»Sebastiano Trigila

About Sebastiano Trigila

This author has not yet filled in any details.
So far Sebastiano Trigila has created 111 blog entries.

D35 –  Monitoring of the implementation of the safety and security functionalities of TBAS for the manipulation of personal data

The purpose of this document is to provide a record of the monitoring activities that take place in the context of the OCTAVE developments, for aspects that relate to collection, storage and processing of personal data. In order to carry out this monitoring in a structured way, this document starts with an overview of the [...]

D34 – Online users access control validation report

This report aims to describe the implementation of an application that authenticates on-line users, in a financial services environment, by resorting to the OCTAVE Trusted Biometric Authentication Service (TBAS). The implementation has been developed under Advalia and Findomestic specifications and assumes operational-like conditions for the validation of technical performance requirements. The document builds upon the output of project Deliverable D14 [...]

D33 – Physical access control validation report

This report aims to provide a description of an application allowing airport operators for physical access in a restricted, sensitive, area, through the authentication service offered by the OCTAVE solution, technically known as TBAS (Trusted Biometric Authentication Service). The technical performances of the application are being built according to the Client’s (SEA) operational requirements. We focus [...]

D32 – Spoofing countermeasures for final deployment

This report is a supporting document for the final deployment of spoofing countermeasures.  It reports on integration activities including supporting experiments from research partners. As the software delivered is an evolution of the components delivered in D16 this report also discusses the new feature and the API changes made to support the requirements for the final pilot. The Deliverable is completed in [...]

D31 – Evaluation and optimization of hybrid biometric engines

This deliverable focuses on the use of fusion to attain better performances than single-mode speaker verification engines in Automatic Speaker Verification (ASV) systems. An ASV system based on a single-mode operation engine has been shown to provide differences in performance depending on the operational mode. The three operational modes, fixed-phrase, text-prompted text-dependent and text-prompted, text-independent [...]

D30 – Voice biometric engines for final deployment

This report is a supporting document for the software delivery of the voice biometrics platform for final deployment. It reports on strategy and integration activities including supporting experiments from research partners. As the software delivered is an evolution of the platform delivered in D12 this report also discusses the new feature and the API changes made [...]

D29 – Enhanced and generalised countermeasures

The vulnerability of automatic speaker verification (ASV) systems to spoofing attacks is now well acknowledged. If exposed, these vulnerabilities not only threaten reliability, but also have potential to damage user-confidence and hence hinder the future exploitation of ASV technology. It is thus critical that countermeasures to protect from spoofing are integrated into the OCTAVE platform [...]

D28 – Trial results of the component-wise phase

How well does a voice biometric authentication service work? How easy is it to use? How reliable is it? What performance can I expect when integrating this service in my application for my customers? All these questions cannot be answered by any open evaluation campaign, like those organized by international standardization bodies and scientific associations. [...]

D27 – Changes to platform for privacy compliance (internal version for use within the Consortium)

Information systems and critical infrastructures often need to securely identify their users. It has long been recognised that alternatives are needed to textual passwords for access control. While tokens can still be stolen, or transferred to other persons, biometrics technology can provide reliable, cost-effective and user-friendly solutions, particularly for unsupervised authentication at a distance. By [...]

Project Brochure

Project Brochure