
 
6 CONCLUSIONS 
The vision embodied in the SecurePhone project is 
to reduce the psychological intimidation often felt by 
ordinary users towards new ICT technologies by 
proposing new advanced uses for a familiar and 
intuitive communication platform such as the mobile 
phone. Although supplemented with high-tech 
functionalities, the SecurePhone does not differ from 
a common PDA-phone in terms of ease of use and 
user-friendliness. Under its surface appearance, 
though, a remarkable level of innovativeness is 
hidden: by means of the SecurePhone users will be 
given the opportunity to draw legally valid e-
transactions, relying on the security provided by 
electronic signature for a whole new set of possible 
social interactions and business opportunities.  
This work was supported by the EC SecurePhone 
project IST-2002-506883 
REFERENCES 
Allano, L., Garcia-Salicetti, S., Ly-Van, B., Morris, A.C., 
Koreman, J., Sellahewa, H., Jassim, S. & Dorizzi, B., 
2006, “Non intrusive multi-biometrics on a mobile 
device: a comparison of fusion techniques”, Proc. 
SPIE conference on Biometric Techniques for Human 
Identification III, Orlando, 2006. 
Bella G., Bistarelli S., Martinelli F., 2003, “Biometrics to 
Enhance Smartcard Security (Simulating MOC using 
TOC)”, Proc. 11th International Workshop on Security 
Protocols Cambridge, England. 
Bredin, H., Miguel, A., Witten, I.H. & Chollet, G., 2006, 
“Detecting replay attacks in audiovisual identity 
verification”, Proc. ICASSP 2006 (in print).  
Collobert, R., Bengio, S. & Mariéthoz, J., 2002, “Torch: a 
modular machine learning software library”, 
Technical Report IDIAP-RR 02-46.  
Dolfing, J.G.A., 1998, “Handwriting recognition and 
verification, a Hidden Markov approach”, Ph.D. 
thesis, Philips Electronics N.V.  
Duda, O., Hart, P.E. & Stork, D.G., 2001, Pattern 
classification, Wiley.  
Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B., 
Leroux-Les Jardins, J., Lunter, J., Ni, Y. & Petrovska-
Delacretaz, D., 2003, “BIOMET: a Multimodal Person 
Authentication Database Including Face, Voice, 
Fingerprint, Hand and Signature Modalities”, Proc. 
4th Conf. on AVBPA, pp. 845-853, Guildford, UK..  
Koreman, J., Morris, A.C., Wu, D., Jassim, S., Sellahewa, 
H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H. 
Garcia-Salicetti, S., Allano, L. Ly Van, B. & Dorizzi, 
B., 2006, “ multi-modal biometric authentication on 
the SecurePhone PDA”, Proc. MMUA, (in press). 
Morris, A.C., Jassim, S., Sellahewa, H., Allano, L., Ehlers, 
J., Wu, D., Koreman, J., Garcia-Salicetti, S., Ly-Van, 
B., Dorizzi, B., 2006, “Multimodal person 
authentication on a smartphone under realistic 
conditions”,  Proc. SPIE conference on Mobile 
Multimedia/Image Processing for Military and 
Security Applications”, Orlando, 17-21 April, 2006.  
Morris, A.C., Koreman, J., Sellahewa, H., Ehlers, J, 
Jassim, S., Allano, L. & Garcia-Salicetti, S., 2006,  
“The SecurePhone PDA database, experimental 
protocol and automatic test procedure for multimodal 
user authentication”, Tech. Report, 
http://www.coli.uni-
saarland.de/SecurePhone/documents/PDA_database_a
nd_test_protocol.pdf  
Pettersson M., Obrink Ä, 2002, “How secure is your 
biometric solution?”, Precise Biometrics White Paper, 
http://www.ibia.org  
Reynolds, D.A., 1995, “Speaker identification and 
verification using Gaussian mixture speaker models”, 
Speech Communication, Vol.17, pp.91-108 
Sellahewa, H. & Jassim, S.,“Wavelet-based Face 
Verification for constrained platforms”, 2005, Proc. 
SPIE on Biometric Technology for Human 
Identification II, Florida, Vol. 5779, pp 173-183. 
Sellahewa, H. Al-Jawad, N., Morris, A.C., Wu, D., 
Koreman, J. & Jassim, S., 2006, “Comparison of 
weighting strategies in early and late fusion approach 
to audio-visual person authentication”, Proc. SPIE 
conference on Mobile Multimedia/Image Processing 
for Military and Security Applications”, Orlando, 17-
21 April, 2006.  
Torvinen V., 2000, “Wireless PKI: fundamentals”, 
Radicchio white paper, http://www.radicchio.org 
Welch D. J., Lathrop S. D., 2003, “A Survey of 802.11a 
Wireless Security Threats and Security Mechanisms”, 
Tech. Report, ITOC-TR-2003-101, 
http://www.itoc.usma.edu/Documents/ITOC_TR-
2003-101_(G6).pdf 
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
16