Connie Tee
Multimedia University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Connie Tee.
international conference on biometrics | 2009
Cheng-Yaw Low; Andrew Beng Jin Teoh; Connie Tee
Biometric watermarking was introduced as the synergistic integration of biometrics and digital watermarking technology. This paper proposes a novel biometric watermarking technique, which embeds offline handwritten signature in host image for copyright protection. We propose to combine the conventional LSB-based and DWT-based watermarking techniques into a unison framework, which is known as LSB-DWT in this paper. The proposed LSB-DWT technique is evaluated against various simulated security attacks, i.e. JPEG compression, Gaussian low-pass filtering, median filtering, Gaussian noise, scaling, rotation and cropping. The experimental results demonstrate that the proposed LSB-DWT technique exhibits remarkable watermark imperceptibility and watermark robustness.
international visual informatics conference | 2009
Zhe Jin; Andrew Beng Jin Teoh; Thian Song Ong; Connie Tee
Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.
international conference on education technology and computer | 2010
Zhe Jin; Andrew Beng Jin Teoh; Thian Song Ong; Connie Tee
With the growing concern for secure and private information protection, several issues pertaining to the traditional biometric authentication system such as the reissuance of biometric template and template security have been raised. To resolve these limitations, many new concepts of revocable biometrics have been introduced. However, the design of a template protection scheme that fulfils all the security and privacy criteria, namely revocability, non-invertibility, and anonymity, is still a challenging task. In this paper, we present a secure fingerprint template protection scheme by using minutiae pair representation that extends the concept of revocable biometrics. The proposed method integrates template with its discriminative helper data to achieve acceptable equal error rate (EER) of near 0%. Apart from performance, the security and privacy issues such as revocability and non-invertibility are also discussed.
congress on image and signal processing | 2008
Cheng-Yaw Low; Andrew Beng Jin Teoh; Connie Tee
Biometric watermarking refers to the incorporation of biometrics in watermarking technology. In this paper, we present a novel biometric watermarking scheme to embed handwritten signature invisibly in the host as a notice of legitimate ownership. We propose to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known as LSB-DWT scheme. The performance of LSB-DWT scheme is validated against simulated frequency and geometric attacks, specifically JPG compression, low pass filtering, median filtering, noise addition, scaling, rotation and cropping through visual inspection, Peak Signal to Noise Ratio (PSNR) and watermark distortion rate. Experiment results prove that LSB-DWT scheme is sufficiently robust even in the presence of deliberate distortions.
Pattern Analysis and Applications | 2011
Pin Shen Teh; Andrew Beng Jin Teoh; Connie Tee; Thian Song Ong
In this paper, we present a novel keystroke dynamic recognition system by means of a novel two-layer fusion approach. First, we extract four types of keystroke latency as the feature from our dataset. The keystroke latency will be transformed into similarity scores via Gaussian Probability Density Function (GPD). We also propose a new technique, known as Direction Similarity Measure (DSM), which measures the absolute difference between two sets of latency. Last, four fusion approaches coupled with six fusion rules are applied to improve the final result by combining the scores that are produced by GPD and DSM. Best result with equal error rate of 1.401% is obtained with our two-layer fusion approach.
international midwest symposium on circuits and systems | 2011
Zhe Jin; Thian Song Ong; Connie Tee; Andrew Beng Jin Teoh
Recently, biometric template protection has received much attention from the research community due to the security and privacy concerns of biometric template. Although a number of biometric template protection methods have been reported, yet, it is still a challenging task to devise a biometric template protection method which satisfies all the biometric template protection criteria namely diversity, revocability, non-invertibility and performance. In this paper, a method is proposed to generate a revocable fingerprint template of bit-string from a set of minutiae points through polar grid based 3-tuple quantization (PGTQ) technique. Two merits of the proposed method are outlined, i.e., alignment-free and performance. FVC2002 DB1 and DB2 are used to evaluate the performance of the proposed method. Besides, the template protection criteria are also examined to ensure the security and privacy of the biometric template.
international conference on telecommunications | 2007
Cheng-Yaw Low; Andrew Beng Jin Teoh; Connie Tee
This paper presents a preliminary study on biometric watermarking by using offline handwritten signature. Specifically, offline handwritten signature is discretized into binary bit string as hidden biometric watermark. It is reconstructed subsequently with the intention to authenticate the claimed source of the digital document. In this paper, we focus on the study in examining the strength and robustness of three selected biometric watermarking schemes, namely least significant bit (LSB) substitution, CDMA spread spectrum in spatial domain and CDMA spread spectrum in discrete wavelet transform (DWT), against JPG compression. We check the distortion rate for the original and the extracted biometric bit string after JPG compression. The performance of the selected biometric watermarking schemes is validated based on human visual inspection, peak signal to noise ratio (PSNR) and distortion rate (normalized Hamming distance). Experiment results show that CDMA spread spectrum in DWT is the most promising scheme in biometric watermarking.
Multimedia Tools and Applications | 2017
Munalih Ahmad Syarif; Thian Song Ong; Andrew Beng Jin Teoh; Connie Tee
Maximum Curvature Method (MCM) is one of the promising methods for finger vein verification. MCM scans the curvature of the vein image profiles within a finger for feature extraction. However, the quality of the image can be poor due to variations in illumination and sensor conditions. Furthermore, traditional MCM matching of the vein pattern requires extensive processing time. To address these limitations, we propose an integrated Enhanced Maximum Curvature (EMC) method with Histogram of Oriented Gradient (HOG) descriptor for finger vein verification. Unlike MCM, EMC incorporates an enhancement mechanism to extract small vein delineation that is hardly visible in the extracted vein patterns. Next, HOG is applied instead of image binarization to convert a two-dimensional vein image into a one-dimensional feature vector for efficient matching. The HOG descriptor is able to characterize the local spatial representation of a finger vein by capturing the gradient information effectively. The proposed method is evaluated based on two datasets namely the PKU Finger Vein Database (V4) and SDUMLA-HMT finger vein database. Experiments show promising verification results with equal error rates as low as 0.33 % for DB1 and 0.14 % for DB2 respectively, when EMC+HOG+SVM is applied.
international conference on neural information processing | 2014
Munalih Ahmad Syarif; Thian Song Ong; Andrew Beng Jin Teoh; Connie Tee
Biohashing is a promising cancellable biometrics method. However, it suffers from a problem known as ‘stolen token scenario’. The performance of the biometric system drops significantly if the Biohashing private token is stolen. To solve this problem, this paper proposes a new method termed as Most Intensive Histogram Block Location (MIBL) to extract additional information of the p-th best gradient magnitude. Experimental analysis shows that the proposed method is able to solve the stolen token problem with error equal rates as low as 1.46% and 7.27% when the stolen token scenario occurred for both FVC2002 DB1 and DB2 respectively.
international symposium on information technology | 2008
Zhe Jin; Andrew Beng Jin Teoh; Thian Song Ong; Connie Tee
The request to protect sensitive data and computer systems from malicious impostors while allowing ease of access for legitimate users is one of the greatest challenges in the computer security field. Traditionally, conventional ID and passwords authentication schemes are used for controlling access to computer systems. However, this approach has many inherent flaws such as password sharing and password guessing. To confront these problems, we propose a dynamic typing biometric authentication method for computer security system. As a userpsilas typing template cannot be shared, lost or forgotten. It can be reliable used to gain access to the computer system. In this paper, we examine the behavioral biometrics of typing dynamics which uses the manner and rhythm in which an individual types characters on a keyboard or keypad. Experiment shows that an equal error rate (EER) of 20% could be achieved using the proposed approach. This paper focuses on the application of fuzzy logic in typing dynamic and explores the advantages of using this method as compare to the statistical standard deviation.