首页 > 最新文献

2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)最新文献

英文 中文
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement “我不喜欢把我的脸放到网上!”:人脸生物识别技术替代CAPTCHA的可行性研究
Kat Krol, S. Parkin, M. Sasse
Biometric technologies have the potential to reduce the effort involved in securing personal activities online, such as purchasing goods and services. Verifying that a user session on a website is attributable to a real human is one candidate application, especially as the existing CAPTCHA technology is burdensome and can frustrate users. Here we examine the viability of biometrics as part of the consumer experience in this space. We invited 87 participants to take part in a lab study, using a realistic ticket-buying website with a range of human verification mechanisms including a face biometric technology. User perceptions and acceptance of the various security technologies were explored through interviews and a range of questionnaires within the study. The results show that some users wanted reassurance that their personal image will be protected or discarded after verifying, whereas others felt that if they saw enough people using face biometrics they would feel assured that it was trustworthy. Face biometrics were seen by some participants to be more suitable for high-security contexts, and by others as providing extra personal data that had unacceptable privacy implications.
生物识别技术有可能减少保护个人在线活动(如购买商品和服务)所涉及的努力。验证网站上的用户会话是否属于真人是一个候选应用程序,特别是因为现有的CAPTCHA技术很麻烦,可能会让用户感到沮丧。在这里,我们将研究生物识别技术作为该领域消费者体验的一部分的可行性。我们邀请了87名参与者参加一项实验室研究,使用一个具有一系列人体验证机制的逼真购票网站,包括面部生物识别技术。用户对各种安全技术的认知和接受程度通过访谈和一系列调查问卷进行了探讨。研究结果显示,一些用户想要确保他们的个人形象在验证后会受到保护或被丢弃,而另一些用户则认为,如果他们看到足够多的人使用面部生物识别技术,他们就会确信这是值得信赖的。一些参与者认为面部生物识别技术更适合高安全性环境,而另一些人则认为它提供了额外的个人数据,具有不可接受的隐私影响。
{"title":"\"I don't like putting my face on the Internet!\": An acceptance study of face biometrics as a CAPTCHA replacement","authors":"Kat Krol, S. Parkin, M. Sasse","doi":"10.1109/ISBA.2016.7477235","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477235","url":null,"abstract":"Biometric technologies have the potential to reduce the effort involved in securing personal activities online, such as purchasing goods and services. Verifying that a user session on a website is attributable to a real human is one candidate application, especially as the existing CAPTCHA technology is burdensome and can frustrate users. Here we examine the viability of biometrics as part of the consumer experience in this space. We invited 87 participants to take part in a lab study, using a realistic ticket-buying website with a range of human verification mechanisms including a face biometric technology. User perceptions and acceptance of the various security technologies were explored through interviews and a range of questionnaires within the study. The results show that some users wanted reassurance that their personal image will be protected or discarded after verifying, whereas others felt that if they saw enough people using face biometrics they would feel assured that it was trustworthy. Face biometrics were seen by some participants to be more suitable for high-security contexts, and by others as providing extra personal data that had unacceptable privacy implications.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis of gait recognition with large perspective distortion 具有大视角失真的步态识别性能分析
Fatimah Abdulsattar, J. Carter
In real security scenarios, gait data may be highly distorted due to perspective effects and there may be significant change in appearance, orientation and occlusion between different measurements. To deal with this problem, a new identification technique is proposed by reconstructing 3D models of the walking subject, which are then used to identify subject images from an arbitrary camera. 3D models in one gait cycle are aligned to match silhouettes in a 2D gait cycle by estimating the positions of a 3D and 2D gait cycles in a 3D space. This allows the gait data in a gallery and probe share the same appearance, perspective and occlusion. Generic Fourier Descriptors are used as gait features. The performance is evaluated using a new collected dataset of 17 subjects walking in a narrow walkway. A Correct Classification Rate of 98.8% is achieved. This high recognition rate has still been achieved using a modest number of features. The analysis indicate that the technique can handle truncated gait cycles of different length and is insensitive to noisy silhouettes. However, calibration errors have a negative impact upon recognition performance.
在真实的安全场景中,由于视角效应的影响,步态数据可能会高度扭曲,不同测量值之间的外观、方向和遮挡可能会发生显著变化。为了解决这一问题,提出了一种新的识别技术,通过重建行走主体的三维模型,然后将其用于识别来自任意相机的主体图像。通过估计三维和二维步态周期在三维空间中的位置,对一个步态周期中的三维模型进行对齐,以匹配二维步态周期中的轮廓。这使得画廊和探头中的步态数据共享相同的外观,视角和遮挡。采用通用傅里叶描述子作为步态特征。使用新收集的17个受试者在狭窄的人行道上行走的数据集来评估性能。分类正确率达到98.8%。这种高识别率仍然是通过使用少量的特征来实现的。分析表明,该方法可以处理不同长度的截断步态周期,并且对噪声轮廓不敏感。然而,标定误差对识别性能有负面影响。
{"title":"Performance analysis of gait recognition with large perspective distortion","authors":"Fatimah Abdulsattar, J. Carter","doi":"10.1109/ISBA.2016.7477229","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477229","url":null,"abstract":"In real security scenarios, gait data may be highly distorted due to perspective effects and there may be significant change in appearance, orientation and occlusion between different measurements. To deal with this problem, a new identification technique is proposed by reconstructing 3D models of the walking subject, which are then used to identify subject images from an arbitrary camera. 3D models in one gait cycle are aligned to match silhouettes in a 2D gait cycle by estimating the positions of a 3D and 2D gait cycles in a 3D space. This allows the gait data in a gallery and probe share the same appearance, perspective and occlusion. Generic Fourier Descriptors are used as gait features. The performance is evaluated using a new collected dataset of 17 subjects walking in a narrow walkway. A Correct Classification Rate of 98.8% is achieved. This high recognition rate has still been achieved using a modest number of features. The analysis indicate that the technique can handle truncated gait cycles of different length and is insensitive to noisy silhouettes. However, calibration errors have a negative impact upon recognition performance.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards human-assisted signature recognition: Improving biometric systems through attribute-based recognition 迈向人类辅助签名识别:通过基于属性的识别改进生物识别系统
D. Morocho, A. Morales, Julian Fierrez, R. Vera-Rodríguez
This work explores human-assisted schemes for improving automatic signature recognition systems. We present a crowdsourcing experiment to establish the human baseline performance for signature recognition tasks and a novel attribute-based semi-automatic signature verification system inspired in FDE analysis. We present different experiments over a public database and a self-developed tool for the manual annotation of signature attributes. The results demonstrate the benefits of attribute-based recognition approaches and encourage to further research in the capabilities of human intervention to improve the performance of automatic signature recognition systems.
这项工作探讨了改进自动签名识别系统的人工辅助方案。我们提出了一个众包实验来建立签名识别任务的人类基线性能,并在FDE分析中启发了一种新的基于属性的半自动签名验证系统。我们在一个公共数据库和一个自行开发的工具上进行了不同的实验,用于手动标注签名属性。结果表明了基于属性的识别方法的优点,并鼓励进一步研究人类干预的能力,以提高自动签名识别系统的性能。
{"title":"Towards human-assisted signature recognition: Improving biometric systems through attribute-based recognition","authors":"D. Morocho, A. Morales, Julian Fierrez, R. Vera-Rodríguez","doi":"10.1109/ISBA.2016.7477227","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477227","url":null,"abstract":"This work explores human-assisted schemes for improving automatic signature recognition systems. We present a crowdsourcing experiment to establish the human baseline performance for signature recognition tasks and a novel attribute-based semi-automatic signature verification system inspired in FDE analysis. We present different experiments over a public database and a self-developed tool for the manual annotation of signature attributes. The results demonstrate the benefits of attribute-based recognition approaches and encourage to further research in the capabilities of human intervention to improve the performance of automatic signature recognition systems.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Linebased end-to-display encryption for secure documents 基于行的端到端显示加密,用于安全文档
S. Burg, Pranav Channakeshava, O. Bringmann
To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents.
为了保护数据免受特洛伊木马的窃取,一些常见的方法(如端到端加密)无法对抗此类恶意尝试,因为它们没有考虑到用户端点的漏洞。在端点上解密的任何数据都可以被攻击者看到。防止这种数据丢失的一种技术是在像素域中使用加密,并使用额外的硬件来解密图形流。这是由端到端显示加密完成的,它解密终端和显示之间的数据,确保静态数据始终是加密的。在本文中,我们提出了一种基于线的加密方法,它是一种更加用户友好和改进的端到端加密设计,它可以通过提供对机密文件的安全访问来有效地打击企业间谍活动。
{"title":"Linebased end-to-display encryption for secure documents","authors":"S. Burg, Pranav Channakeshava, O. Bringmann","doi":"10.1109/ISBA.2016.7477242","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477242","url":null,"abstract":"To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vein point cloud registration algorithm for multi-pose hand vein authentication 多姿态手部静脉认证的静脉点云配准算法
Yong Qi, Ya Zhou, Chang Zhou, Xinran Hu, Xiaoming Hu
Traditional vein recognition technology is usually based on the 2D infrared images of hand vein. However, the hand vein patterns extracted from 2D images are seriously distorted with hand posture changes. A point cloud matching vein recognition system based on Kernel Correlation(KC) algorithm is designed, which provides a new perspective to hand vein recognition but also suffers from posture change because KC value is sensitive to coordinate shift. In this paper, a vein point cloud registration algorithm is proposed to improve the vein authentication under multi-pose. Experiments show that the point cloud registration algorithm can effectively improve the recognition rate. After the point cloud registration, when the hand posture changes limited to the range ± 20 degrees, the system can keep more than 90% recognition rate, the corresponding error rate is only 4%.
传统的静脉识别技术通常是基于手部静脉的二维红外图像。然而,从二维图像中提取的手部静脉图案会随着手部姿势的变化而严重失真。设计了一种基于核相关(KC)算法的点云匹配静脉识别系统,该系统为手部静脉识别提供了新的视角,但由于KC值对坐标移动敏感,因此存在姿势变化的问题。本文提出了一种静脉点云配准算法,以改进多姿态下的静脉认证。实验表明,点云配准算法能有效提高图像识别率。经过点云配准后,当手部姿态变化限制在±20度范围内时,系统能保持90%以上的识别率,相应的错误率仅为4%。
{"title":"Vein point cloud registration algorithm for multi-pose hand vein authentication","authors":"Yong Qi, Ya Zhou, Chang Zhou, Xinran Hu, Xiaoming Hu","doi":"10.1109/ISBA.2016.7477248","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477248","url":null,"abstract":"Traditional vein recognition technology is usually based on the 2D infrared images of hand vein. However, the hand vein patterns extracted from 2D images are seriously distorted with hand posture changes. A point cloud matching vein recognition system based on Kernel Correlation(KC) algorithm is designed, which provides a new perspective to hand vein recognition but also suffers from posture change because KC value is sensitive to coordinate shift. In this paper, a vein point cloud registration algorithm is proposed to improve the vein authentication under multi-pose. Experiments show that the point cloud registration algorithm can effectively improve the recognition rate. After the point cloud registration, when the hand posture changes limited to the range ± 20 degrees, the system can keep more than 90% recognition rate, the corresponding error rate is only 4%.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quality based classification of images for illumination invariant face recognition 光照不变人脸识别中基于质量的图像分类
Bharath Subramanyam, Piyush Joshi, M. Meena, S. Prakash
Quality of an image plays a fundamental role in taking vital decisions. In various walks of life, one such decision is personal identification. Hence, it's assessment is essential prior to using it in many biometric applications such as face recognition, iris, fingerprint analysis etc. The proposed technique classifies images into four classes based on their illumination and contrast quality. Then, the proposed technique chooses the most suitable enhancement technique for particular class to get best possible image. The proposed technique has been experimented on the Yale B database and the results obtained are 97.14% accurate on an average in terms of the correct classification of images into the appropriate classes. In another experiment where 50 random images of 30 random subjects were selected and this process repeated over 10 times, the classifier was 99.17% accurate in classifying the images.
在做出重要决定时,图像的质量起着至关重要的作用。在各行各业,一个这样的决定是个人身份。因此,在许多生物识别应用中,如面部识别、虹膜、指纹分析等,对其进行评估是必不可少的。该方法根据图像的照度和对比度质量将图像分为四类。然后,针对特定类别选择最合适的增强技术以获得最佳图像。在耶鲁大学B数据库上进行了实验,结果表明,将图像正确分类到适当的类别中,平均准确率为97.14%。在另一个实验中,随机选择30个随机受试者的50张随机图像,重复此过程10次以上,分类器对图像的分类准确率为99.17%。
{"title":"Quality based classification of images for illumination invariant face recognition","authors":"Bharath Subramanyam, Piyush Joshi, M. Meena, S. Prakash","doi":"10.1109/ISBA.2016.7477245","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477245","url":null,"abstract":"Quality of an image plays a fundamental role in taking vital decisions. In various walks of life, one such decision is personal identification. Hence, it's assessment is essential prior to using it in many biometric applications such as face recognition, iris, fingerprint analysis etc. The proposed technique classifies images into four classes based on their illumination and contrast quality. Then, the proposed technique chooses the most suitable enhancement technique for particular class to get best possible image. The proposed technique has been experimented on the Yale B database and the results obtained are 97.14% accurate on an average in terms of the correct classification of images into the appropriate classes. In another experiment where 50 random images of 30 random subjects were selected and this process repeated over 10 times, the classifier was 99.17% accurate in classifying the images.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Combining keystroke and mouse dynamics for continuous user authentication and identification 结合击键和鼠标动态连续用户认证和识别
Soumik Mondal, Patrick A. H. Bours
In this paper, we analyze the performance of a continuous user authentication and identification system for a PC under various analysis techniques. We applied a novel identification technique called Pairwise User Coupling (PUC) on our own dataset for the analysis. This dataset is a combination of keystroke and mouse usage behaviour data. We obtained an identification accuracy of 62.2% for a closed-set experiment, where the system needs on average of 471 actions to detect an impostor. In case of an open-set experiment the Detection and Identification Rate (DIR) of 58.9% was obtained, where the system needs on average of 333 actions to detect an impostor.
在本文中,我们分析了一个PC机连续用户认证和身份识别系统在各种分析技术下的性能。我们在自己的数据集上应用了一种称为成对用户耦合(PUC)的新型识别技术进行分析。此数据集是击键和鼠标使用行为数据的组合。在封闭集实验中,我们获得了62.2%的识别准确率,其中系统平均需要471个动作来检测冒名顶替者。在开放集实验中,检测和识别率(DIR)为58.9%,其中系统平均需要333个动作来检测冒名顶替者。
{"title":"Combining keystroke and mouse dynamics for continuous user authentication and identification","authors":"Soumik Mondal, Patrick A. H. Bours","doi":"10.1109/ISBA.2016.7477228","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477228","url":null,"abstract":"In this paper, we analyze the performance of a continuous user authentication and identification system for a PC under various analysis techniques. We applied a novel identification technique called Pairwise User Coupling (PUC) on our own dataset for the analysis. This dataset is a combination of keystroke and mouse usage behaviour data. We obtained an identification accuracy of 62.2% for a closed-set experiment, where the system needs on average of 471 actions to detect an impostor. In case of an open-set experiment the Detection and Identification Rate (DIR) of 58.9% was obtained, where the system needs on average of 333 actions to detect an impostor.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128928791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Robust transgender face recognition: Approach based on appearance and therapy factors 稳健跨性别人脸识别:基于外观和治疗因素的方法
Vijay Kumar, Ramachandra Raghavendra, A. Namboodiri, C. Busch
Transgender face recognition is gaining increasing attention in the face recognition community because of its potential in real life applications. Despite extensive progress in traditional face recognition domain, it is very challenging to recognize faces under transgender setting. The gender transformation results in significant face variations, both in shape and texture gradually over time. This introduces additional complexities to existing face recognition algorithms to achieve a reliable performance. In this paper, we present a novel framework that incorporates appearance factor and a transformation factor caused due to Hormone Replacement Therapy (HRT) for recognition. To this extent, we employ the Hidden Factor Analysis (HFA) to jointly model a face under therapy as a linear combination of appearance and transformation factors. This is based on the intuition that the appearance factor captures the features that are unaffected by the therapy and transformation factor captures the feature changes due to therapy. Extensive experiments carried out on publicly available HRT transgender face database shows the efficacy of the proposed scheme with a recognition accuracy of 82.36%.
跨性别人脸识别因其在现实生活中的应用潜力而越来越受到人脸识别界的关注。尽管传统的人脸识别领域取得了广泛的进展,但跨性别背景下的人脸识别仍然具有很大的挑战性。随着时间的推移,性别的转变导致面部的形状和质地都发生了显著的变化。这给现有的人脸识别算法带来了额外的复杂性,以实现可靠的性能。在本文中,我们提出了一个新的框架,将外观因素和激素替代疗法(HRT)引起的转化因素结合起来进行识别。在这种程度上,我们使用隐藏因素分析(HFA)来共同模拟治疗中的面部,作为外观和转换因素的线性组合。这是基于这样的直觉,即外观因素捕获不受治疗影响的特征,而转换因素捕获由于治疗而产生的特征变化。在公开的HRT跨性别人脸数据库上进行的大量实验表明,该方法的识别准确率达到82.36%。
{"title":"Robust transgender face recognition: Approach based on appearance and therapy factors","authors":"Vijay Kumar, Ramachandra Raghavendra, A. Namboodiri, C. Busch","doi":"10.1109/ISBA.2016.7477226","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477226","url":null,"abstract":"Transgender face recognition is gaining increasing attention in the face recognition community because of its potential in real life applications. Despite extensive progress in traditional face recognition domain, it is very challenging to recognize faces under transgender setting. The gender transformation results in significant face variations, both in shape and texture gradually over time. This introduces additional complexities to existing face recognition algorithms to achieve a reliable performance. In this paper, we present a novel framework that incorporates appearance factor and a transformation factor caused due to Hormone Replacement Therapy (HRT) for recognition. To this extent, we employ the Hidden Factor Analysis (HFA) to jointly model a face under therapy as a linear combination of appearance and transformation factors. This is based on the intuition that the appearance factor captures the features that are unaffected by the therapy and transformation factor captures the feature changes due to therapy. Extensive experiments carried out on publicly available HRT transgender face database shows the efficacy of the proposed scheme with a recognition accuracy of 82.36%.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera 手背静脉验证系统对智能手机摄像头欺骗攻击的脆弱性评估
I. Patil, Shruti Bhilare, Vivek Kanhangad
This paper investigates vulnerability of the dorsal hand-vein biometric systems to display based presentation attacks. The database collected for our experiments consists of624 real and 312 spoof images from left and right hands of 52 subjects, of which 32 are males and 20 are females. In order to assess the vulnerability of the system, we have created artefacts in a more realistic scenario assuming no access to real images in the database. Specifically, a smart-phone camera is used to capture user's hand images, which are then displayed on its screen and presented to the biometric sensor as artefacts. Scale invariant feature transform (SIFT) based image descriptors are employed for image matching. For detection of keypoints, we have considered three techniques, namely, difference of Gaussian (DoG), Harris-Laplace and Hessian-Laplace and performed comparative assessment of vulnerability. Worst-case vulnerability of these approaches in terms of spoof false acceptance rate (SFAR) has been found to be 61.8%, 46.1% and 49.03%, respectively. SFAR values obtained in our experiments are too high to be acceptable for real-world deployments and indicate that dorsal hand-vein biometric systems are also vulnerable to spoofing attacks.
本文研究了手背静脉生物识别系统对基于显示的攻击的脆弱性。我们实验收集的数据库包括52名受试者的左右手图像624张真实图像和312张恶搞图像,其中男性32张,女性20张。为了评估系统的脆弱性,我们在一个更现实的场景中创建了工件,假设无法访问数据库中的真实图像。具体来说,智能手机摄像头用来捕捉用户的手部图像,然后将其显示在屏幕上,并作为人工制品呈现给生物识别传感器。采用基于尺度不变特征变换(SIFT)的图像描述符进行图像匹配。对于关键点的检测,我们考虑了三种技术,即高斯差分法(DoG)、Harris-Laplace和Hessian-Laplace,并对漏洞进行了比较评估。在欺骗误接受率(SFAR)方面,这些方法的最坏脆弱性分别为61.8%,46.1%和49.03%。在我们的实验中获得的SFAR值太高,无法接受现实世界的部署,并且表明手背静脉生物识别系统也容易受到欺骗攻击。
{"title":"Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera","authors":"I. Patil, Shruti Bhilare, Vivek Kanhangad","doi":"10.1109/ISBA.2016.7477232","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477232","url":null,"abstract":"This paper investigates vulnerability of the dorsal hand-vein biometric systems to display based presentation attacks. The database collected for our experiments consists of624 real and 312 spoof images from left and right hands of 52 subjects, of which 32 are males and 20 are females. In order to assess the vulnerability of the system, we have created artefacts in a more realistic scenario assuming no access to real images in the database. Specifically, a smart-phone camera is used to capture user's hand images, which are then displayed on its screen and presented to the biometric sensor as artefacts. Scale invariant feature transform (SIFT) based image descriptors are employed for image matching. For detection of keypoints, we have considered three techniques, namely, difference of Gaussian (DoG), Harris-Laplace and Hessian-Laplace and performed comparative assessment of vulnerability. Worst-case vulnerability of these approaches in terms of spoof false acceptance rate (SFAR) has been found to be 61.8%, 46.1% and 49.03%, respectively. SFAR values obtained in our experiments are too high to be acceptable for real-world deployments and indicate that dorsal hand-vein biometric systems are also vulnerable to spoofing attacks.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Accessibility evaluation of a mobile biometric recognition system 移动生物识别系统的可访问性评价
Ramón Blanco-Gonzalo, R. Sánchez-Reillo, Carlos Sanchez-Redondo, Jose Luis Alonso-Aguilera
Biometric recognition systems have highlighted the possibility of easily performing common actions (which require personal authentication) to those users with accessibility concerns. Nevertheless, this topic has not been deeply studied yet and there are only a few previous researches in this line. In this work, we have evaluated the accessibility of a mobile app for making payments using fingerprint and handwritten signature as authentication mechanisms. Several people with accessibility concerns (physical and mental) have used this app and provided valuable feedback according to their needs. Our findings suggest that people requirements are highly subject dependent. On the other hand, in addition to the recently published EN 301 549, proper accessibility evaluation mechanisms for biometric recognition are required in order to cover the specific features of biometric recognition systems.
生物识别系统强调了对那些关注可访问性的用户轻松执行常见操作(需要个人身份验证)的可能性。然而,这一课题尚未得到深入的研究,前人在这方面的研究也不多。在这项工作中,我们评估了使用指纹和手写签名作为身份验证机制进行支付的移动应用程序的可访问性。一些有无障碍问题的人(身体上和精神上)已经使用了这个应用程序,并根据他们的需求提供了有价值的反馈。我们的发现表明,人们的需求是高度依赖于主体的。另一方面,除了最近发布的EN 301 549之外,还需要适当的生物识别可访问性评估机制,以涵盖生物识别系统的特定功能。
{"title":"Accessibility evaluation of a mobile biometric recognition system","authors":"Ramón Blanco-Gonzalo, R. Sánchez-Reillo, Carlos Sanchez-Redondo, Jose Luis Alonso-Aguilera","doi":"10.1109/ISBA.2016.7477234","DOIUrl":"https://doi.org/10.1109/ISBA.2016.7477234","url":null,"abstract":"Biometric recognition systems have highlighted the possibility of easily performing common actions (which require personal authentication) to those users with accessibility concerns. Nevertheless, this topic has not been deeply studied yet and there are only a few previous researches in this line. In this work, we have evaluated the accessibility of a mobile app for making payments using fingerprint and handwritten signature as authentication mechanisms. Several people with accessibility concerns (physical and mental) have used this app and provided valuable feedback according to their needs. Our findings suggest that people requirements are highly subject dependent. On the other hand, in addition to the recently published EN 301 549, proper accessibility evaluation mechanisms for biometric recognition are required in order to cover the specific features of biometric recognition systems.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129548729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1