hh.sePublications
Change search
Refine search result
1234567 1 - 50 of 1143
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbas, Taimoor
    et al.
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    Sjöberg, Katrin
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kåredal, Johan
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    Tufvesson, Fredrik
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    A Measurement Based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations2015In: International Journal of Antennas and Propagation, ISSN 1687-5869, E-ISSN 1687-5877, article id 190607Article in journal (Refereed)
    Abstract [en]

    The vehicle-to-vehicle (V2V) propagation channel has significant implications on the design and performance of novel communication protocols for vehicular ad hoc networks (VANETs). Extensive research efforts have been made to develop V2V channel models to be implemented in advanced VANET system simulators for performance evaluation. The impact of shadowing caused by other vehicles has, however, largely been neglected in most of the models, as well as in the system simulations. In this paper we present a shadow fading model targeting system simulations based on real measurements performed in urban and highway scenarios. The measurement data is separated into three categories, line-of-sight (LOS), obstructed line-of-sight (OLOS) by vehicles, and non-line-of-sight due to buildings, with the help of video information recorded during the measurements. It is observed that vehicles obstructing the LOS induce an additional average attenuation of about 10 dB in the received signal power. An approach to incorporate the LOS/OLOS model into existing VANET simulators is also provided. Finally, system level VANET simulation results are presented, showing the difference between the LOS/OLOS model and a channel model based on Nakagami-m fading.

  • 2.
    Abboud, Mohamad Moulham
    Halmstad University, School of Business, Engineering and Science, Biological and Environmental Systems (BLESS), Energy Science.
    Simulation of 3ph induction motor in Matlab with VVVF starting method2016Independent thesis Advanced level (degree of Master (One Year)), 40 credits / 60 HE creditsStudent thesis
    Abstract [en]

    Nowadays, three-phase induction motors are widely used on industrial and other types of processes. Therefore, accurate knowledge of an induction motor performance is very essential to have an idea of its operation conditions. This study is a sequel of a previous one, where Direct and Soft starting methods of three-phase motors has been simulated and compared. As in the previous study, the theory behind this one is based on representing the real motor by aset of equations and values in Matlab, forming a corresponding idealistic motor in a way where all the physical effects are similar. The motor is started under three different frequencies in the VVVF method using supporting simulation of the current, torque, speed,efficiency and power factor curves. The results of the three starting methods are then discussed and compared.

  • 3.
    Abramson, Norman
    et al.
    Department of Electrical Engineering, University of Hawaii, USA.
    Sacchi, Claudio
    Information Engineering and Computer Science Department, University of Trento, Italy.
    Bellalta, Boris
    Department of Information and Communication Technologies, Universitat Pompeu Fabra, Spain.
    Vinel, Alexey
    Saint-Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Russia.
    Multiple access communications in future-generation wireless networks2012In: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, p. Art nr 45-Article in journal (Refereed)
  • 4.
    Adekolu, Adekunle Matthew
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Khan, Hasan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Neelam, Neelam
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Network Monitoring2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Managing a network is a very big functional area along with performance, devicemaintenance, security, performance, monitoring, troubleshooting, plan of changeand etc. Among all of these monitoring plays a vital role. It can cover a wide area ofnetwork management. Monitoring is the only way to find out whether the networkis functioning according to plan. In order to know what is happening in a network,how its functioning at any given time, a network should have a logging system. Nowa day this logging activity is done by Network monitoring tool. It lets user know thestatus of the network at any given time. This logging can give the user a wide viewwhat can't be seen in general. For example the statistics of a week or month, even ayear. Monitoring is a very important issue in an organization network which aroseover the time.In this project we are going to implement some well known network monitoringtools in a real world scenario and we will investigate how this monitoring tool canhelp network administrators to monitor a network . Moreover, what kind ofinformation we can extract from a network by these tools.The purpose of this project is to get an overall idea about the importance of networkmonitoring and what are the facts need to be considered while monitoring anetwork. There are lots of pros and cons in monitoring a network. So choosing theappropriate tool for monitoring is very important. Monitoring a network with theleast effects on network performance is the best solution in case of monitoring.The outcome from these monitoring tools is a wide range of useful data andintegration of these data produces the status of the network at any give time.Moreover these data will be logged to create a statistical report. Different users suchas a network admin and organization can use this information from differentperspectives to make a network more efficient for users.

  • 5.
    Aftab, Mohammad Adnan
    Halmstad University, School of Business, Engineering and Science.
    Biofuel, An alternative source for jet fuel in Aviation2017Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The transport industry is one of the fastest growing industries with the sector playing a significant role in negative impact on global warming and pollution through the emission of greenhouse gases. Aviation in particular, has enjoyed growth especially in the few decades. New airlines and aircraft manufacturers are coming up with different innovations and technologies to ensure they make the best possible environmentally friendly aircraft. The new main area of focus has been on how to come up with fuel that will reduce the greenhouse gas-emissions. The stakeholders in the same effort include developed nations like the United States, United Kingdom, Russia, France, Germany, and Canada among others. Energy providers as well as jet fuel suppliers are also making efforts to conserve the environment. The purpose of this thesis is to explore the area of biofuel in aviation by looking into various stakeholders involved in the efforts of the transition from fossil fuel to biofuel. The conclusion of this thesis is that biofuels are viable options in the aviation industries since there have been positive results in the tests made. 

  • 6.
    Agelis, Sacki
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Jonsson, Magnus
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Visualizing the Potential of Reconfigurable Shuffle-Patterns in Optoelectronic Routers by the Use of MOEMS2004In: Proceedings of the IASTED International Conference Communication Systems and Networks / [ed] Salvador C.E.P., Calgary, Canada: ACTA Press, 2004, p. 148-154Conference paper (Refereed)
    Abstract [en]

    A reconfigurable high performance multistage router architecture is presented and simulated. The router backbone network is an optical shuffle exchange network that has the power of reconfigurability through the use of micro-optical-electrical mechanical systems (MOEMS). The router is subjected to different application classes. The application classes have different characteristics in terms of symmetric/asymmetric traffic properties. We compare our reconfigurable shuffle-pattern for all three application classes for the specified router architecture.

  • 7.
    Ahmadi, Lina
    Halmstad University, School of Information Technology.
    Green Driving Application: Eco Driving2016Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Eco-driving has acquired great importance in recent years because it is a way to reduce energy consumption that can be applied to any type of vehicle. However, for these rules to be applied requires a process of continuous learning and motivation. For this reason many eco-driving assistants have emerged.

    This paper presents Green Driving, a driver safety app for Android that detects inattentive driving behaviors and gives corresponding feedback to drivers, scoring their driving and alerting them in case their behaviors are unsafe.  It’s about changing a person’s driving behavior by providing some kind of advice to the driver.  I have worked on an algorithm that is meant to reduce the fuel consumption of users. The algorithm is deployed in an android application.

    This application “Green Driving” is aimed at users with cars. It is basically like an assistant, suggesting the user when he should make the right gear changes, when to increase/decrease speed and avoids hard braking and rapid acceleration and etc. It is in order to drive economically, ecologic and in turn save money and safety. This is a smart way of letting a user drive economically and ecologic since almost everyone has an Android smartphone now. 

  • 8.
    Ahmed, Rizwan
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Abbas, Shahid
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Electrical and Optical Characteristics of InP Nanowires based p-i-n Photodetectors2010Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Photodetectors are a kind of semiconductor devices that convert incoming light to an electrical signal. Photodetectors are classified based on their different structure, fabrication technology, applications and different sensitivity. Infrared photodetectors are widely used in many applications such as night vision, thermal cameras, remote temperature sensing, and medical diagnosis etc.

     

    All detectors have material inside that is sensitive to incoming light. It will absorb the photons and, if the incoming photons have enough energy, electrons will be excited to higher energy levels and if these electrons are free to move, under the effect of an external electric field, a photocurrent is generated.

     

    In this project Fourier Transform Infrared (FT-IR) Spectroscopy is used to investigate a new kind of photodiodes that are based on self-assembled semiconductor nanowires (NWs) which are grown directly on the substrate without any epi-layer. The spectrally resolved photocurrent (at different applied biases) and IV curves (in darkness and illumination) for different temperatures have been studied respectively. Polarization effects (at low and high Temperatures) have been investigated.  The experiments are conducted for different samples with high concentration of NWs as well as with lower concentration of NWs in the temperature range from 78 K (-195ºC) to 300 (27ºC). These photodiodes are designed to work in near infrared (NIR) spectral range.

     

    The results show that the NW photodetectors indeed are promising devices with fairly high break down voltage, change of photocurrent spectra with polarized light, low and constant reverse saturation current (Is). The impact of different polarized light on photocurrent spectra has been investigated and an attempt has been made to clarify the observed double peak of InP photocurrent spectrum. Our investigations also include a comparison to a conventional planar InP p-i-n photodetector.

     

  • 9.
    Akinola, Azeez Paul
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    chong, zhang
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    Since the introduction of networks, they have been used amongst home users, companies and organizations and most damage on the network is due to inappropriate security configurations. To secure networks, a protocol suite can be used to encrypt and authenticate all IP packets of a session. Therefore, this report will include the advantages and possible solution of some techniques used to offer increased network security such as scalability and data confidentiality. Captures of traffic sent using the two security techniques, IPSec/VPN and GRE-Tunnel will be monitored. The objective behind this project is to configure a network with these two different tunneling techniques and compare the security and network performance. The report also describes the security problems encountered by networks such as the ignorance of network users, vulnerabilities and the security of the devices.IPSecis a standard security protocol solution for TCP/IP, and it provides security through authentication, encryption and data integrity. GRE encapsulates packets and create a logical hub-and spoke topology of virtual point-to-point connections. The Jperf-tool is used to measure network performance and show specific details while another tool, Wireshark is used to analyze the information captured during transmission of data sent using IPSEC and GRE. The comparison further finds that IPSec-tunnel technique makes data transfers very secure but causes network performance disadvantages in comparison to a GRE solution.

  • 10.
    Akinola, Azeez Paul
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Zhang, Chong
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Evaluate Security on the Internet Cafe2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists.The aim of security monitoring and preventing the network from cyber threats requires vigilance over the network equipment. The case study of this thesis is to provide the possible solution to the problems encountered by the namely network users such as: Internet Game Center (Centrum Halmstad, Sweden) and, the Blueville Internet Cafe (Ede, Nigeria).Our research and information collected over the telephone and a visit at the nearest office. We concluded that both companies mentioned above experienced similar cyber threats. The two companies have internal and external threats such as accessing the network via ssh by using it brute force attack, network war-driver, the installation of spyware, password sniffer, viruses, SQL injection and PHP attacks (web attacks) on the networks. The cyber threats virus and spyware are among the big internet threat to users, organization and companies.We carry out experiments in the lab to tests for threats such as brute force (ssh) attack, password sniffer and war-driver in the Wireless environment. From the results, we are able to the select WPA2 using 802.1x as the best possible way to limit and reduce the strength of cyber-attacks, and as a suggested solution to the namely café problems in our report. We also list different suggestion and solution to the cyber café attacks from our research papers and information gathers from different sources such as library, internet, seminar and textbooks.

  • 11.
    Al Hayani, Musab
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Modeling Bus Load on CAN2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The existence of high load and latency in the CAN bus network would indeed lead to a situation where a given message crosses its deadline; this situation would disturb the continuity of the required service as well as activating fault codes due to delay of message delivery, which might lead to system failure.

    The outcome and goal of this thesis is to research and formulate methods to determine and model busload and latencies, by determining parameters such as alpha and breakdown utilization, which are considered as indications to the start of network breakdown when a given message in a dataset start to introduce latency by crossing its deadline which are totally prohibited in critical real time communications.

    The final goal of this master thesis is to develop a TOOL for calculating, modeling, determining and visualizing worst case busload, throughput, networks’ breakdown points and worst case latency in Scania CAN bus networks which is based on the J1939 protocol.

    SCANLA (The developed CAN busload analyzer tool in this thesis) is running as an executable application and uses a Graphical User Interface as a human-computer interface (i.e., a way for humans to interact with the tool) that useswindows,icons and menus and which can be manipulated by a mouse.

  • 12.
    Alam, Ashraful
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Parallelization of the Estimation Algorithm of the 3D Structure Tensor2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis work provides the implementation of 3D structure tensor on a Massively Parallel Processor Array (MPPA), Ambric 2045.

     

    The 3D structure tensor algorithm is often used in image processing applications to compute the optical flow or to detect local 3D structures and their directions. The 3D structure tensor algorithm (3D-STA) consists of three main parts: gradient, tensor and smoothing. This algorithm is computationally expensive due to many multiplications and additions which are required to calculate the gradient (edge), the tensor and to smooth every pixel of the image. This is why this algorithm is very slow to run on a single processor. Therefore, it is important to make it parallel for high performance computation.

     

    This thesis provides two parallel implementations of 3D-STA; namely coarse-grained parallelism and fine-grained parallelism. Ambric has 336 processors. Only 49 processors are used in coarse-grained implementation and 165 processors are used in fine-grained implementation. The performance of the two implementations is measured using a video stream input, consisting of a sequence of images of size 20x256x256. The performance of the coarse-grained parallelism implementation is 25 frames per second (fps) and the one of the fine-grained parallelism implementation is 100 fps. Thus the fine-grained version is four time faster than the coarse-grained one.

     

    Additionally, the results are compared with the result of the Matlab implementation, running on Intel(R) Core 2 duo @2.10 GHz processor and also compared with another parallel optical flow implementation, in terms of speed and efficiency. The coarse-grained implementation is 58 times faster than the Matlab implementation and it achieves approximately half of the performance of the other parallel optical flow implementation. On the other hand, the fine-grained implementation is 230 times faster than the Matlab implementation and more than twice as (100/43) fast as the other parallel optical flow implementation.

     

    These performance results are satisfactory and the results that our parallel implementations can be considered for real-time applications.

     

  • 13.
    Alam, Ashraful
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ul-Abdin, Zain
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Svensson, Bertil
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Parallelization of the Estimation Algorithm of the 3D Structure Tensor2012In: 2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012 / [ed] Peter Athanas, René Cumplido & Eduardo de la Torre, Piscataway, N.J.: IEEE Press, 2012, article id 6416771Conference paper (Refereed)
    Abstract [en]

    The three dimensional structure tensor algorithm (3D-STA) is often used in image processing applications to compute the optical flow or to detect local 3D structures and their directions. This algorithm is computationally expensive due to many computations that are required to calculate the gradient, the tensor, and to smooth every pixel of the image frames. Therefore, it is important to parallelize the implementation to achieve high performance. In this paper we present two parallel implementations of 3D-STA; namely moderately parallelized and highly parallelized implementation, on a massively parallel reconfigurable array. Finally, we evaluate the performance of the generated code and results are compared with another optical flow implementation. The throughput achieved by the moderately parallelized implementation is approximately half of the throughput of the Optical flow implementation, whereas the highly parallelized implementation results in a 2x gain in throughput as compared to the optical flow implementation. © 2012 IEEE.

  • 14.
    Albayrak, Aras
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Automatic Pose and Position Estimation by Using Spiral Codes2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This master thesis is about providing the implementation of synthesis, detection of spiral symbols and estimating the pan/tilt angle and position by using camera calibration. The focus is however on the latter, the estimation of parameters of localization.

    Spiral symbols are used to be able to give an object an identity as well as to locate it. Due to the spiral symbol´s characteristic shape, we can use the generalized structure tensor (GST) algorithm which is particularly efficient to detect different members of the spiral family. Once we detect spirals, we know the position and identity parameters of the spirals within an apriori known geometric configuration (on a sheet of paper). In turn, this information can be used to estimate the 3D-position and orientation of the object on which spirals are attached using a camera calibration method.

     

    This thesis provides an insight into how automatic detection of spirals attached on a sheet of paper, and from this, automatic deduction of position and pose parameters of the sheet, can be achieved by using a network camera. GST algorithm has an advantage of running the processes of detection of spirals efficiently w.r.t detection performance and computational resources because it uses a spiral image model well adapted to spiral spatial frequency characteristic. We report results on how detection is affected by zoom parameters of the network camera, as well as by the GST parameters; such as filter size. After all spirals centers are located and identified w.r.t. their twist/bending parameter, a flexible technique for camera calibration, proposed by Zhengyou Zhang implemented in Matlab within the present study, is performed. The performance of the position and pose estimation in 3D is reported.

    The main conclusion is, we have reasonable surface angle estimations for images which were taken by a WLAN network camera in different conditions such as different illumination and different distances. 

  • 15.
    Albinsson, John
    et al.
    Lund Univ, Dept Biomed Engn, S-22100 Lund, Sweden..
    Brorsson, Sofia
    Halmstad University, School of Business, Engineering and Science, The Rydberg Laboratory for Applied Sciences (RLAS).
    Rydén Ahlgren, Åsa
    Lund Univ, Dept Clin Sci, Clin Physiol & Nucl Med Unit, Malmo, Sweden..
    Cinthio, Magnus
    Lund Univ, Dept Biomed Engn, S-22100 Lund, Sweden..
    Improved tracking performance of lagrangian block-matching methodologies using block expansion in the time domain: In silico, phantom and invivo evaluations2014In: Ultrasound in Medicine and Biology, ISSN 0301-5629, E-ISSN 1879-291X, Vol. 40, no 10, p. 2508-2520Article in journal (Refereed)
    Abstract [en]

    The aim of this study was to evaluate tracking performance when an extra reference block is added to a basic block-matching method, where the two reference blocks originate from two consecutive ultrasound frames. The use of an extra reference block was evaluated for two putative benefits: (i) an increase in tracking performance while maintaining the size of the reference blocks, evaluated using in silico and phantom cine loops; (ii) a reduction in the size of the reference blocks while maintaining the tracking performance, evaluated using in vivo cine loops of the common carotid artery where the longitudinal movement of the wall was estimated. The results indicated that tracking accuracy improved (mean - 48%, p<0.005 [in silico]; mean - 43%, p<0.01 [phantom]), and there was a reduction in size of the reference blocks while maintaining tracking performance (mean - 19%, p<0.01 [in vivo]). This novel method will facilitate further exploration of the longitudinal movement of the arterial wall. (C) 2014 World Federation for Ultrasound in Medicine & Biology.

  • 16.
    Alendal, Gunnar
    et al.
    NTNU, Gjøvik, Norway.
    Dyrkolbotn, Geir Olav
    NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
    Axelsson, Stefan
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode2018In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, no Suppl., p. S60-S67Article in journal (Refereed)
    Abstract [en]

    The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

  • 17.
    Alhamarna, Ahmed
    et al.
    Halmstad University, School of Information Technology.
    Kjellgren, Simon
    Halmstad University, School of Information Technology.
    IDENTIFIERING AV ELEKTRONIKSKROT2017Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report is the result of a survey carried out by two students at Halmstad University. The study was conducted at the request of the recycling company, with the purpose to explore opportunities for streamlining the screening pro- cess of electronic waste products. The question that was asked was if RFID could be used for identification of the scrap. The project members started their work to investigate if RFID was the best identification method where the advantages and disadvantages of various automated systems were com- pared. The conclusion drawn was that RFID could be a viable solution in the future, provided that manufacturers of electronics integrate RFID tags into their products. Given that increasingly more producers are using RFID to locate and identify their products during production and the falling price of passive tags, it is possible that labeling products with RFID tags could become a standard, both for more efficient logistics and a more efficient re- cycling process. 

  • 18.
    Ali, Mustafa
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Abid, Hussain
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Wireless and Industrial Network2013Independent thesis Basic level (degree of Bachelor), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [en]

    The purpose of this report is to implement the wireless network in a company withtwo different sites which is located in Riga and Malmo. The main task of this reportis to implement and configure wireless industrial network. This report is based oninformation we gathered from the ABC Company about their requirements for awireless network.Requirements of this ABC Company is focusing on their infrastructure planning,security and implementing them. Benefits and drawbacks of industrial wirelessnetwork will be described briefly in this report to get some idea how ABC Companywill face the problem when they will implement their wireless network.

  • 19.
    Al-imarah, Amena
    et al.
    Halmstad University, School of Business, Engineering and Science.
    Stenberg, Elin
    Halmstad University, School of Business, Engineering and Science.
    Tillämpning av batterilager som energitjänsten lastutjämnare: En studie om batterilagring för en medelstor abonnent i Varberg Energis elnät2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis, is a study of battery energy storage and its use as energy source and smoothening of power fluctuation. Studies have been made as a systematic review and a quantitative study. The study has consisted of analysing the power characteristic from a supermarket in the city of Varberg during year 2015. The object has been to evaluate the energy storage and the power smoothing qualities. Therefore the battery energy storages characteristics have been evaluated in this systematic review. For the quantitative study, calculations of the energy storage sizes were made for two separate operation modes. The two different operation modes were named technical dimensioning and economic dimensioning. The function of the technical dimensioning was to smooth the power outlet from the grid, while the function of the economic dimensioning was to enable the supermarket to buy more energy during low-price hours. Based on monthly power characteristics, each dimensioning gave as a result two energy storage possibilities, one in medium and one in small size. The technical dimensioning resulted in battery energy storage of the sizes 617 kWh and 555kWh which is comparable to 7,1% and 5,8% of the daily energy usage of the supermarket. The economic dimensioning resulted in battery energy storage of the sizes 597 kWh and 233kWh which is comparable to 6,8% and 2,8% of the daily energy usage of the supermarket. For optimizing the economic savings, a variation of technical and economic operation mode are needed, depending on calculated power usage through the day and elspot prices. The study shows that a battery storage is difficult to finance. The calculated economic savings were estimated during ideal conditions and without power loss or loss in performance. As a conclusion from this study a battery storage may have a good payback if there are several energy services to be filled.

  • 20.
    Allgayer, Rodrigo
    et al.
    Electrical Engineering Department, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Muller, Ivan
    Electrical Engineering Department, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Pereira, Carlos
    Electrical Engineering Department, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Cavalcante, Andre
    Electronic and Telcomunication Department, Federal University of Amazonas (UFAM), Manaus, Brazil.
    Pignaton de Freitas, Edison
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Institute of Informatics, Federal University of Rio Grande do Sul (UFRGS), Porto Alegre, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Analysis of distributed control system using remote method invocation in wireless network2011In: IECON 2011 Proceedings: 37th Annual Conference of the IEEE Industrial Electronics Society, New York: IEEE, 2011, p. 346-351, article id 6119277Conference paper (Refereed)
    Abstract [en]

    This work presents the temporal analysis for a distributed differential control system for a mobile robot deployed on a wireless network using the SunSPOT platform. The system is programmed in Java and each of its part is executed in a distinct processor which cooperates via a wireless network. The communication between the network nodes is made by remote procedure calls, which are implemented by a minimum version of the Java RMI (mRMI), presented in this work. Simulation results are compared to experimental data acquired by the deployment of the system on real devices, the SunSPOTs. The comparisons reveal that the distributed solution presents fairly good results besides the inserted errors due to the wireless communication. © 2011 IEEE.

  • 21.
    Almgren, David
    et al.
    Halmstad University, School of Information Technology.
    Alshammari, Hussam
    Halmstad University, School of Information Technology.
    SmartBand Alert: Ett armband för säkerhet2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Safety is a topic that is frequently discussed and spoken of in today’s society. An enhanced security for each individual is something many strive for in various industries. One of these is how to make the public feel more secure when the person in question, for example, is out walking late at night. The goal of this bachelors thesis is thus to describe and explain the product that has been developed to get ordinary people to feel more secure wherever they are. The chosen solution for this issue was hence to develop the product SmartBand Alert which consists of two parts. A bracelet and an application for IOS and Android. This bracelet should, by certain connectivity cooperate with the user’s phone to notify family members and/or others when the person thinks or knows that he or she is in danger. These persons will be notified with information about the person who has activated the alarm to simply and easily take the necessary actions to help the person. The product is designed to be used by anyone regardless of gender, age, and other characteristics individuals may hold.

  • 22.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    A survey on periocular biometrics research2016In: Pattern Recognition Letters, ISSN 0167-8655, E-ISSN 1872-7344, Vol. 82, part 2, p. 92-105Article in journal (Refereed)
    Abstract [en]

    Periocular refers to the facial region in the vicinity of the eye, including eyelids, lashes and eyebrows. While face and irises have been extensively studied, the periocular region has emerged as a promising trait for unconstrained biometrics, following demands for increased robustness of face or iris systems. With a surprisingly high discrimination ability, this region can be easily obtained with existing setups for face and iris, and the requirement of user cooperation can be relaxed, thus facilitating the interaction with biometric systems. It is also available over a wide range of distances even when the iris texture cannot be reliably obtained (low resolution) or under partial face occlusion (close distances). Here, we review the state of the art in periocular biometrics research. A number of aspects are described, including: (i) existing databases, (ii) algorithms for periocular detection and/or segmentation, (iii) features employed for recognition, (iv) identification of the most discriminative regions of the periocular area, (v) comparison with iris and face modalities, (vi) soft-biometrics (gender/ethnicity classification), and (vii) impact of gender transformation and plastic surgery on the recognition accuracy. This work is expected to provide an insight of the most relevant issues in periocular biometrics, giving a comprehensive coverage of the existing literature and current state of the art. © 2015 Elsevier B.V. All rights reserved.

  • 23.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    An Overview of Periocular Biometrics2017In: Iris and Periocular Biometric Recognition / [ed] Christian Rathgeb & Christoph Busch, London: The Institution of Engineering and Technology , 2017, p. 29-53Chapter in book (Refereed)
    Abstract [en]

    Periocular biometrics specifically refers to the externally visible skin region of the face that surrounds the eye socket. Its utility is specially pronounced when the iris or the face cannot be properly acquired, being the ocular modality requiring the least constrained acquisition process. It appears over a wide range of distances, even under partial face occlusion (close distance) or low resolution iris (long distance), making it very suitable for unconstrained or uncooperative scenarios. It also avoids the need of iris segmentation, an issue in difficult images. In such situation, identifying a suspect where only the periocular region is visible is one of the toughest real-world challenges in biometrics. The richness of the periocular region in terms of identity is so high that the whole face can even be reconstructed only from images of the periocular region. The technological shift to mobile devices has also resulted in many identity-sensitive applications becoming prevalent on these devices.

  • 24.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Best Regions for Periocular Recognition with NIR and Visible Images2014In: 2014 IEEE International Conference on Image Processing (ICIP), Piscataway, NJ: IEEE Press, 2014, p. 4987-4991Conference paper (Refereed)
    Abstract [en]

    We evaluate the most useful regions for periocular recognition. For this purpose, we employ our periocular algorithm based on retinotopic sampling grids and Gabor analysis of the spectrum. We use both NIR and visible iris images. The best regions are selected via Sequential Forward Floating Selection (SFFS). The iris neighborhood (including sclera and eyelashes) is found as the best region with NIR data, while the surrounding skin texture (which is over-illuminated in NIR images) is the most discriminative region in visible range. To the best of our knowledge, only one work in the literature has evaluated the influence of different regions in the performance of periocular recognition algorithms. Our results are in the same line, despite the use of completely different matchers. We also evaluate an iris texture matcher, providing fusion results with our periocular system as well. © 2014 IEEE.

  • 25.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Biometric Recognition Using Periocular Images2013Conference paper (Other academic)
    Abstract [en]

    We present a new system for biometric recognition using periocular images based on retinotopic sampling grids and Gabor analysis of the local power spectrum at different frequencies and orientations. A number of aspects are studied, including: 1) grid adaptation to dimensions of the target eye vs. grids of constant size, 2) comparison between circular- and rectangular-shaped grids, 3) use of Gabor magnitude vs. phase vectors for recognition, and 4) rotation compensation between query and test images. Results show that our system achieves competitive verification rates compared with other periocular recognition approaches. We also show that top verification rates can be obtained without rotation compensation, thus allowing to remove this step for computational efficiency. Also, the performance is not affected substantially if we use a grid of fixed dimensions, or it is even better in certain situations, avoiding the need of accurate detection of the iris region.

  • 26.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Exploting Periocular and RGB Information in Fake Iris Detection2014In: 2014 37th International Conventionon Information and Communication Technology, Electronics and Microelectronics (MIPRO): 26 – 30 May 2014 Opatija, Croatia: Proceedings / [ed] Petar Biljanovic, Zeljko Butkovic, Karolj Skala, Stjepan Golubic, Marina Cicin-Sain, Vlado Sruk, Slobodan Ribaric, Stjepan Gros, Boris Vrdoljak, Mladen Mauher & Goran Cetusic, Rijeka: Croatian Society for Information and Communication Technology, Electronics and Microelectronics - MIPRO , 2014, p. 1354-1359Conference paper (Refereed)
    Abstract [en]

    Fake iris detection has been studied by several researchers. However, to date, the experimental setup has been limited to near-infrared (NIR) sensors, which provide grey-scale images. This work makes use of images captured in visible range with color (RGB) information. We employ Gray-Level CoOccurrence textural features and SVM classifiers for the task of fake iris detection. The best features are selected with the Sequential Forward Floating Selection (SFFS) algorithm. To the best of our knowledge, this is the first work evaluating spoofing attack using color iris images in visible range. Our results demonstrate that the use of features from the three color channels clearly outperform the accuracy obtained from the luminance (gray scale) image. Also, the R channel is found to be the best individual channel. Lastly, we analyze the effect of extracting features from selected (eye or periocular) regions only. The best performance is obtained when GLCM features are extracted from the whole image, highlighting that both the iris and the surrounding periocular region are relevant for fake iris detection. An added advantage is that no accurate iris segmentation is needed. This work is relevant due to the increasing prevalence of more relaxed scenarios where iris acquisition using NIR light is unfeasible (e.g. distant acquisition or mobile devices), which are putting high pressure in the development of algorithms capable of working with visible light. © 2014 MIPRO.

  • 27.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Eye Detection by Complex Filtering for Periocular Recognition2014In: 2nd International Workshop on Biometrics and Forensics (IWBF2014): Valletta, Malta (27-28th March 2014), Piscataway, NJ: IEEE Press, 2014, article id 6914250Conference paper (Refereed)
    Abstract [en]

    We present a novel system to localize the eye position based on symmetry filters. By using a 2D separable filter tuned to detect circular symmetries, detection is done with a few ID convolutions. The detected eye center is used as input to our periocular algorithm based on retinotopic sampling grids and Gabor analysis of the local power spectrum. This setup is evaluated with two databases of iris data, one acquired with a close-up NIR camera, and another in visible light with a web-cam. The periocular system shows high resilience to inaccuracies in the position of the detected eye center. The density of the sampling grid can also be reduced without sacrificing too much accuracy, allowing additional computational savings. We also evaluate an iris texture matcher based on ID Log-Gabor wavelets. Despite the poorer performance of the iris matcher with the webcam database, its fusion with the periocular system results in improved performance. ©2014 IEEE.

  • 28.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Fake Iris Detection: A Comparison Between Near-Infrared and Visible Images2014In: Proceedings: 10th International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2014 / [ed] Kokou Yetongnon, Albert Dipanda & Richard Chbeir, Piscataway, NJ: IEEE Computer Society, 2014, p. 546-553Conference paper (Refereed)
    Abstract [en]

    Fake iris detection has been studied so far using near-infrared sensors (NIR), which provide grey scale-images, i.e. With luminance information only. Here, we incorporate into the analysis images captured in visible range, with color information, and perform comparative experiments between the two types of data. We employ Gray-Level Cocurrence textural features and SVM classifiers. These features analyze various image properties related with contrast, pixel regularity, and pixel co-occurrence statistics. We select the best features with the Sequential Forward Floating Selection (SFFS) algorithm. We also study the effect of extracting features from selected (eye or periocular) regions only. Our experiments are done with fake samples obtained from printed images, which are then presented to the same sensor than the real ones. Results show that fake images captured in NIR range are easier to detect than visible images (even if we down sample NIR images to equate the average size of the iris region between the two databases). We also observe that the best performance with both sensors can be obtained with features extracted from the whole image, showing that not only the eye region, but also the surrounding periocular texture is relevant for fake iris detection. An additional source of improvement with the visible sensor also comes from the use of the three RGB channels, in comparison with the luminance image only. A further analysis also reveals that some features are best suited to one particular sensor than the others. © 2014 IEEE

  • 29.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Halmstad University submission to the First ICB Competition on Iris Recognition (ICIR2013)2013Other (Other academic)
  • 30.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Iris Boundaries Segmentation Using the Generalized Structure Tensor: A Study on the Effects of Image Degradation2012In: Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on, Piscataway, N.J.: IEEE Press, 2012, p. 426-431, article id 6374610Conference paper (Refereed)
    Abstract [en]

    We present a new iris segmentation algorithm based onthe Generalized Structure Tensor (GST), which also includesan eyelid detection step. It is compared with traditionalsegmentation systems based on Hough transformand integro-differential operators. Results are given usingthe CASIA-IrisV3-Interval database. Segmentation performanceunder different degrees of image defocus and motionblur is also evaluated. Reported results shows the effectivenessof the proposed algorithm, with similar performancethan the others in pupil detection, and clearly betterperformance for sclera detection for all levels of degradation.Verification results using 1D Log-Gabor wavelets arealso given, showing the benefits of the eyelids removal step.These results point out the validity of the GST as an alternativeto other iris segmentation systems. © 2012 IEEE.

  • 31.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Bigun, Josef
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Iris Segmentation Using the Generalized Structure Tensor2012Conference paper (Other academic)
    Abstract [en]

    We present a new iris segmentation algorithm based on the Generalized Structure Tensor (GST). We compare this approach with traditional iris segmentation systems based on Hough transform and integro-differential operators. Results are given using the CASIA-IrisV3-Interval database with respect to a segmentation made manually by a human expert. The proposed algorithm outperforms the baseline approaches, pointing out the validity of the GST as an alternative to classic iris segmentation systems. We also detect the cross positions between the eyelids and the outer iris boundary. Verification results using a publicly available iris recognition system based on 1D Log-Gabor wavelets are also given, showing the benefits of the eyelids removal step.

  • 32.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Near-infrared and visible-light periocular recognition with Gabor features using frequency-adaptive automatic eye detection2015In: IET Biometrics, ISSN 2047-4938, E-ISSN 2047-4946, Vol. 4, no 2, p. 74-89Article in journal (Refereed)
    Abstract [en]

    Periocular recognition has gained attention recently due to demands of increased robustness of face or iris in less controlled scenarios. We present a new system for eye detection based on complex symmetry filters, which has the advantage of not needing training. Also, separability of the filters allows faster detection via one-dimensional convolutions. This system is used as input to a periocular algorithm based on retinotopic sampling grids and Gabor spectrum decomposition. The evaluation framework is composed of six databases acquired both with near-infrared and visible sensors. The experimental setup is complemented with four iris matchers, used for fusion experiments. The eye detection system presented shows very high accuracy with near-infrared data, and a reasonable good accuracy with one visible database. Regarding the periocular system, it exhibits great robustness to small errors in locating the eye centre, as well as to scale changes of the input image. The density of the sampling grid can also be reduced without sacrificing accuracy. Lastly, despite the poorer performance of the iris matchers with visible data, fusion with the periocular system can provide an improvement of more than 20%. The six databases used have been manually annotated, with the annotation made publicly available. © The Institution of Engineering and Technology 2015.

  • 33.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Periocular Recognition Using Retinotopic Sampling and Gabor Decomposition2012In: Computer Vision – ECCV 2012: Workshops and demonstrations : Florence, Italy, October 7-13, 2012, Proceedings. Part II / [ed] Fusiello, Andrea; Murino, Vittorio; Cucchiara, Rita, Berlin: Springer, 2012, Vol. 7584, p. 309-318Conference paper (Refereed)
    Abstract [en]

    We present a new system for biometric recognition using periocular images based on retinotopic sampling grids and Gabor analysis of the local power spectrum. A number of aspects are studied, including: 1) grid adaptation to dimensions of the target eye vs. grids of constant size, 2) comparison between circular- and rectangular-shaped grids, 3) use of Gabor magnitude vs. phase vectors for recognition, 4) rotation compensation between query and test images, and 5) comparison with an iris machine expert. Results show that our system achieves competitive verification rates compared with other periocular recognition approaches. We also show that top verification rates can be obtained without rotation compensation, thus allowing to remove this step for computational efficiency. Also, the performance is not affected substantially if we use a grid of fixed dimensions, or it is even better in certain situations, avoiding the need of accurate detection of the iris region. © 2012 Springer-Verlag.

  • 34.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Quality Factors Affecting Iris Segmentation and Matching2013In: Proceedings – 2013 International Conference on Biometrics, ICB 2013 / [ed] Julian Fierrez, Ajay Kumar, Mayank Vatsa, Raymond Veldhuis & Javier Ortega-Garcia, Piscataway, N.J.: IEEE conference proceedings, 2013, article id 6613016Conference paper (Refereed)
    Abstract [en]

    Image degradations can affect the different processing steps of iris recognition systems. With several quality factors proposed for iris images, its specific effect in the segmentation accuracy is often obviated, with most of the efforts focused on its impact in the recognition accuracy. Accordingly, we evaluate the impact of 8 quality measures in the performance of iris segmentation. We use a database acquired with a close-up iris sensor and built-in quality checking process. Despite the latter, we report differences in behavior, with some measures clearly predicting the segmentation performance, while others giving inconclusive results. Recognition experiments with two matchers also show that segmentation and matching performance are not necessarily affected by the same factors. The resilience of one matcher to segmentation inaccuracies also suggest that segmentation errors due to low image quality are not necessarily revealed by the matcher, pointing out the importance of separate evaluation of the segmentation accuracy. © 2013 IEEE.

  • 35.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fairhurst, M.
    University of Kent, UK.
    Fierrez, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Automatic Measures for Predicting Performance in Off-line Signature2007Conference paper (Refereed)
    Abstract [en]

    Performance in terms of accuracy is one of the most important goal of a biometric system. Hence, having a measure which is able to predict the performance with respect to a particular sample of interest is specially useful, and can be exploited in a number of ways. In this paper, we present two automatic measures for predicting the performance in off-line signature verification. Results obtained on a sub-corpus of the MCYT signature database confirms a relationship between the proposed measures and system error rates measured in terms of Equal Error Rate (EER), False Acceptance Rate (FAR) and False Rejection Rate (FRR). © 2007 IEEE.

  • 36.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fairhurst, M.
    University of Kent, UK.
    Fierrez, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Impact of signature legibility and signature type in off-line signature verification2007In: Biometrics Symposium, 2007: [Baltimore, Maryland]: 11-13 Sept. 2007, Piscataway, N.J.: IEEE Press, 2007, Vol. 1, p. 1-6Conference paper (Refereed)
    Abstract [en]

    The performance of two popular approaches for off-line signature nature verification in terms of signature legibility and signature type is studied. We investigate experimentally if the knowledge of letters, syllables or name instances can help in the process of imitating a signature. Experimental results are given on a sub-corpus of the MCYT signature database for random and skilled forgeries. We use for our experiments two machine experts, one based on global image analysis and statistical distance measures, and the second based on local image analysis and Hidden Markov Models. Verification results are reported in terms of Equal Error Rate (EER), False Acceptance Rate (FAR) and False Rejection Rate (FRR). ©2007 IEEE.

  • 37.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben A.
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Eigen-patch iris super-resolution for iris recognition improvement2015In: 2015 23rd European Signal Processing Conference (EUSIPCO), Piscataway, NJ: IEEE Press, 2015, p. 76-80, article id 7362348Conference paper (Refereed)
    Abstract [en]

    Low image resolution will be a predominant factor in iris recognition systems as they evolve towards more relaxed acquisition conditions. Here, we propose a super-resolution technique to enhance iris images based on Principal Component Analysis (PCA) Eigen-transformation of local image patches. Each patch is reconstructed separately, allowing better quality of enhanced images by preserving local information and reducing artifacts. We validate the system used a database of 1,872 near-infrared iris images. Results show the superiority of the presented approach over bilinear or bicubic interpolation, with the eigen-patch method being more resilient to image resolution reduction. We also perform recognition experiments with an iris matcher based 1D Log-Gabor, demonstrating that verification rates degrades more rapidly with bilinear or bicubic interpolation. ©2015 IEEE

  • 38.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben A.
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Improving Very Low-Resolution Iris Identification Via Super-Resolution Reconstruction of Local Patches2017In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG) / [ed] Arslan Brömme, Christoph Busch, Antitza Dantcheva, Christian Rathgeb & Andreas Uhl, Bonn: Gesellschaft für Informatik, 2017, Vol. P-270, article id 8053512Conference paper (Refereed)
    Abstract [en]

    Relaxed acquisition conditions in iris recognition systems have significant effects on the quality and resolution of acquired images, which can severely affect performance if not addressed properly. Here, we evaluate two trained super-resolution algorithms in the context of iris identification. They are based on reconstruction of local image patches, where each patch is reconstructed separately using its own optimal reconstruction function. We employ a database of 1,872 near-infrared iris images (with 163 different identities for identification experiments) and three iris comparators. The trained approaches are substantially superior to bilinear or bicubic interpolations, with one of the comparators providing a Rank-1 performance of ∼88% with images of only 15×15 pixels, and an identification rate of 95% with a hit list size of only 8 identities. © 2017 Gesellschaft fuer Informatik.

  • 39.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben A.
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Iris Super-Resolution Using Iterative Neighbor Embedding2017In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops / [ed] Lisa O’Conner, Los Alamitos: IEEE Computer Society, 2017, p. 655-663Conference paper (Refereed)
    Abstract [en]

    Iris recognition research is heading towards enabling more relaxed acquisition conditions. This has effects on the quality and resolution of acquired images, severely affecting the accuracy of recognition systems if not tackled appropriately. In this paper, we evaluate a super-resolution algorithm used to reconstruct iris images based on iterative neighbor embedding of local image patches which tries to represent input low-resolution patches while preserving the geometry of the original high-resolution space. To this end, the geometry of the low- and high-resolution manifolds are jointly considered during the reconstruction process. We validate the system with a database of 1,872 near-infrared iris images, while fusion of two iris comparators has been adopted to improve recognition performance. The presented approach is substantially superior to bilinear/bicubic interpolations at very low resolutions, and it also outperforms a previous PCA-based iris reconstruction approach which only considers the geometry of the low-resolution manifold during the reconstruction process. © 2017 IEEE

  • 40.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben A.
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Reconstruction of Smartphone Images for Low Resolution Iris Recognition2015In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Piscataway, NJ: IEEE Press, 2015, article id 7368600Conference paper (Refereed)
    Abstract [en]

    As iris systems evolve towards a more relaxed acquisition, low image resolution will be a predominant issue. In this paper we evaluate a super-resolution method to reconstruct iris images based on Eigen-transformation of local image patches. Each patch is reconstructed separately, allowing better quality of enhanced images by preserving local information. We employ a database of 560 images captured in visible spectrum with two smartphones. The presented approach is superiorto bilinear or bicubic interpolation, especially at lower resolutions. We also carry out recognition experiments with six iris matchers, showing that better performance can be obtained at low-resolutions with the proposed eigen-patch reconstruction, with fusion of only two systems pushing the EER to below 5-8% for down-sampling factors up to a size of only 13x13. © 2015 IEEE.

  • 41.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Learning-Based Local-Patch Resolution Reconstruction of Iris Smart-phone Images2017Conference paper (Refereed)
    Abstract [en]

    Application of ocular biometrics in mobile and at a distance environments still has several open challenges, with the lack quality and resolution being an evident issue that can severely affects performance. In this paper, we evaluate two trained image reconstruction algorithms in the context of smart-phone biometrics. They are based on the use of coupled dictionaries to learn the mapping relations between low and high resolution images. In addition, reconstruction is made in local overlapped image patches, where up-scaling functions are modelled separately for each patch, allowing to better preserve local details. The experimental setup is complemented with a database of 560 images captured with two different smart-phones, and two iris comparators employed for verification experiments. We show that the trained approaches are substantially superior to bilinear or bicubic interpolations at very low resolutions (images of 13×13 pixels). Under such challenging conditions, an EER of ∼7% can be achieved using individual comparators, which is further pushed down to 4-6% after the fusion of the two systems. © 2017 IEEE

  • 42.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Farrugia, Reuben
    University of Malta, Msida, Malta.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Very Low-Resolution Iris Recognition Via Eigen-Patch Super-Resolution and Matcher Fusion2016In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Piscataway: IEEE, 2016, article id 7791208Conference paper (Refereed)
    Abstract [en]

    Current research in iris recognition is moving towards enabling more relaxed acquisition conditions. This has effects on the quality of acquired images, with low resolution being a predominant issue. Here, we evaluate a super-resolution algorithm used to reconstruct iris images based on Eigen-transformation of local image patches. Each patch is reconstructed separately, allowing better quality of enhanced images by preserving local information. Contrast enhancement is used to improve the reconstruction quality, while matcher fusion has been adopted to improve iris recognition performance. We validate the system using a database of 1,872 near-infrared iris images. The presented approach is superior to bilinear or bicubic interpolation, especially at lower resolutions, and the fusion of the two systems pushes the EER to below 5% for down-sampling factors up to a image size of only 13×13.

  • 43.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fierrez, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fingerprint Databases and Evaluation2008In: Encyclopedia of Biometrics / [ed] Li, Stan Z., New York: Springer-Verlag New York, 2008, 1, p. 452-458Chapter in book (Other academic)
  • 44.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fierrez, J.
    Universidad Autonoma de Madrid, Spain.
    Gilperez, A.
    Universidad Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Universidad Autonoma de Madrid, Spain.
    Impact of time variability in off-line writer identification and verification2009In: ISPA 2009: Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis, Piscataway, N.J.: IEEE Press, 2009, p. 540-545Conference paper (Refereed)
    Abstract [en]

    One of the biggest challenges in person recognition using biometric systems is the variability in the acquired data. In this paper, we evaluate the effects of an increasing time lapse between reference and test biometric data consisting of static images of handwritten signatures and texts. We use for our experiments two recognition approaches exploiting information at the global and local levels, and the BiosecurlD database, containing 3,724 signature images and 532 texts of 133 individuals acquired in four acquisition sessions distributed along a 4 months time span. We report results of the recognition systems working both in verification (one-to-one) and identification (one-to-many) mode. The results show the extent of the impact that the time separation between samples under comparison has on the recognition rates, being the local approach more robust to the time lapse than the global one. We also observe in our experiments that recognition based on handwritten texts provides higher accuracy than recognition based on signatures.

  • 45.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fierrez, J.
    Universidad Autonoma de Madrid, Spain.
    Martinez-Diaz, M.
    Universidad Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Universidad Autonoma de Madrid, Spain.
    Fusion of static image and dynamic information for signature verification2009In: ICIP 2009: 2009 IEEE International Conference on Image Processing : proceedings, November 7-12, 2009, Cairo, Egypt, Piscataway, N.J.: IEEE Press, 2009, p. 2725-2728Conference paper (Refereed)
    Abstract [en]

    This paper evaluates the combination of static image (off-line) and dynamic information (on-line) for signature verification. Two off-line and two on-line recognition approaches exploiting information at the global and local levels are used. Experimental results are given using the BiosecurID database (130 signers, 3,640 signatures). Fusion experiments are done using a trained fusion approach based on linear logistic regression. It is shown experimentally that the local systems outperform the global ones, both in the on-line and in the off-line case. We also observe a considerable improvement when combining the two on-line systems, which is not the case with the off-line systems. The best performance is obtained when fusing all the systems together, which is specially evident for skilled forgeries when enough training data is available. ©2009 IEEE.

  • 46.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fierrez, J.
    Universidad Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Universidad Autonoma de Madrid, Spain.
    An enhanced Gabor filter-based segmentation algorithm for fingerprint recognition systems2005Conference paper (Refereed)
    Abstract [en]

    An imponant step in fingerprint recognition is the segmentation of the region of interest. In this paper, we present an enhanced approach for fingerprint segmentation based on the response of eight oriented Gabor filters. The performance of the algorithm has been evaluated in terms of decision error trade-off curves of an overall verification system. Experimental results demonstrate the robustness of the proposed method.

  • 47.
    Alonso-Fernandez, Fernando
    et al.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Fierrez, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Ramos, D.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Ortega-Garcia, J.
    Escuela Politecnica Superior, Univ. Autonoma de Madrid, Spain.
    Dealing With Sensor Interoperability in Multi-biometrics: The UPM Experience at the Biosecure Multimodal Evaluation 20072008In: Biometric Technology for Human Identification, Bellingham, WA: SPIE - International Society for Optical Engineering, 2008, Vol. 6944, p. J9440-J9440Conference paper (Refereed)
    Abstract [en]

    Multimodal biometric systems allow to overcome some of the problems presented in unimodal systems, such as non-universality, lack of distinctiveness of the unimodal trait, noise in the acquired data, etc. Integration at the matching score level is the most common approach used due to the ease in combining the scores generated by different unimodal systems. Unfortunately, scores usually lie in application-dependent domains. In this work, we use linear logistic regression fusion, in which fused scores tend to be calibrated log-likelihood-ratios and thus, independent of the application. We use for our experiments the development set of scores of the DS2 Evaluation (Access Control Scenario) of the BioSecure Multimodal Evaluation Campaign, whose objective is to compare the performance of fusion algorithms when query biometric signals are originated from heterogeneous biometric devices. We compare a fusion scheme that uses linear logistic regression with a set of simple fusion rules. It is observed that the proposed fusion scheme outperforms all the simple fusion rules, with the additional advantage of the application-independent nature of the resulting fused scores.

  • 48.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Fierrez, Julian
    Universidad Autonoma de Madrid, Madrid, Spain.
    Fingerprint Databases and Evaluation2015In: Encyclopedia of Biometrics / [ed] Stan Z. Li & Anil K. Jain, New York: Springer Science+Business Media B.V., 2015, 2, p. 599-606Chapter in book (Refereed)
    Abstract [en]

    This is an excerpt from the content

    Synonyms

    Fingerprint benchmark; Fingerprint corpora; Fingerprint dataset

    Definition

    Fingerprint databases are structured collections of fingerprint data mainly used for either evaluation or operational recognition purposes.

    Fingerprint data in databases for evaluation are usually detached from the identity of corresponding individuals. These databases are publicly available for research purposes, and they usually consist of raw fingerprint images acquired with live-scan sensors or digitized from inked fingerprint impressions on paper. Databases for evaluation are the basis for research in automatic fingerprint recognition, and together with specific experimental protocols, they are the basis for a number of technology evaluations and benchmarks. This is the type of fingerprint databases further covered here.

    On the other hand, fingerprint databases for operational recognition are typically proprietary, they usually incorporate personal information about the enrolled people together with the fingerprint data, and they can incorporate either raw fingerprint image data or some form of distinctive fingerprint descriptors such as minutiae templates. These fingerprint databases represent one of the modules in operational automated fingerprint recognition systems, and they will not be adressed here.

  • 49.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Fierrez, Julian
    Universidad Autonoma de Madrid, Madrid, Spain.
    Bigun, Josef
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Quality Measures in Biometric Systems2015In: Encyclopedia of Biometrics / [ed] Stan Z. Li & Anil K. Jain, New York: Springer Science+Business Media B.V., 2015, 2, p. 1287-1297Chapter in book (Refereed)
    Abstract [en]

    This is an excerpt from the content

    Synonyms

    Quality assessment; Biometric quality; Quality-based processing

    Definition

    Since the establishment of biometrics as a specific research area in the late 1990s, the biometric community has focused its efforts in the development of accurate recognition algorithms [1]. Nowadays, biometric recognition is a mature technology that is used in many applications, offering greater security and convenience than traditional methods of personal recognition [2].

    During the past few years, biometric quality measurement has become an important concern after a number of studies and technology benchmarks that demonstrate how performance of biometric systems is heavily affected by the quality of biometric signals [3]. This operationally important step has been nevertheless under-researched compared to the primary feature extraction and pattern recognition tasks [4]. One of the main challenges facing biometric technologies is performance degradation in less controlled situations, and the problem of biometric quality measurement has arisen even stronger with the proliferation of portable handheld devices, with at-a-distance and on-the-move acquisition capabilities. These will require robust algorithms capable of handling a range of changing characteristics [2]. Another important example is forensics, in which intrinsic operational factors further degrade recognition performance.

    There are number of factors that can affect the quality of biometric signals, and there are numerous roles of a quality measure in the context of biometric systems. This section summarizes the state of the art in the biometric quality problem, giving an overall framework of the different challenges involved.

  • 50.
    Alonso-Fernandez, Fernando
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory. Fernando.Alonso-Fernandez@hh.se.
    Fierrez, Julian
    Universidad Autonoma de Madrid, Madrid, Spain.
    Ortega-Garcia, Javier
    Universidad Autonoma de Madrid, Madrid, Spain.
    Quality Measures in Biometric Systems2012In: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 10, no 6, p. 52-62Article in journal (Refereed)
    Abstract [en]

    Biometric technology has been increasingly deployed in the last decade, offering greater security and convenience than traditional methods of personal recognition. But although the performance of biometric systems is heavily affected by the quality of biometric signals, prior work on quality evaluation is limited. Quality assessment is a critical issue in the security arena, especially in challenging scenarios (e.g. surveillance cameras, forensics, portable devices or remote access through Internet). Different questions regarding the factors influencing biometric quality and how to overcome them, or the incorporation of quality measures in the context of biometric systems have to be analyzed first. In this paper, a review of the state-of-the-art in these matters is provided, giving an overall framework of the main factors related to the challenges associated with biometric quality.

1234567 1 - 50 of 1143
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf