Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117506
A. Arakala, Stephen A. Davis, K. Horadam
We represent the retina vessel pattern as a spatial relational graph, and match features using error-correcting graph matching. We study the distinctiveness of the nodes (branching and crossing points) compared with that of the edges and other substructures (nodes of degree k, paths of length k). On a training set from the VARIA database, we show that as well as nodes, three other types of graph sub-structure completely or almost completely separate genuine from imposter comparisons. We show that combining nodes and edges can improve the separation distance. We identify two retina graph statistics, the edge-to-node ratio and the variance of the degree distribution, that have low correlation with node match score.
{"title":"Retina features based on vessel graph substructures","authors":"A. Arakala, Stephen A. Davis, K. Horadam","doi":"10.1109/IJCB.2011.6117506","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117506","url":null,"abstract":"We represent the retina vessel pattern as a spatial relational graph, and match features using error-correcting graph matching. We study the distinctiveness of the nodes (branching and crossing points) compared with that of the edges and other substructures (nodes of degree k, paths of length k). On a training set from the VARIA database, we show that as well as nodes, three other types of graph sub-structure completely or almost completely separate genuine from imposter comparisons. We show that combining nodes and edges can improve the separation distance. We identify two retina graph statistics, the edge-to-node ratio and the variance of the degree distribution, that have low correlation with node match score.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117476
Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge
Biometric identification systems must be able to distinguish between individuals even in situations where the bio metric signature may be similar, such as in the case of identical twins. This paper presents experiments done in facial recognition using data from a set of images of twins. This work establishes the current state of facial recognition in regards to twins and the accuracy of current state-of-the art programs in distinguishing between identical twins using three commercial face matchers, Cognitec 8.3.2.0, VeriLook 4.0, and PittPatt 4.2.1 and a baseline matcher employing Local Region PCA. Overall, it was observed that Cognitec had the best performance. All matchers, how ever, saw degradation in performance compared to an experiment where the ability to distinguish unrelated persons was assessed. In particular, lighting and expression seemed to have affected performance the most.
生物识别系统必须能够区分个体,即使在生物特征签名可能相似的情况下,例如在同卵双胞胎的情况下。本文介绍了使用一组双胞胎图像数据进行面部识别的实验。这项工作建立了双胞胎面部识别的当前状态,以及当前最先进的程序在区分同卵双胞胎方面的准确性,使用三种商业面部匹配器,Cognitec 8.3.2.0, VeriLook 4.0和PittPatt 4.2.1,以及使用Local Region PCA的基线匹配器。总的来说,我们观察到Cognitec的表现最好。然而,与一项评估区分不相关人员能力的实验相比,所有匹配者的表现都有所下降。特别是,灯光和表情似乎对表现影响最大。
{"title":"Facial recognition of identical twins","authors":"Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge","doi":"10.1109/IJCB.2011.6117476","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117476","url":null,"abstract":"Biometric identification systems must be able to distinguish between individuals even in situations where the bio metric signature may be similar, such as in the case of identical twins. This paper presents experiments done in facial recognition using data from a set of images of twins. This work establishes the current state of facial recognition in regards to twins and the accuracy of current state-of-the art programs in distinguishing between identical twins using three commercial face matchers, Cognitec 8.3.2.0, VeriLook 4.0, and PittPatt 4.2.1 and a baseline matcher employing Local Region PCA. Overall, it was observed that Cognitec had the best performance. All matchers, how ever, saw degradation in performance compared to an experiment where the ability to distinguish unrelated persons was assessed. In particular, lighting and expression seemed to have affected performance the most.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117587
Kaiyue Wang, Yunhong Wang, Zhaoxiang Zhang
In this paper, we propose a novel approach for on-line signature verification using wavelet packet. Signatures are first normalized and resampled, thus they have the same number of sample points. Then, several types of local features are extracted, so that wavelet transform can be applied on them. After that, we conduct experiments to select the best local features, wavelet bases and wavelet packet settings. Also, experiments are carried out to verify the reliability and efficiency of our approach, which performs better than discrete wavelet transform and competes with the state-of-arts.
{"title":"On-line signature verification using wavelet packet","authors":"Kaiyue Wang, Yunhong Wang, Zhaoxiang Zhang","doi":"10.1109/IJCB.2011.6117587","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117587","url":null,"abstract":"In this paper, we propose a novel approach for on-line signature verification using wavelet packet. Signatures are first normalized and resampled, thus they have the same number of sample points. Then, several types of local features are extracted, so that wavelet transform can be applied on them. After that, we conduct experiments to select the best local features, wavelet bases and wavelet packet settings. Also, experiments are carried out to verify the reliability and efficiency of our approach, which performs better than discrete wavelet transform and competes with the state-of-arts.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117602
S. D. Hu, Brendan Jou, Aaron Jaech, M. Savvides
Much of the current work on gender identification relies on legacy datasets of heavily controlled images with minimal facial appearance variations. As studies explore the effects of adding elements of variation into the data, they have met challenges in achieving granular statistical significance due to the limited size of their datasets. In this study, we aim to create a classification framework that is robust to non-studio, uncontrolled, real-world images. We show that the fusion of separate linear classifiers trained on smart-selected local patches achieves 90% accuracy, which is a 5% improvement over a baseline linear classifier on a straightforward pixel representation. These results are reported on our own uncontrolled database of ∼26; 700 images collected from the Web.
{"title":"Fusion of region-based representations for gender identification","authors":"S. D. Hu, Brendan Jou, Aaron Jaech, M. Savvides","doi":"10.1109/IJCB.2011.6117602","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117602","url":null,"abstract":"Much of the current work on gender identification relies on legacy datasets of heavily controlled images with minimal facial appearance variations. As studies explore the effects of adding elements of variation into the data, they have met challenges in achieving granular statistical significance due to the limited size of their datasets. In this study, we aim to create a classification framework that is robust to non-studio, uncontrolled, real-world images. We show that the fusion of separate linear classifiers trained on smart-selected local patches achieves 90% accuracy, which is a 5% improvement over a baseline linear classifier on a straightforward pixel representation. These results are reported on our own uncontrolled database of ∼26; 700 images collected from the Web.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117527
T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi
In this paper, we propose a method of inertial sensor-based gait authentication by inter-period phase registration of an owner's gallery. In spite of the importance for gait authentication of constructing a gallery of phase-registered gait patterns, previous implementations just relied on simple methods of period detection based on heuristic knowledge such as local peaks/valleys or local auto-correlation of the gait signals. Consequently, we propose to improve a gait gallery by incorporating a phase registration technique which globally optimizes inter-period phase consistency in an energy minimization framework. However, the previous phase registration technique suffers from a phase distortion problem due to ambiguities in the combination of a periodic signal function and a phase evolution function. We present a linear phase evolution prior to constructing an undistorted gait signal for better matching performance. Experiments using real gait signals from 32 subjects show that the proposed methods outperform the latest methods in the field.
{"title":"Phase registration in a gallery improving gait authentication","authors":"T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi","doi":"10.1109/IJCB.2011.6117527","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117527","url":null,"abstract":"In this paper, we propose a method of inertial sensor-based gait authentication by inter-period phase registration of an owner's gallery. In spite of the importance for gait authentication of constructing a gallery of phase-registered gait patterns, previous implementations just relied on simple methods of period detection based on heuristic knowledge such as local peaks/valleys or local auto-correlation of the gait signals. Consequently, we propose to improve a gait gallery by incorporating a phase registration technique which globally optimizes inter-period phase consistency in an energy minimization framework. However, the previous phase registration technique suffers from a phase distortion problem due to ambiguities in the combination of a periodic signal function and a phase evolution function. We present a linear phase evolution prior to constructing an undistorted gait signal for better matching performance. Experiments using real gait signals from 32 subjects show that the proposed methods outperform the latest methods in the field.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117597
Zhe Jin, A. Teoh
Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.
Yang & Busch最近提出了精细邻近表示来生成受保护的指纹模板方案[14],得到的受保护模板具有良好的准确性和不对齐性。然而,Yang和Busche的方案极有可能是可逆的[18]。本文提出了一种新的细节表示技术,称为细节邻近分解(MVD),该技术将每个细节邻近分解为四个细节三元组。从指纹特征三元组中提取一组几何不变特征来构建指纹模板。具有随机偏移盐化机制的不变性增强了保护指纹模板的可逆性、可撤销性和性能精度。在FVC2002 DB2上有希望的实验结果证明了我们提出的技术的可行性。
{"title":"Fingerprint template protection with Minutia Vicinity Decomposition","authors":"Zhe Jin, A. Teoh","doi":"10.1109/IJCB.2011.6117597","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117597","url":null,"abstract":"Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117542
Chengfang Fang, Qiming Li, E. Chang
We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliary information extracted from the set of samples, such as variances or weights of the features, in clear. Since the auxiliary information is revealed, an adversary can potentially use it to determine the relationship among multiple sketches, and gather information on the identity of the sketches. In this paper, we give a formal formulation of secure sketch under the asymmetric setting, and propose two schemes that mix the identity-dependent auxiliary information within the sketch. Our analysis shows that while our schemes maintain similar bounds of information loss compared to schemes that reveal the auxiliary information, they offer better privacy protection by limiting the linkages among sketches.
{"title":"Identity leakage mitigation on asymmetric secure sketch","authors":"Chengfang Fang, Qiming Li, E. Chang","doi":"10.1109/IJCB.2011.6117542","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117542","url":null,"abstract":"We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliary information extracted from the set of samples, such as variances or weights of the features, in clear. Since the auxiliary information is revealed, an adversary can potentially use it to determine the relationship among multiple sketches, and gather information on the identity of the sketches. In this paper, we give a formal formulation of secure sketch under the asymmetric setting, and propose two schemes that mix the identity-dependent auxiliary information within the sketch. Our analysis shows that while our schemes maintain similar bounds of information loss compared to schemes that reveal the auxiliary information, they offer better privacy protection by limiting the linkages among sketches.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-11DOI: 10.1109/IJCB.2011.6117481
Peter A. Johnson, Fang Hua, S. Schuckers
Multimodal systems have been used for the increased robustness of biometric recognition tasks. A unique strength of multimodal systems can be found when presented with biometric samples of degraded quality in a subset of the modalities. This study looks at the effect of quality degradation on system performance using the Q-FIRE database. The Q-FIRE database is a multimodal database composed of face and iris biometrics captured at defined quality levels, controlled at acquisition. This database allows for assessment of biometric system performance pertaining to image quality factors. Methods for measuring image quality based on illumination conditions are explored as well as strategies for incorporating these quality metrics into a multimodal fusion algorithm. This paper provides further evidence in a unique dataset that utilizing sample quality metrics into the fusion scheme of a multimodal system improves system performance in non-ideal acquisition environments.
{"title":"Comparison of quality-based fusion of face and iris biometrics","authors":"Peter A. Johnson, Fang Hua, S. Schuckers","doi":"10.1109/IJCB.2011.6117481","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117481","url":null,"abstract":"Multimodal systems have been used for the increased robustness of biometric recognition tasks. A unique strength of multimodal systems can be found when presented with biometric samples of degraded quality in a subset of the modalities. This study looks at the effect of quality degradation on system performance using the Q-FIRE database. The Q-FIRE database is a multimodal database composed of face and iris biometrics captured at defined quality levels, controlled at acquisition. This database allows for assessment of biometric system performance pertaining to image quality factors. Methods for measuring image quality based on illumination conditions are explored as well as strategies for incorporating these quality metrics into a multimodal fusion algorithm. This paper provides further evidence in a unique dataset that utilizing sample quality metrics into the fusion scheme of a multimodal system improves system performance in non-ideal acquisition environments.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-01DOI: 10.1109/IJCB.2011.6117552
Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
{"title":"Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics","authors":"Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak","doi":"10.1109/IJCB.2011.6117552","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117552","url":null,"abstract":"Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-01DOI: 10.1109/IJCB.2011.6117487
N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu
In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA'2011). The objective of ESRA'2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems' performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems' resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of “bad” quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered.
{"title":"BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries","authors":"N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu","doi":"10.1109/IJCB.2011.6117487","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117487","url":null,"abstract":"In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA'2011). The objective of ESRA'2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems' performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems' resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of “bad” quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}