首页 > 最新文献

2015 International Conference on Biometrics (ICB)最新文献

英文 中文
Viewpoint invariant subject retrieval via soft clothing biometrics 基于软衣生物特征的视点不变主题检索
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139078
E. S. Jaha, M. Nixon
As much information as possible should be used when identifying subjects in surveillance video due to the poor quality and resolution. So far, little attention has been paid to exploiting clothing as it has been considered unlikely to be a potential cue to identity. Clothing analysis could not only potentially improve recognition, but could also aid in subject re-identification. Further, we show here how clothing can aid recognition when there is a large change in viewpoint. Our study offers some important insights into the capability of clothing information in more realistic scenarios. We show how recognition can benefit from clothing analysis when the viewpoint changes with partial occlusion, unlike other approaches addressing soft biometrics from single viewpoint data images. This research presents how soft clothing biometrics can be used to achieve viewpoint invariant subject retrieval, given a verbal query description of the subject observed from a different viewpoint. We investigate the influence of the most correlated clothing traits when extracted from multiple viewpoints, and how they can lead to increased performance.
由于监控视频的质量和分辨率不高,在识别主体时需要尽可能多地使用信息。到目前为止,很少有人注意到利用服装,因为它被认为不太可能是身份的潜在线索。服装分析不仅可以潜在地提高识别,还可以帮助受试者重新识别。此外,我们在这里展示了服装如何在视点发生重大变化时帮助识别。我们的研究为服装信息在更现实的场景中的能力提供了一些重要的见解。我们展示了当视点随着部分遮挡而变化时,识别如何从服装分析中受益,而不像其他方法从单一视点数据图像中解决软生物识别问题。本研究展示了如何使用软衣生物识别技术来实现视点不变的主题检索,给定从不同视点观察到的主题的口头查询描述。我们研究了从多个角度提取的最相关的服装特征的影响,以及它们如何导致性能的提高。
{"title":"Viewpoint invariant subject retrieval via soft clothing biometrics","authors":"E. S. Jaha, M. Nixon","doi":"10.1109/ICB.2015.7139078","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139078","url":null,"abstract":"As much information as possible should be used when identifying subjects in surveillance video due to the poor quality and resolution. So far, little attention has been paid to exploiting clothing as it has been considered unlikely to be a potential cue to identity. Clothing analysis could not only potentially improve recognition, but could also aid in subject re-identification. Further, we show here how clothing can aid recognition when there is a large change in viewpoint. Our study offers some important insights into the capability of clothing information in more realistic scenarios. We show how recognition can benefit from clothing analysis when the viewpoint changes with partial occlusion, unlike other approaches addressing soft biometrics from single viewpoint data images. This research presents how soft clothing biometrics can be used to achieve viewpoint invariant subject retrieval, given a verbal query description of the subject observed from a different viewpoint. We investigate the influence of the most correlated clothing traits when extracted from multiple viewpoints, and how they can lead to increased performance.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Authentication based on a changeable biometric using gesture recognition with the Kinect™ 基于使用Kinect™手势识别的可变生物特征的身份验证
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139073
Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis
Biometric systems either use physiological or behavioural characteristics to identify an individual. However, if a biometric is compromised it could be difficult or impossible to change it. This paper proposes a biometric authentication system based on gesture recognition, where gestures can be easily changed by the user. The system uses a Kinect™ device to capture and extract features, as it provides 20 skeleton tracking points: we use just six of these in our system. The Dynamic Time Warping (DTW) algorithm is used to find an optimal alignment between gestures which are time-bound sequences. We tested the system on a sample of 38 volunteers. Ten volunteers provided reference gestures of their own design and 28 volunteers attempted to attack these reference gestures by both guessing and copying. Guessing the gesture was unsuccessful in all cases, but when the attacker had previously seen a video of the reference gesture the experiment gave us an estimation of the True Positive Rate (TPR) of 0.93, False Positive Rate (FPR) of 0.017 and Equal Error Rate (EER) of 0.028.
生物识别系统利用生理或行为特征来识别个体。然而,如果生物特征被泄露,则很难或不可能更改它。本文提出了一种基于手势识别的生物特征认证系统,该系统可以方便地改变用户的手势。该系统使用Kinect™设备来捕捉和提取特征,因为它提供了20个骨骼跟踪点:我们在系统中只使用了其中的6个。动态时间扭曲(DTW)算法用于寻找具有时间限制序列的手势之间的最优对齐。我们在38名志愿者身上测试了这个系统。10名志愿者提供了他们自己设计的参考手势,28名志愿者试图通过猜测和模仿来攻击这些参考手势。在所有情况下,猜测手势都是不成功的,但是当攻击者之前看过参考手势的视频时,实验给我们的估计是真阳性率(TPR)为0.93,假阳性率(FPR)为0.017,等错误率(EER)为0.028。
{"title":"Authentication based on a changeable biometric using gesture recognition with the Kinect™","authors":"Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis","doi":"10.1109/ICB.2015.7139073","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139073","url":null,"abstract":"Biometric systems either use physiological or behavioural characteristics to identify an individual. However, if a biometric is compromised it could be difficult or impossible to change it. This paper proposes a biometric authentication system based on gesture recognition, where gestures can be easily changed by the user. The system uses a Kinect™ device to capture and extract features, as it provides 20 skeleton tracking points: we use just six of these in our system. The Dynamic Time Warping (DTW) algorithm is used to find an optimal alignment between gestures which are time-bound sequences. We tested the system on a sample of 38 volunteers. Ten volunteers provided reference gestures of their own design and 28 volunteers attempted to attack these reference gestures by both guessing and copying. Guessing the gesture was unsuccessful in all cases, but when the attacker had previously seen a video of the reference gesture the experiment gave us an estimation of the True Positive Rate (TPR) of 0.93, False Positive Rate (FPR) of 0.017 and Equal Error Rate (EER) of 0.028.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Algorithms for a novel touchless bimodal palm biometric system 一种新型非接触式双峰手掌生物识别系统的算法
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139107
O. Nikisins, Teodors Eglitis, Mihails Pudzs, M. Greitans
The paper introduces the combination of algorithms for possibly the first bimodal biometric system capable of touch-less capturing of two biometric parameters, palm veins and palm creases, synchronously with a single image sensor. The architecture of the proposed system is based on the Detection, Alignment and Recognition pipeline. The ROI detection and alignment stages are simplified with efficient combination of hardware (lighting sources) and software. A new feature descriptor, namely Histogram of Vectors is proposed in the recognition stage. Since the capturing of images requires special conditions, the database including images of 100 individuals and ground-truth data is introduced. The analysis of performance of the system utilizes the database leading to detailed understanding of the error propagation in the automatic recognition pipeline.
本文介绍了可能是第一个双峰生物识别系统的组合算法,该系统能够通过单个图像传感器同步捕获两个生物特征参数,手掌静脉和手掌折痕。该系统的体系结构基于检测、对齐和识别管道。通过硬件(光源)和软件的有效结合,简化了ROI检测和对准阶段。在识别阶段提出了一种新的特征描述符,即向量直方图。由于图像的捕获需要特殊的条件,因此引入了包含100个人图像和地面真实数据的数据库。利用数据库对系统的性能进行分析,从而详细了解自动识别管道中的错误传播。
{"title":"Algorithms for a novel touchless bimodal palm biometric system","authors":"O. Nikisins, Teodors Eglitis, Mihails Pudzs, M. Greitans","doi":"10.1109/ICB.2015.7139107","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139107","url":null,"abstract":"The paper introduces the combination of algorithms for possibly the first bimodal biometric system capable of touch-less capturing of two biometric parameters, palm veins and palm creases, synchronously with a single image sensor. The architecture of the proposed system is based on the Detection, Alignment and Recognition pipeline. The ROI detection and alignment stages are simplified with efficient combination of hardware (lighting sources) and software. A new feature descriptor, namely Histogram of Vectors is proposed in the recognition stage. Since the capturing of images requires special conditions, the database including images of 100 individuals and ground-truth data is introduced. The analysis of performance of the system utilizes the database leading to detailed understanding of the error propagation in the automatic recognition pipeline.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Recognition at a long distance: Very low resolution face recognition and hallucination 远距离识别:非常低分辨率的人脸识别和幻觉
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139090
Min-Chun Yang, Chia-Po Wei, Yi-Ren Yeh, Y. Wang
In real-world video surveillance applications, one often needs to recognize face images from a very long distance. Such recognition tasks are very challenging, since such images are typically with very low resolution (VLR). However, if one simply downsamples high-resolution (HR) training images for recognizing the VLR test inputs, or if one directly upsamples the VLR inputs for matching the HR training data, the resulting recognition performance would not be satisfactory. In this paper, we propose a joint face hallucination and recognition approach based on sparse representation. Given a VLR input image, our method is able to synthesize its person-specific HR version with recognition guarantees. In our experiments, we consider two different face image datasets. Empirical results will support the use of our approach for both VLR face recognition. In addition, compared to state-of-the-art super-resolution (SR) methods, we will also show that our method results in improved quality for the recovered HR face images.
在现实世界的视频监控应用中,人们经常需要从很远的距离识别人脸图像。由于此类图像通常具有非常低的分辨率(VLR),因此此类识别任务非常具有挑战性。然而,如果简单地对高分辨率(HR)训练图像进行下采样以识别VLR测试输入,或者直接对VLR输入进行上采样以匹配HR训练数据,则产生的识别性能将不令人满意。本文提出了一种基于稀疏表示的人脸幻觉联合识别方法。给定VLR输入图像,我们的方法能够合成具有识别保证的个人特定HR版本。在我们的实验中,我们考虑了两个不同的人脸图像数据集。实证结果将支持我们的方法用于VLR人脸识别。此外,与最先进的超分辨率(SR)方法相比,我们还将展示我们的方法可以提高恢复的HR面部图像的质量。
{"title":"Recognition at a long distance: Very low resolution face recognition and hallucination","authors":"Min-Chun Yang, Chia-Po Wei, Yi-Ren Yeh, Y. Wang","doi":"10.1109/ICB.2015.7139090","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139090","url":null,"abstract":"In real-world video surveillance applications, one often needs to recognize face images from a very long distance. Such recognition tasks are very challenging, since such images are typically with very low resolution (VLR). However, if one simply downsamples high-resolution (HR) training images for recognizing the VLR test inputs, or if one directly upsamples the VLR inputs for matching the HR training data, the resulting recognition performance would not be satisfactory. In this paper, we propose a joint face hallucination and recognition approach based on sparse representation. Given a VLR input image, our method is able to synthesize its person-specific HR version with recognition guarantees. In our experiments, we consider two different face image datasets. Empirical results will support the use of our approach for both VLR face recognition. In addition, compared to state-of-the-art super-resolution (SR) methods, we will also show that our method results in improved quality for the recovered HR face images.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Correlation based fingerprint liveness detection 基于相关性的指纹活性检测
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139054
Z. Akhtar, C. Micheloni, G. Foresti
Fingerprint recognition systems are vulnerable to spoof attacks, which consist in presenting forged fingerprints to the sensor. Typical anti-spoofing mechanism is fingerprint liveness detection. Existing liveness detection methods are still not robust to spoofing materials, datasets and sensor variations. In particular, the performance of a liveness detection algorithm remarkably drops upon encountering spoof fabrication materials that were not used during the training stage. Likewise, a quintessential liveness detection method needs to be adapted and retrained to new spoofing materials, datasets and each sensor used for acquiring the fingerprints. In this paper, we propose a framework that first performs correlation mapping between live and spoof fingerprints and then uses a discriminative-generative classification scheme for spoof detection. Partial Least Squares (PLS) is utilized to learn the correlations. While, support vector machine (SVM) is combined with three generative classifiers, namely Gaussian Mixture Model, Gaussian Copula, and Quadratic Discriminant Analysis, for final classification. Experiments on the publicly available LivDet2011 and LivDet2013 datasets, show that the proposed method outperforms the existing methods alongside cross-spoof material and cross-sensor techniques.
指纹识别系统容易受到欺骗攻击,这包括向传感器提供伪造的指纹。典型的防欺骗机制是指纹活动性检测。现有的活体检测方法对欺骗材料、数据集和传感器的变化仍然不具有鲁棒性。特别是,当遇到训练阶段未使用的欺骗制造材料时,活动性检测算法的性能显着下降。同样,一个典型的活体检测方法需要调整和重新训练,以适应新的欺骗材料、数据集和用于获取指纹的每个传感器。在本文中,我们提出了一个框架,该框架首先在真实指纹和欺骗指纹之间进行相关映射,然后使用判别生成分类方案进行欺骗检测。利用偏最小二乘(PLS)来学习相关性。支持向量机(SVM)结合高斯混合模型(Gaussian Mixture Model)、高斯Copula和二次判别分析(Quadratic Discriminant Analysis)三种生成分类器进行最终分类。在公开可用的LivDet2011和LivDet2013数据集上的实验表明,该方法优于现有的交叉欺骗材料和交叉传感器技术。
{"title":"Correlation based fingerprint liveness detection","authors":"Z. Akhtar, C. Micheloni, G. Foresti","doi":"10.1109/ICB.2015.7139054","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139054","url":null,"abstract":"Fingerprint recognition systems are vulnerable to spoof attacks, which consist in presenting forged fingerprints to the sensor. Typical anti-spoofing mechanism is fingerprint liveness detection. Existing liveness detection methods are still not robust to spoofing materials, datasets and sensor variations. In particular, the performance of a liveness detection algorithm remarkably drops upon encountering spoof fabrication materials that were not used during the training stage. Likewise, a quintessential liveness detection method needs to be adapted and retrained to new spoofing materials, datasets and each sensor used for acquiring the fingerprints. In this paper, we propose a framework that first performs correlation mapping between live and spoof fingerprints and then uses a discriminative-generative classification scheme for spoof detection. Partial Least Squares (PLS) is utilized to learn the correlations. While, support vector machine (SVM) is combined with three generative classifiers, namely Gaussian Mixture Model, Gaussian Copula, and Quadratic Discriminant Analysis, for final classification. Experiments on the publicly available LivDet2011 and LivDet2013 datasets, show that the proposed method outperforms the existing methods alongside cross-spoof material and cross-sensor techniques.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The relation between the secrecy rate of biometric template protection and biometric recognition performance 生物特征模板保护保密性与生物特征识别性能的关系
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139055
R. Veldhuis
A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the computation of the maximum achievable key length from the Receiver Operating Characteristic (ROC) of the optimal biometric recognition system. Illustrative examples that demonstrate how the shape of the ROC impacts the security of a template protection system are presented and discussed.
一个理论结果有关的最大可实现的安全家族的生物特征模板保护系统被称为键绑定系统的识别性能的生物特征识别系统是最优的,在尼曼-皮尔逊意义上推导。该关系允许从最优生物识别系统的接收者工作特征(ROC)计算可实现的最大密钥长度。举例说明了ROC的形状如何影响模板保护系统的安全性,并提出和讨论。
{"title":"The relation between the secrecy rate of biometric template protection and biometric recognition performance","authors":"R. Veldhuis","doi":"10.1109/ICB.2015.7139055","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139055","url":null,"abstract":"A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the computation of the maximum achievable key length from the Receiver Operating Characteristic (ROC) of the optimal biometric recognition system. Illustrative examples that demonstrate how the shape of the ROC impacts the security of a template protection system are presented and discussed.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting segmentation errors in an iris recognition system 虹膜识别系统分割错误预测
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139071
Nitin K. Mahadeo, Gholamreza Haffari, A. Paplinski
Iris segmentation is defined as the isolation of the iris pattern in an eye image. A highly accurate segmented iris plays a key role in the overall performance of an iris recognition system, as shown in previous research. We present a fully automated method for classifying correctly and incorrectly segmented iris regions in eye images. In contrast with previous work where only iris boundary detection is considered (using a limited number of features), we introduce the following novelties which greatly enhance the performance of an iris recognition system. Firstly, we go beyond iris boundary detection and consider a more realistic and challenging task of complete segmentation which includes iris boundary detection and occlusion detection (due to eyelids and eyelashes). Secondly, an extended and rich feature set is investigated for this task. Thirdly, several non-linear learning algorithms are used to measure the prediction accuracy. Finally, we extend our model to iris videos, taking into account neighbouring frames for a better prediction. Both intrinsic and extrinsic evaluation are carried out to evaluate the performance of the proposed method. With these innovations, our method outperforms current state-of-the-art techniques and presents a reliable approach to the task of classifying segmented iris images in an iris recognition system.
虹膜分割被定义为对眼睛图像中的虹膜模式进行隔离。在以往的研究中,高精度的分割虹膜对虹膜识别系统的整体性能起着至关重要的作用。我们提出了一种完全自动化的方法来对眼睛图像中正确和不正确的虹膜区域进行分类。与之前只考虑虹膜边界检测(使用有限数量的特征)的工作相反,我们引入了以下新颖的方法,这些方法大大提高了虹膜识别系统的性能。首先,我们超越了虹膜边界检测,考虑了一个更现实、更具有挑战性的完整分割任务,包括虹膜边界检测和遮挡检测(由于眼睑和睫毛)。其次,研究了一个扩展的、丰富的特征集。第三,采用几种非线性学习算法来衡量预测精度。最后,我们将模型扩展到虹膜视频,考虑相邻帧以获得更好的预测。对所提方法的性能进行了内在评价和外在评价。通过这些创新,我们的方法优于当前最先进的技术,并为虹膜识别系统中分割虹膜图像的分类任务提供了可靠的方法。
{"title":"Predicting segmentation errors in an iris recognition system","authors":"Nitin K. Mahadeo, Gholamreza Haffari, A. Paplinski","doi":"10.1109/ICB.2015.7139071","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139071","url":null,"abstract":"Iris segmentation is defined as the isolation of the iris pattern in an eye image. A highly accurate segmented iris plays a key role in the overall performance of an iris recognition system, as shown in previous research. We present a fully automated method for classifying correctly and incorrectly segmented iris regions in eye images. In contrast with previous work where only iris boundary detection is considered (using a limited number of features), we introduce the following novelties which greatly enhance the performance of an iris recognition system. Firstly, we go beyond iris boundary detection and consider a more realistic and challenging task of complete segmentation which includes iris boundary detection and occlusion detection (due to eyelids and eyelashes). Secondly, an extended and rich feature set is investigated for this task. Thirdly, several non-linear learning algorithms are used to measure the prediction accuracy. Finally, we extend our model to iris videos, taking into account neighbouring frames for a better prediction. Both intrinsic and extrinsic evaluation are carried out to evaluate the performance of the proposed method. With these innovations, our method outperforms current state-of-the-art techniques and presents a reliable approach to the task of classifying segmented iris images in an iris recognition system.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Appearance-based person re-identification by intra-camera discriminative models and rank aggregation 基于相机内判别模型和等级聚合的人脸再识别
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139077
Raphael C. Prates, W. R. Schwartz
The main challenges in person re-identification are related to different camera acquisition conditions and high inter-class similarities. These aspects motivated us to handle such problems by learning intra-camera discriminative models, based on training samples, to discover representative individuals for a given sample (probe or gallery samples), referred to as prototypes. These prototypes are used to weight the features according to their discriminative power by using the Partial Least Square (PLS) method. We also exploit models built from the gallery and probe samples to generate re-identification results that will be combined in a single ranking using ranking aggregation techniques. According to the experiments, the proposed method achieves state-of-the-art results. They also demonstrate that aggregating the results achieved by our method with results achieved by a distance metric learning method, outperforms the state-of-the-art, e.g., the top-1 rank is increased in almost 10 percent points for VIPeR and PRID 450S data sets.
人脸再识别面临的主要挑战是不同的相机采集条件和高度的类间相似性。这些方面促使我们通过学习基于训练样本的相机内判别模型来处理此类问题,以发现给定样本(探针或画廊样本)的代表性个体,称为原型。利用偏最小二乘法根据特征的判别能力对特征进行加权。我们还利用从图库和探针样本中构建的模型来生成重新识别的结果,这些结果将使用排名聚合技术组合在一个单一的排名中。实验表明,该方法取得了较好的效果。他们还证明,将我们的方法获得的结果与距离度量学习方法获得的结果相结合,优于最先进的方法,例如,VIPeR和PRID 450S数据集的前1名排名提高了近10%。
{"title":"Appearance-based person re-identification by intra-camera discriminative models and rank aggregation","authors":"Raphael C. Prates, W. R. Schwartz","doi":"10.1109/ICB.2015.7139077","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139077","url":null,"abstract":"The main challenges in person re-identification are related to different camera acquisition conditions and high inter-class similarities. These aspects motivated us to handle such problems by learning intra-camera discriminative models, based on training samples, to discover representative individuals for a given sample (probe or gallery samples), referred to as prototypes. These prototypes are used to weight the features according to their discriminative power by using the Partial Least Square (PLS) method. We also exploit models built from the gallery and probe samples to generate re-identification results that will be combined in a single ranking using ranking aggregation techniques. According to the experiments, the proposed method achieves state-of-the-art results. They also demonstrate that aggregating the results achieved by our method with results achieved by a distance metric learning method, outperforms the state-of-the-art, e.g., the top-1 rank is increased in almost 10 percent points for VIPeR and PRID 450S data sets.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure face template generation via local region hashing 安全的人脸模板生成通过局部区域哈希
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139099
Rohit Pandey, V. Govindaraju
Security is an important aspect in the practical deployment of biometric authentication systems. Biometric data in its original form is irreplaceable and thus, must be protected. This often comes at the cost of reduced matching accuracy or loss of the true key-less convenience biometric authentication can offer. In this paper, we address the shortcomings of current face template protection schemes and show the advantages of a localized approach. We propose a framework that utilizes features from local regions of the face to achieve exact matching, and thus, enables the security offered by hash functions like SHA-256. We study the matching accuracy of different feature extractors, and propose measures to quantify the security offered by the scheme under reasonable real-world assumptions. The efficacy of our approach is demonstrated on the Multi-PIE face database.
安全性是生物识别认证系统实际部署中的一个重要方面。原始形式的生物特征数据是不可替代的,因此必须加以保护。这通常是以降低匹配准确性或失去真正的无密钥生物识别身份验证所能提供的便利为代价的。在本文中,我们解决了现有的人脸模板保护方案的缺点,并展示了本地化方法的优点。我们提出了一个框架,利用面部局部区域的特征来实现精确匹配,从而实现SHA-256等哈希函数提供的安全性。我们研究了不同特征提取器的匹配精度,并提出了在合理的现实世界假设下量化该方案所提供的安全性的措施。在Multi-PIE人脸数据库上验证了该方法的有效性。
{"title":"Secure face template generation via local region hashing","authors":"Rohit Pandey, V. Govindaraju","doi":"10.1109/ICB.2015.7139099","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139099","url":null,"abstract":"Security is an important aspect in the practical deployment of biometric authentication systems. Biometric data in its original form is irreplaceable and thus, must be protected. This often comes at the cost of reduced matching accuracy or loss of the true key-less convenience biometric authentication can offer. In this paper, we address the shortcomings of current face template protection schemes and show the advantages of a localized approach. We propose a framework that utilizes features from local regions of the face to achieve exact matching, and thus, enables the security offered by hash functions like SHA-256. We study the matching accuracy of different feature extractors, and propose measures to quantify the security offered by the scheme under reasonable real-world assumptions. The efficacy of our approach is demonstrated on the Multi-PIE face database.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fingerprint classification using a simplified rule-set based on directional patterns and singularity features 基于方向模式和奇异特征的简化指纹分类规则集
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139102
Kribashnee Dorasamy, L. Webb, J. Tapamo, N. P. Khanyile
The use of directional patterns has recently received more attention in fingerprint classification. It provides a global representation of a fingerprint, by dividing it into homogeneous orientation partitions. With this technique, the challenge in previous works has been the complexity of the pattern templates used for classification. In addition, incomplete fingerprints are often not accounted for. A rule-based technique using simplified rules is proposed to overcome the challenges faced by previous pattern templates. Two features, namely directional patterns and singular points (SPs), are combined to categorise six fingerprint classes: namely Whorl (W); Right Loop (RL); Left Loop (LL); Tented Arch (TA); Plain Arch (PA); and Unclassifiable (U). The proposed technique achieves an accuracy of 92.87% and 92.20% on the FVC 2002 and 2004 DB1, respectively. Analysing the global representation of the fingerprint has proved to be advantageous, as the rules are invariant to rotation and have the potential to address issues of incomplete fingerprints.
方向模式在指纹分类中的应用近年来受到越来越多的关注。它通过将指纹划分为均匀的方向分区来提供指纹的全局表示。使用这种技术,以前工作中的挑战是用于分类的模式模板的复杂性。此外,不完整的指纹通常不会被考虑在内。提出了一种使用简化规则的基于规则的技术来克服以前的模式模板所面临的挑战。结合两个特征,即方向模式和奇异点(SPs),将指纹分类为六类:即Whorl (W);右循环(RL);左循环(LL);帐篷拱门(TA);平原拱(PA);在FVC 2002和2004 DB1上,该方法的准确率分别为92.87%和92.20%。分析指纹的全局表示已被证明是有利的,因为规则对旋转是不变的,并且有可能解决不完整指纹的问题。
{"title":"Fingerprint classification using a simplified rule-set based on directional patterns and singularity features","authors":"Kribashnee Dorasamy, L. Webb, J. Tapamo, N. P. Khanyile","doi":"10.1109/ICB.2015.7139102","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139102","url":null,"abstract":"The use of directional patterns has recently received more attention in fingerprint classification. It provides a global representation of a fingerprint, by dividing it into homogeneous orientation partitions. With this technique, the challenge in previous works has been the complexity of the pattern templates used for classification. In addition, incomplete fingerprints are often not accounted for. A rule-based technique using simplified rules is proposed to overcome the challenges faced by previous pattern templates. Two features, namely directional patterns and singular points (SPs), are combined to categorise six fingerprint classes: namely Whorl (W); Right Loop (RL); Left Loop (LL); Tented Arch (TA); Plain Arch (PA); and Unclassifiable (U). The proposed technique achieves an accuracy of 92.87% and 92.20% on the FVC 2002 and 2004 DB1, respectively. Analysing the global representation of the fingerprint has proved to be advantageous, as the rules are invariant to rotation and have the potential to address issues of incomplete fingerprints.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2015 International Conference on Biometrics (ICB)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1