not only has a higher accuracy that outperforms correlation-based detection, but also a better robustness against noise. The comparison results of different detectors for radiometric identification indicate that the proposed detector can improve the classification accuracy of radiometric identification.
Yumehisa HAGA Yuta TAKATA Mitsuaki AKIYAMA Tatsuya MORI
Web tracking is widely used as a means to track user's behavior on websites. While web tracking provides new opportunities of e-commerce, it also includes certain risks such as privacy infringement. Therefore, analyzing such risks in the wild Internet is meaningful to make the user's privacy transparent. This work aims to understand how the web tracking has been adopted to prominent websites. We also aim to understand their resilience to the ad-blocking techniques. Web tracking-enabled websites collect the information called the web browser fingerprints, which can be used to identify users. We develop a scalable system that can detect fingerprinting by using both dynamic and static analyses. If a tracking site makes use of many and strong fingerprints, the site is likely resilient to the ad-blocking techniques. We also analyze the connectivity of the third-party tracking sites, which are linked from multiple websites. The link analysis allows us to extract the group of associated tracking sites and understand how influential these sites are. Based on the analyses of 100,000 websites, we quantify the potential risks of the web tracking-enabled websites. We reveal that there are 226 websites that adopt fingerprints that cannot be detected with the most of off-the-shelf anti-tracking tools. We also reveal that a major, resilient third-party tracking site is linked to 50.0 % of the top-100,000 popular websites.
Zhiqiang HU Dongju LI Tsuyoshi ISSHIKI Hiroaki KUNIEDA
Narrow swipe sensor has been widely used in embedded systems such as smart-phone. However, the size of captured image is much smaller than that obtained by the traditional area sensor. Therefore, the limited template coverage is the performance bottleneck of such kind of systems. Aiming to increase the geometry coverage of templates, a novel fingerprint template feature synthesis scheme is proposed in the present study. This method could synthesis multiple input fingerprints into a wider template by clustering the minutiae descriptors. The proposed method consists of two modules. Firstly, a user behavior-based Registration Pattern Inspection (RPI) algorithm is proposed to select the qualified candidates. Secondly, an iterative clustering algorithm Modified Fuzzy C-Means (MFCM) is proposed to process the large amount of minutiae descriptors and then generate the final template. Experiments conducted over swipe fingerprint database validate that this innovative method gives rise to significant improvements in reducing FRR (False Reject Rate) and EER (Equal Error Rate).
Zhiqiang HU Dongju LI Tsuyoshi ISSHIKI Hiroaki KUNIEDA
Narrow swipe sensor based systems have drawn more and more attention in recent years. However, the size of captured image is significantly smaller than that obtained from the traditional area fingerprint sensor. Under this condition the available minutiae number is also limited. Therefore, only employing minutiae with the standard associated feature can hardly achieve high verification accuracy. To solve this problem, we present a novel Hybrid Minutiae Descriptor (HMD) which consists of two modules. The first one: Minutiae Ridge-Valley Orientation Descriptor captures the orientation information around minutia and also the trace points located at associated ridge and valley. The second one: Gabor Binary Code extracts and codes the image patch around minutiae. The proposed HMD enhances the representation capability of minutiae feature, and can be matched very efficiently. Experiments conducted over public databases and the database captured by the narrow swipe sensor show that this innovative method gives rise to significant improvements in reducing FRR (False Reject Rate) and EER (Equal Error Rate).
IDMs are getting more effective and secure with biometric recognition and more privacy-preserving with advanced cryptosystems. In order to meet privacy and security needs of an IDM, the cryptographic background should rely on reliable random number generation. In this study, a Biometric Random Number Generator (BRNG) is proposed which plays a crucial role in a typical cryptosystem. The proposed novel approach extracts the high-frequency information in biometric signal which is associated with uncertainty existing in nature of biometrics. This bio-uncertainty, utilized as an entropy source, may be caused by sensory noise, environmental changes, position of the biometric trait, accessories worn, etc. The filtered nondeterministic information is then utilized by a postprocessing technique to obtain a random number set fulfilling the NIST 800-22 statistical randomness criteria. The proposed technique presents random number sequences without need of an additional hardware.
Audio hashing has been successfully employed for protection, management, and indexing of digital music archives. For a reliable audio hashing system, improving hash matching accuracy is crucial. In this paper, we try to improve a binary audio hash matching performance by utilizing auxiliary information, resilience mask, which is obtained while constructing hash DB. The resilience mask contains reliability information of each hash bit. We propose a new type of resilience mask by considering spectrum scaling and additive noise distortions. Experimental results show that the proposed resilience mask is effective in improving hash matching performance.
Yuyang HUANG Li-Ta HSU Yanlei GU Haitao WANG Shunsuke KAMIJO
The limitation of the GPS in urban canyon has led to the rapid development of Wi-Fi positioning system (WPS). The fingerprint-based WPS could be divided into calibration and positioning stages. In calibration stage, several grid points (GPs) are selected, and their position tags and featured access points (APs) are collected to build fingerprint database. In positioning stage, real time measurement of APs are compared with the feature of each GP in the database. The k weighted nearest neighbors (KWNN) algorithm is used as pattern matching algorithm to estimate the final positioning result. However, the performance of outdoor fingerprint-based WPS is not good enough for pedestrian navigation. The main challenge is to build a robust fingerprint database. The received number of APs in outdoor environments has large variation. In addition, positioning result estimated by GPS receiver is used as position tag of each GP to automatically build the fingerprint database. This paper studies the lifecycle of fingerprint database in outdoor environment. We also shows that using long time collected data to build database could improve the positioning accuracy. Moreover, a new 3D-GNSS (3D building models aided GNSS) positioning method is used to provide accurate position tags. In this paper, the fingerprint-based WPS has been developed in an outdoor environment near the center of Tokyo city. The proposed WPS can achieve around 17 meters positioning accuracy in urban canyon.
Shutchon PREMCHAISAWATT Nararat RUANGCHAIJATUPON
In this work, the novel fingerprinting evaluation parameter, which is called the punishment cost, is proposed. This parameter can be calculated from the designed matrix, the punishment matrix, and the confusion matrix. The punishment cost can describe how well the result of positioning is in the designated grid or not, by which the conventional parameter, the accuracy, cannot describe. The experiment is done with real measured data on weekdays and weekends. The results are considered in terms of accuracy and the punishment cost. Three well-known machine learning algorithms, i.e. Decision Tree, k-Nearest Neighbors, and Artificial Neural Network, are verified in fingerprinting positioning. In experimental environment, Decision Tree can perform well on the data from weekends whereas the performance is underrated on the data from weekdays. The k-Nearest Neighbors has proper punishment costs, even though it has lower accuracy than that of Artificial Neural Network, which has moderate accuracies but lower punishment costs. Therefore, other criteria should be considered in order to select the algorithm for indoor positioning. In addition, punishment cost can facilitate the conversion spot positioning to floor positioning without data modification.
Yuji KAMIYA Toru NAGURA Shigeki KAWAI Tsuneo NAKATA
In this paper, we propose an infrastructure-free precise positioning system by utilizing a variation of received radio broadcast signal strength against vehicle travel as fingerprints of road segments. Use of broadcast wave is considered advantageous in deployment cost and sample density that affects measurement reliability, compared to communication medium such as 802.11p-based V2X radio used in our previous paper. We also present preliminary experimental results that indicate potential of positioning at 20cm accuracy by using reception information of two FM radio channels broadcast from a station about 20km away from the test track
Based upon the Kerckhoffs' principle, illegal users can get to know the embedding and detection algorithms except for a secret key. Then, it is possible to access to a host signal which may be selected from frequency components of a digital content for embedding watermark signal. Especially for a fingerprinting scheme which embeds user's information as a watermark, the selected components can be easily found by the observation of differently watermarked copies of a same content. In this scenario, it is reported that some non-linear collusion attacks will be able to remove/modify the embedded signal. In this paper, we study the security analysis of our previously proposed spread-spectrum (SS) fingerprinting scheme[1], [2] under the Kerckhoffs' principle, and reveal its drawback when an SS sequence is embedded in a color image. If non-linear collusion attacks are performed only to the components selected for embedding, the traceability is greatly degraded while the pirated copy keeps high quality after the attacks. We also propose a simple countermeasure to enhance the robustness against non-linear collusion attacks as well as possible signal processing attacks for the underlying watermarking method.
Masayuki OCHIAI Hiroyuki HATANO Masahiro FUJII Atsushi ITO Yu WATANABE
Incoming GPS signals through windows can be often observed indoors. However, conventional indoor positioning systems do not use Global Positioning System (GPS) generally because the signals may come in NLOS (Non Line of Sight). In this paper, we propose a positioning method by fingerprinting based on the incoming GPS signals.
Azril HANIZ Gia Khanh TRAN Ryosuke IWATA Kei SAKAGUCHI Jun-ichi TAKADA Daisuke HAYASHI Toshihiro YAMAGUCHI Shintaro ARATA
Conventional localization techniques such as triangulation and multilateration are not reliable in non-line-of-sight (NLOS) environments such as dense urban areas. Although fingerprint-based localization techniques have been proposed to solve this problem, we may face difficulties because we do not know the parameters of the illegal radio when creating the fingerprint database. This paper proposes a novel technique to localize illegal radios in an urban environment by interpolating the channel impulse responses stored as fingerprints in a database. The proposed interpolation technique consists of interpolation in the bandwidth (delay), frequency and spatial domains. A localization algorithm that minimizes the squared error criterion is employed in this paper, and the proposed technique is evaluated through Monte Carlo simulations using location fingerprints obtained from ray-tracing simulations. Results show that utilizing an interpolated fingerprint database is advantageous in such scenarios.
Genming DING Zhenhui TAN Jinsong WU Jinshan ZENG Lingwen ZHANG
The indoor fingerprinting localization technology has received more attention in recent years due to the increasing demand of the indoor location based services (LBSs). However, a high quality of the LBS requires a positioning solution with high accuracy and low computational complexity. The particle swarm optimization (PSO) technique, which emulates the social behavior of a flock of birds to search for the optimal solution of a special problem, can provide attractive performance in terms of accuracy, computational efficiency and convergence rate. In this paper, we adopt the PSO algorithm to estimate the location information. First, our system establishes a Bayesian-rule based objective function. It then applies PSO to identify the optimal solution. We also propose a hybrid access point (AP) selection method to improve the accuracy, and analyze the effects of the number and the initial positions of particles on the localization performance. In order to mitigate the estimation error, we use the Kalman Filter to update the initial estimated location via the PSO algorithm to track the trail of the mobile user. Our analysis indicates that our method can reduce the computational complexity and improve the real-time performance. Numerous experiments also demonstrate that our proposed localization and tracking system achieve higher localization accuracy than existing systems.
Hoang-Quoc NGUYEN-SON Minh-Triet TRAN Hiroshi YOSHIURA Noboru SONEHARA Isao ECHIZEN
While online social networking is a popular way for people to share information, it carries the risk of unintentionally disclosing personal information. One way to reduce this risk is to anonymize personal information in messages before they are posted. Furthermore, if personal information is somehow disclosed, the person who disclosed it should be identifiable. Several methods developed for anonymizing personal information in natural language text simply remove sensitive phrases, making the anonymized text message unnatural. Other methods change the message by using synonymization or structural alteration to create fingerprints for detecting disclosure, but they do not support the creation of a sufficient number of fingerprints for friends of an online social network user. We have developed a system for anonymizing personal information in text messages that generalizes sensitive phrases. It also creates a sufficient number of fingerprints of a message by using synonyms so that, if personal information is revealed online, the person who revealed it can be identified. A distribution metric is used to ensure that the degree of anonymization is appropriate for each group of friends. A threshold is used to improve the naturalness of the fingerprinted messages so that they do not catch the attention of attackers. Evaluation using about 55,000 personal tweets in English demonstrated that our system creates sufficiently natural fingerprinted messages for friends and groups of friends. The practicality of the system was demonstrated by creating a web application for controlling messages posted on Facebook.
Genming DING Zhenhui TAN Jinsong WU Jinbao ZHANG
The increasing demand of indoor location based service (LBS) has promoted the development of localization techniques. As an important alternative, fingerprinting localization technique can achieve higher localization accuracy than traditional trilateration and triangulation algorithms. However, it is computational expensive to construct the fingerprint database in the offline phase, which limits its applications. In this paper, we propose an efficient indoor positioning system that uses a new empirical propagation model, called regional propagation model (RPM), which is based on the cluster based propagation model theory. The system first collects the sparse fingerprints at some certain reference points (RPs) in the whole testing scenario. Then affinity propagation clustering algorithm operates on the sparse fingerprints to automatically divide the whole scenario into several clusters or sub-regions. The parameters of RPM are obtained in the next step and are further used to recover the entire fingerprint database. Finally, the location estimation is obtained through the weighted k-nearest neighbor algorithm (WkNN) in the online localization phase. We also theoretically analyze the localization accuracy of the proposed algorithm. The numerical results demonstrate that the proposed propagation model can predict the received signal strength (RSS) values more accurately than other models. Furthermore, experiments also show that the proposed positioning system achieves higher localization accuracy than other existing systems while cutting workload of fingerprint calibration by more than 50% in the offline phase.
Chamal SAPUMOHOTTI Mohamad-Yusoff ALIAS Su-Wei TAN
Location fingerprinting utilizes periodic beacons transmitted by Wireless Local Area Network (WLAN) Access Points (APs) to provide localization in indoor environments. Currently no method is able to quantify the effectiveness of localization information provided by individual APs. Such a metric would enable the optimal placement of new APs as well as eliminating redundant APs so as to reduce the resources consumed by indoor localization software in client devices. This paper proposes LocationInfo, a metric that utilizes walk test data for quantifying the localization efficacy of APs. The performance of LocationInfo is evaluated using two experimental settings. First, it is used for identifying the optimal location for new APs. Second, it is used for filtering out excess APs in a crowded WLAN environment. In both experiments, LocationInfo outperforms existing metrics.