Skip to main content

VICI: Visual Caller Identification for Contact Center Applications

  • Conference paper
  • First Online:
Book cover Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Included in the following conference series:

  • 1635 Accesses

Abstract

In this paper, we present VICI, a system for auditing and authentication in contact center scenarios. The technique we present exploits the widespread use of smartphones and other camera-enabled devices to allow a user (caller) to upload their picture, which can be verified automatically or by an agent before processing a transaction. The method can be configured for different levels of security, ensures that the image(s) are fresh, and relies on the computational complexity of image processing. We present our technique, the various configurable options available to the system/agent, and describe a prototype implementation of our system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Hong, L., Pankanti, S.: Biometric Identification. Comm. of the ACM 43(2), 91–98 (2000). Biometrics Consortium homepage. http://www.biometrics.org

    Article  Google Scholar 

  2. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91(12), 2019–2040 (2003)

    Article  Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.N.: Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal 40(3) (2001)

    Google Scholar 

  4. Markowitz, J.A.: Voice Biometrics. Communications of the ACM 43(9), 66–73 (2000)

    Article  Google Scholar 

  5. Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face Recognition: A Literature Survey. ACM Computing Surveys 35(4), 399–458 (2003)

    Article  Google Scholar 

  6. Phillips, P.J., Flynn, P.J., Scruggs, T., Bowyer, K.W., Chang, J., Hoffman, K., Marques, J., Min, J., Worek, W.: Overview of the face recognition grand challenge. In: Proc. IEEE Computer Vision & Pattern Recognition, vol. 1, pp. 947–954 (2005)

    Google Scholar 

  7. O’Toole, A.J., Phillips, P.J., Fang, K., Ayyad, J., Penard, N., Abdi, H.: Face Recognition Algorithms Surpass Humans Matching Faces Over Changes in Illumination. IEEE Trans. on Pattern Analysis and Machine Intelligence 29(9), 1642–1646 (2007)

    Article  Google Scholar 

  8. Cryptographic nonce. http://en.wikipedia.org/wiki/Cryptographic_nonce

  9. von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Pighin, F., et al.: Synthesizing realistic facial expressions from photographs. In: ACM SIGGRAPH 2006 Courses (2006)

    Google Scholar 

  11. WebRTC 1.0: Real-time communication between browsers, W3C Draft. http://www.w3.org/TR/webrtc/, http://www.webrtc.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Krishnan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Krishnan, P., Singh, N. (2015). VICI: Visual Caller Identification for Contact Center Applications. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics