首页 > 最新文献

2011 International Joint Conference on Biometrics (IJCB)最新文献

英文 中文
Retina features based on vessel graph substructures 基于血管图子结构的视网膜特征
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117506
A. Arakala, Stephen A. Davis, K. Horadam
We represent the retina vessel pattern as a spatial relational graph, and match features using error-correcting graph matching. We study the distinctiveness of the nodes (branching and crossing points) compared with that of the edges and other substructures (nodes of degree k, paths of length k). On a training set from the VARIA database, we show that as well as nodes, three other types of graph sub-structure completely or almost completely separate genuine from imposter comparisons. We show that combining nodes and edges can improve the separation distance. We identify two retina graph statistics, the edge-to-node ratio and the variance of the degree distribution, that have low correlation with node match score.
我们将视网膜血管模式表示为空间关系图,并使用纠错图匹配来匹配特征。我们研究了节点(分支点和交叉点)与边缘和其他子结构(度为k的节点,长度为k的路径)相比的独特性。在来自VARIA数据库的训练集上,我们表明,除了节点之外,其他三种类型的图子结构完全或几乎完全将真品与冒名者比较分开。结果表明,结合节点和边可以提高分离距离。我们识别出与节点匹配分数相关性较低的两个视网膜图统计量,即边节点比和度分布方差。
{"title":"Retina features based on vessel graph substructures","authors":"A. Arakala, Stephen A. Davis, K. Horadam","doi":"10.1109/IJCB.2011.6117506","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117506","url":null,"abstract":"We represent the retina vessel pattern as a spatial relational graph, and match features using error-correcting graph matching. We study the distinctiveness of the nodes (branching and crossing points) compared with that of the edges and other substructures (nodes of degree k, paths of length k). On a training set from the VARIA database, we show that as well as nodes, three other types of graph sub-structure completely or almost completely separate genuine from imposter comparisons. We show that combining nodes and edges can improve the separation distance. We identify two retina graph statistics, the edge-to-node ratio and the variance of the degree distribution, that have low correlation with node match score.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Facial recognition of identical twins 同卵双胞胎的面部识别
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117476
Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge
Biometric identification systems must be able to distinguish between individuals even in situations where the bio metric signature may be similar, such as in the case of identical twins. This paper presents experiments done in facial recognition using data from a set of images of twins. This work establishes the current state of facial recognition in regards to twins and the accuracy of current state-of-the art programs in distinguishing between identical twins using three commercial face matchers, Cognitec 8.3.2.0, VeriLook 4.0, and PittPatt 4.2.1 and a baseline matcher employing Local Region PCA. Overall, it was observed that Cognitec had the best performance. All matchers, how ever, saw degradation in performance compared to an experiment where the ability to distinguish unrelated persons was assessed. In particular, lighting and expression seemed to have affected performance the most.
生物识别系统必须能够区分个体,即使在生物特征签名可能相似的情况下,例如在同卵双胞胎的情况下。本文介绍了使用一组双胞胎图像数据进行面部识别的实验。这项工作建立了双胞胎面部识别的当前状态,以及当前最先进的程序在区分同卵双胞胎方面的准确性,使用三种商业面部匹配器,Cognitec 8.3.2.0, VeriLook 4.0和PittPatt 4.2.1,以及使用Local Region PCA的基线匹配器。总的来说,我们观察到Cognitec的表现最好。然而,与一项评估区分不相关人员能力的实验相比,所有匹配者的表现都有所下降。特别是,灯光和表情似乎对表现影响最大。
{"title":"Facial recognition of identical twins","authors":"Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge","doi":"10.1109/IJCB.2011.6117476","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117476","url":null,"abstract":"Biometric identification systems must be able to distinguish between individuals even in situations where the bio metric signature may be similar, such as in the case of identical twins. This paper presents experiments done in facial recognition using data from a set of images of twins. This work establishes the current state of facial recognition in regards to twins and the accuracy of current state-of-the art programs in distinguishing between identical twins using three commercial face matchers, Cognitec 8.3.2.0, VeriLook 4.0, and PittPatt 4.2.1 and a baseline matcher employing Local Region PCA. Overall, it was observed that Cognitec had the best performance. All matchers, how ever, saw degradation in performance compared to an experiment where the ability to distinguish unrelated persons was assessed. In particular, lighting and expression seemed to have affected performance the most.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
On-line signature verification using wavelet packet 基于小波包的在线签名验证
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117587
Kaiyue Wang, Yunhong Wang, Zhaoxiang Zhang
In this paper, we propose a novel approach for on-line signature verification using wavelet packet. Signatures are first normalized and resampled, thus they have the same number of sample points. Then, several types of local features are extracted, so that wavelet transform can be applied on them. After that, we conduct experiments to select the best local features, wavelet bases and wavelet packet settings. Also, experiments are carried out to verify the reliability and efficiency of our approach, which performs better than discrete wavelet transform and competes with the state-of-arts.
本文提出了一种基于小波包的在线签名验证方法。首先将签名归一化并重新采样,因此它们具有相同数量的采样点。然后,提取几种局部特征,对其进行小波变换;然后,通过实验选择最佳的局部特征、小波基和小波包设置。通过实验验证了该方法的可靠性和有效性,其性能优于离散小波变换,具有一定的竞争力。
{"title":"On-line signature verification using wavelet packet","authors":"Kaiyue Wang, Yunhong Wang, Zhaoxiang Zhang","doi":"10.1109/IJCB.2011.6117587","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117587","url":null,"abstract":"In this paper, we propose a novel approach for on-line signature verification using wavelet packet. Signatures are first normalized and resampled, thus they have the same number of sample points. Then, several types of local features are extracted, so that wavelet transform can be applied on them. After that, we conduct experiments to select the best local features, wavelet bases and wavelet packet settings. Also, experiments are carried out to verify the reliability and efficiency of our approach, which performs better than discrete wavelet transform and competes with the state-of-arts.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Fusion of region-based representations for gender identification 基于区域表征的性别认同融合
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117602
S. D. Hu, Brendan Jou, Aaron Jaech, M. Savvides
Much of the current work on gender identification relies on legacy datasets of heavily controlled images with minimal facial appearance variations. As studies explore the effects of adding elements of variation into the data, they have met challenges in achieving granular statistical significance due to the limited size of their datasets. In this study, we aim to create a classification framework that is robust to non-studio, uncontrolled, real-world images. We show that the fusion of separate linear classifiers trained on smart-selected local patches achieves 90% accuracy, which is a 5% improvement over a baseline linear classifier on a straightforward pixel representation. These results are reported on our own uncontrolled database of ∼26; 700 images collected from the Web.
目前关于性别识别的大部分工作都依赖于遗留的数据集,这些数据集由严格控制的图像组成,面部外观变化最小。当研究探索在数据中添加变化元素的影响时,由于数据集的规模有限,他们在实现粒度统计显著性方面遇到了挑战。在这项研究中,我们的目标是创建一个对非工作室、不受控制的真实世界图像具有鲁棒性的分类框架。我们表明,在智能选择的局部补丁上训练的独立线性分类器的融合达到了90%的准确率,这比直接像素表示的基线线性分类器提高了5%。这些结果是在我们自己的非受控数据库中报告的~ 26;从网上收集的700张图片。
{"title":"Fusion of region-based representations for gender identification","authors":"S. D. Hu, Brendan Jou, Aaron Jaech, M. Savvides","doi":"10.1109/IJCB.2011.6117602","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117602","url":null,"abstract":"Much of the current work on gender identification relies on legacy datasets of heavily controlled images with minimal facial appearance variations. As studies explore the effects of adding elements of variation into the data, they have met challenges in achieving granular statistical significance due to the limited size of their datasets. In this study, we aim to create a classification framework that is robust to non-studio, uncontrolled, real-world images. We show that the fusion of separate linear classifiers trained on smart-selected local patches achieves 90% accuracy, which is a 5% improvement over a baseline linear classifier on a straightforward pixel representation. These results are reported on our own uncontrolled database of ∼26; 700 images collected from the Web.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Phase registration in a gallery improving gait authentication 一种改进步态认证的画廊相位配准
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117527
T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi
In this paper, we propose a method of inertial sensor-based gait authentication by inter-period phase registration of an owner's gallery. In spite of the importance for gait authentication of constructing a gallery of phase-registered gait patterns, previous implementations just relied on simple methods of period detection based on heuristic knowledge such as local peaks/valleys or local auto-correlation of the gait signals. Consequently, we propose to improve a gait gallery by incorporating a phase registration technique which globally optimizes inter-period phase consistency in an energy minimization framework. However, the previous phase registration technique suffers from a phase distortion problem due to ambiguities in the combination of a periodic signal function and a phase evolution function. We present a linear phase evolution prior to constructing an undistorted gait signal for better matching performance. Experiments using real gait signals from 32 subjects show that the proposed methods outperform the latest methods in the field.
在本文中,我们提出了一种基于惯性传感器的步态认证方法,该方法通过对所有者画廊进行周期间相位注册。尽管构建相位注册步态模式库对于步态认证很重要,但以前的实现仅仅依赖于基于启发式知识(如步态信号的局部峰/谷或局部自相关)的简单周期检测方法。因此,我们提出通过结合相位配准技术来改进步态库,该技术在能量最小化框架中全局优化周期间相位一致性。然而,先前的相位配准技术由于周期信号函数和相位演化函数的组合存在模糊性而存在相位失真问题。为了获得更好的匹配性能,我们在构造未失真的步态信号之前提出了线性相位演化。利用32个被试的真实步态信号进行的实验表明,所提出的方法优于该领域的最新方法。
{"title":"Phase registration in a gallery improving gait authentication","authors":"T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi","doi":"10.1109/IJCB.2011.6117527","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117527","url":null,"abstract":"In this paper, we propose a method of inertial sensor-based gait authentication by inter-period phase registration of an owner's gallery. In spite of the importance for gait authentication of constructing a gallery of phase-registered gait patterns, previous implementations just relied on simple methods of period detection based on heuristic knowledge such as local peaks/valleys or local auto-correlation of the gait signals. Consequently, we propose to improve a gait gallery by incorporating a phase registration technique which globally optimizes inter-period phase consistency in an energy minimization framework. However, the previous phase registration technique suffers from a phase distortion problem due to ambiguities in the combination of a periodic signal function and a phase evolution function. We present a linear phase evolution prior to constructing an undistorted gait signal for better matching performance. Experiments using real gait signals from 32 subjects show that the proposed methods outperform the latest methods in the field.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Fingerprint template protection with Minutia Vicinity Decomposition 指纹模板保护与精细邻近分解
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117597
Zhe Jin, A. Teoh
Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.
Yang & Busch最近提出了精细邻近表示来生成受保护的指纹模板方案[14],得到的受保护模板具有良好的准确性和不对齐性。然而,Yang和Busche的方案极有可能是可逆的[18]。本文提出了一种新的细节表示技术,称为细节邻近分解(MVD),该技术将每个细节邻近分解为四个细节三元组。从指纹特征三元组中提取一组几何不变特征来构建指纹模板。具有随机偏移盐化机制的不变性增强了保护指纹模板的可逆性、可撤销性和性能精度。在FVC2002 DB2上有希望的实验结果证明了我们提出的技术的可行性。
{"title":"Fingerprint template protection with Minutia Vicinity Decomposition","authors":"Zhe Jin, A. Teoh","doi":"10.1109/IJCB.2011.6117597","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117597","url":null,"abstract":"Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Identity leakage mitigation on asymmetric secure sketch 非对称安全草图上的身份泄漏缓解
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117542
Chengfang Fang, Qiming Li, E. Chang
We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliary information extracted from the set of samples, such as variances or weights of the features, in clear. Since the auxiliary information is revealed, an adversary can potentially use it to determine the relationship among multiple sketches, and gather information on the identity of the sketches. In this paper, we give a formal formulation of secure sketch under the asymmetric setting, and propose two schemes that mix the identity-dependent auxiliary information within the sketch. Our analysis shows that while our schemes maintain similar bounds of information loss compared to schemes that reveal the auxiliary information, they offer better privacy protection by limiting the linkages among sketches.
我们考虑在非对称设置下的安全草图构建,即在登记过程中获得多个样本,但在验证过程中只获得一个样本。已知的保护方法在样本的平均值上应用安全草图结构,同时清晰地发布从样本集中提取的辅助信息,例如特征的方差或权重。由于辅助信息是公开的,攻击者可以潜在地使用它来确定多个草图之间的关系,并收集关于草图身份的信息。本文给出了非对称环境下安全草图的形式化表述,并提出了在草图中混合身份相关辅助信息的两种方案。我们的分析表明,虽然我们的方案与显示辅助信息的方案相比保持了相似的信息丢失范围,但它们通过限制草图之间的联系提供了更好的隐私保护。
{"title":"Identity leakage mitigation on asymmetric secure sketch","authors":"Chengfang Fang, Qiming Li, E. Chang","doi":"10.1109/IJCB.2011.6117542","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117542","url":null,"abstract":"We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliary information extracted from the set of samples, such as variances or weights of the features, in clear. Since the auxiliary information is revealed, an adversary can potentially use it to determine the relationship among multiple sketches, and gather information on the identity of the sketches. In this paper, we give a formal formulation of secure sketch under the asymmetric setting, and propose two schemes that mix the identity-dependent auxiliary information within the sketch. Our analysis shows that while our schemes maintain similar bounds of information loss compared to schemes that reveal the auxiliary information, they offer better privacy protection by limiting the linkages among sketches.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of quality-based fusion of face and iris biometrics 基于质量的人脸与虹膜生物特征融合的比较
Pub Date : 2011-10-11 DOI: 10.1109/IJCB.2011.6117481
Peter A. Johnson, Fang Hua, S. Schuckers
Multimodal systems have been used for the increased robustness of biometric recognition tasks. A unique strength of multimodal systems can be found when presented with biometric samples of degraded quality in a subset of the modalities. This study looks at the effect of quality degradation on system performance using the Q-FIRE database. The Q-FIRE database is a multimodal database composed of face and iris biometrics captured at defined quality levels, controlled at acquisition. This database allows for assessment of biometric system performance pertaining to image quality factors. Methods for measuring image quality based on illumination conditions are explored as well as strategies for incorporating these quality metrics into a multimodal fusion algorithm. This paper provides further evidence in a unique dataset that utilizing sample quality metrics into the fusion scheme of a multimodal system improves system performance in non-ideal acquisition environments.
多模态系统已被用于提高生物识别任务的鲁棒性。当在模态子集中呈现质量退化的生物识别样本时,可以发现多模态系统的独特强度。本研究使用Q-FIRE数据库研究质量退化对系统性能的影响。Q-FIRE数据库是一个多模式数据库,由在定义质量水平下捕获的面部和虹膜生物特征组成,在获取时进行控制。该数据库允许评估与图像质量因素有关的生物识别系统性能。本文探讨了基于光照条件的图像质量测量方法,以及将这些质量指标纳入多模态融合算法的策略。本文在一个独特的数据集中提供了进一步的证据,证明将样本质量度量纳入多模态系统的融合方案可以提高非理想采集环境下的系统性能。
{"title":"Comparison of quality-based fusion of face and iris biometrics","authors":"Peter A. Johnson, Fang Hua, S. Schuckers","doi":"10.1109/IJCB.2011.6117481","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117481","url":null,"abstract":"Multimodal systems have been used for the increased robustness of biometric recognition tasks. A unique strength of multimodal systems can be found when presented with biometric samples of degraded quality in a subset of the modalities. This study looks at the effect of quality degradation on system performance using the Q-FIRE database. The Q-FIRE database is a multimodal database composed of face and iris biometrics captured at defined quality levels, controlled at acquisition. This database allows for assessment of biometric system performance pertaining to image quality factors. Methods for measuring image quality based on illumination conditions are explored as well as strategies for incorporating these quality metrics into a multimodal fusion algorithm. This paper provides further evidence in a unique dataset that utilizing sample quality metrics into the fusion scheme of a multimodal system improves system performance in non-ideal acquisition environments.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics 基于自由文本击键动力学的实时环境中的连续和非侵入性身份验证
Pub Date : 2011-10-01 DOI: 10.1109/IJCB.2011.6117552
Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
互联网服务是我们大多数人日常活动的重要组成部分。这些服务具有复杂的身份验证要求,普通互联网用户可能无法处理这些要求。例如,安全密码的管理会产生额外的开销,而由于可用性的原因,这种开销常常被忽略。此外,基于密码的方法仅适用于初始登录,不能防止未解锁工作站的攻击。在本文中,我们提供了一种基于行为生物识别的非侵入式身份验证方案,该方案连续使用基于自由文本的击键动力学来实时验证用户的身份。我们从四个方面改进了现有的基于击键动力学的验证方案。首先,我们提高了可伸缩性,我们使用恒定数量的用户而不是整个用户空间来验证目标用户的身份。其次,我们提供了一个自适应的用户模型,使我们的解决方案能够在验证决策中考虑用户行为的变化。接下来,我们确定一个新的距离度量,它使我们能够用较短的文本验证用户的身份。第四,我们减少了错误结果的数量。我们的解决方案是根据用户在日常活动中与邮箱交互时收集的数据集进行评估的。
{"title":"Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics","authors":"Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak","doi":"10.1109/IJCB.2011.6117552","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117552","url":null,"abstract":"Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries 生物安全签名评估活动(ESRA'2011):评估基于质量的熟练伪造类别的系统
Pub Date : 2011-10-01 DOI: 10.1109/IJCB.2011.6117487
N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu
In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA'2011). The objective of ESRA'2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems' performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems' resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of “bad” quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered.
在本文中,我们介绍了生物安全签名评估活动(ESRA'2011)的主要结果。ESRA'2011的目标是通过两个不同的任务来评估不同的在线签名系统对根据其质量自动分类的熟练伪造品的抵抗力。任务1的目的是研究仅在坐标时间函数下获取条件(数字化平板电脑与PDA)对系统性能的影响。两个生物安全数据集DS2和DS3使这成为可能,因为它们包含来自相同的382人的数据,分别在数字化仪和PDA上获得。然后,任务2旨在评估数字化仪上可用的五个时间函数(坐标,压力,笔倾角)对系统抵抗不同质量的熟练伪造的贡献。本文报告并分析了这两项任务中涉及的13个系统的结果。我们观察到,就“坏”伪造品的性能而言,最好的系统不一定是最能抵抗技术伪造品质量提高的系统。此外,我们注意到,移动条件仍然威胁着伪造品的质量。最后,当将笔倾斜时间函数加入压力和坐标时,我们发现系统之间在性能方面的差距比只考虑笔坐标和压力时更大。
{"title":"BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries","authors":"N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu","doi":"10.1109/IJCB.2011.6117487","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117487","url":null,"abstract":"In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA'2011). The objective of ESRA'2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems' performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems' resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of “bad” quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2011 International Joint Conference on Biometrics (IJCB)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1