6 CONCLUSIONS
The vision embodied in the SecurePhone project is
to reduce the psychological intimidation often felt by
ordinary users towards new ICT technologies by
proposing new advanced uses for a familiar and
intuitive communication platform such as the mobile
phone. Although supplemented with high-tech
functionalities, the SecurePhone does not differ from
a common PDA-phone in terms of ease of use and
user-friendliness. Under its surface appearance,
though, a remarkable level of innovativeness is
hidden: by means of the SecurePhone users will be
given the opportunity to draw legally valid e-
transactions, relying on the security provided by
electronic signature for a whole new set of possible
social interactions and business opportunities.
This work was supported by the EC SecurePhone
project IST-2002-506883
REFERENCES
Allano, L., Garcia-Salicetti, S., Ly-Van, B., Morris, A.C.,
Koreman, J., Sellahewa, H., Jassim, S. & Dorizzi, B.,
2006, “Non intrusive multi-biometrics on a mobile
device: a comparison of fusion techniques”, Proc.
SPIE conference on Biometric Techniques for Human
Identification III, Orlando, 2006.
Bella G., Bistarelli S., Martinelli F., 2003, “Biometrics to
Enhance Smartcard Security (Simulating MOC using
TOC)”, Proc. 11th International Workshop on Security
Protocols Cambridge, England.
Bredin, H., Miguel, A., Witten, I.H. & Chollet, G., 2006,
“Detecting replay attacks in audiovisual identity
verification”, Proc. ICASSP 2006 (in print).
Collobert, R., Bengio, S. & Mariéthoz, J., 2002, “Torch: a
modular machine learning software library”,
Technical Report IDIAP-RR 02-46.
Dolfing, J.G.A., 1998, “Handwriting recognition and
verification, a Hidden Markov approach”, Ph.D.
thesis, Philips Electronics N.V.
Duda, O., Hart, P.E. & Stork, D.G., 2001, Pattern
classification, Wiley.
Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B.,
Leroux-Les Jardins, J., Lunter, J., Ni, Y. & Petrovska-
Delacretaz, D., 2003, “BIOMET: a Multimodal Person
Authentication Database Including Face, Voice,
Fingerprint, Hand and Signature Modalities”, Proc.
4th Conf. on AVBPA, pp. 845-853, Guildford, UK..
Koreman, J., Morris, A.C., Wu, D., Jassim, S., Sellahewa,
H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H.
Garcia-Salicetti, S., Allano, L. Ly Van, B. & Dorizzi,
B., 2006, “ multi-modal biometric authentication on
the SecurePhone PDA”, Proc. MMUA, (in press).
Morris, A.C., Jassim, S., Sellahewa, H., Allano, L., Ehlers,
J., Wu, D., Koreman, J., Garcia-Salicetti, S., Ly-Van,
B., Dorizzi, B., 2006, “Multimodal person
authentication on a smartphone under realistic
conditions”, Proc. SPIE conference on Mobile
Multimedia/Image Processing for Military and
Security Applications”, Orlando, 17-21 April, 2006.
Morris, A.C., Koreman, J., Sellahewa, H., Ehlers, J,
Jassim, S., Allano, L. & Garcia-Salicetti, S., 2006,
“The SecurePhone PDA database, experimental
protocol and automatic test procedure for multimodal
user authentication”, Tech. Report,
http://www.coli.uni-
saarland.de/SecurePhone/documents/PDA_database_a
nd_test_protocol.pdf
Pettersson M., Obrink Ä, 2002, “How secure is your
biometric solution?”, Precise Biometrics White Paper,
http://www.ibia.org
Reynolds, D.A., 1995, “Speaker identification and
verification using Gaussian mixture speaker models”,
Speech Communication, Vol.17, pp.91-108
Sellahewa, H. & Jassim, S.,“Wavelet-based Face
Verification for constrained platforms”, 2005, Proc.
SPIE on Biometric Technology for Human
Identification II, Florida, Vol. 5779, pp 173-183.
Sellahewa, H. Al-Jawad, N., Morris, A.C., Wu, D.,
Koreman, J. & Jassim, S., 2006, “Comparison of
weighting strategies in early and late fusion approach
to audio-visual person authentication”, Proc. SPIE
conference on Mobile Multimedia/Image Processing
for Military and Security Applications”, Orlando, 17-
21 April, 2006.
Torvinen V., 2000, “Wireless PKI: fundamentals”,
Radicchio white paper, http://www.radicchio.org
Welch D. J., Lathrop S. D., 2003, “A Survey of 802.11a
Wireless Security Threats and Security Mechanisms”,
Tech. Report, ITOC-TR-2003-101,
http://www.itoc.usma.edu/Documents/ITOC_TR-
2003-101_(G6).pdf
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
16