首页 > 最新文献

2015 International Conference on Biometrics (ICB)最新文献

英文 中文
Example-based 3D face reconstruction from uncalibrated frontal and profile images 基于实例的基于未校准正面和侧面图像的3D人脸重建
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139051
Jing Li, Shuqin Long, Dan Zeng, Qijun Zhao
Reconstructing 3D face models from multiple uncalibrated 2D face images is usually done by using a single reference 3D face model or some gender/ethnicity-specific 3D face models. However, different persons, even those of the same gender or ethnicity, usually have significantly different faces in terms of their overall appearance, which forms the base of person recognition using faces. Consequently, existing 3D reference model based methods have limited capability of reconstructing 3D face models for a large variety of persons. In this paper, we propose to explore a reservoir of diverse reference models to improve the 3D face reconstruction performance. Specifically, we convert the face reconstruction problem into a multi-label segmentation problem. Its energy function is formulated from different cues, including 1) similarity between the desired output and the initial model, 2) color consistency between different views, 3) smoothness constraint on adjacent pixels, and 4) model consistency within local neighborhood. Experimental results on challenging datasets demonstrate that the proposed algorithm is capable of recovering high quality face models in both qualitative and quantitative evaluations.
从多个未校准的2D人脸图像重建3D人脸模型通常通过使用单个参考3D人脸模型或一些性别/种族特定的3D人脸模型来完成。然而,不同的人,即使是同一性别或种族的人,通常在整体外观上也有显著的不同,这就形成了人脸识别的基础。因此,现有的基于三维参考模型的方法对大量人群的三维人脸模型重建能力有限。在这篇论文中,我们提出探索一个多样化的参考模型库来提高三维人脸重建的性能。具体来说,我们将人脸重建问题转化为多标签分割问题。它的能量函数由不同的线索组成,包括1)期望输出与初始模型之间的相似性,2)不同视图之间的颜色一致性,3)相邻像素的平滑约束,以及4)局部邻域内的模型一致性。在具有挑战性的数据集上的实验结果表明,该算法能够在定性和定量评估中恢复高质量的人脸模型。
{"title":"Example-based 3D face reconstruction from uncalibrated frontal and profile images","authors":"Jing Li, Shuqin Long, Dan Zeng, Qijun Zhao","doi":"10.1109/ICB.2015.7139051","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139051","url":null,"abstract":"Reconstructing 3D face models from multiple uncalibrated 2D face images is usually done by using a single reference 3D face model or some gender/ethnicity-specific 3D face models. However, different persons, even those of the same gender or ethnicity, usually have significantly different faces in terms of their overall appearance, which forms the base of person recognition using faces. Consequently, existing 3D reference model based methods have limited capability of reconstructing 3D face models for a large variety of persons. In this paper, we propose to explore a reservoir of diverse reference models to improve the 3D face reconstruction performance. Specifically, we convert the face reconstruction problem into a multi-label segmentation problem. Its energy function is formulated from different cues, including 1) similarity between the desired output and the initial model, 2) color consistency between different views, 3) smoothness constraint on adjacent pixels, and 4) model consistency within local neighborhood. Experimental results on challenging datasets demonstrate that the proposed algorithm is capable of recovering high quality face models in both qualitative and quantitative evaluations.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128562594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recompression effects in iris segmentation 虹膜分割中的再压缩效果
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139040
Thomas Bergmüller, Eleftherios Christopoulos, Martin Schnoell, A. Uhl
Rating a compression algorithm's performance is usually done in experimental studies, where researchers have frequently used JPEG pre-compressed data. It is not clear yet, whether results of such compression experiments are reliable if conducted from pre-compressed data. To investigate this issue, we study the impact of using pre-compressed data on iris segmentation and evaluate the relation between iris segmentation performance and general quality metrics. Furthermore we propose a method to overcome potential problems in case using pre-compressed data sets cannot be avoided, e.g. for reasons of ground-truth availability.
对压缩算法的性能进行评级通常是在实验研究中完成的,研究人员经常使用JPEG预压缩数据。如果使用预压缩数据,这种压缩实验的结果是否可靠,目前还不清楚。为了研究这一问题,我们研究了使用预压缩数据对虹膜分割的影响,并评估了虹膜分割性能与一般质量指标之间的关系。此外,我们提出了一种方法来克服在无法避免使用预压缩数据集的情况下的潜在问题,例如由于真实值可用性的原因。
{"title":"Recompression effects in iris segmentation","authors":"Thomas Bergmüller, Eleftherios Christopoulos, Martin Schnoell, A. Uhl","doi":"10.1109/ICB.2015.7139040","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139040","url":null,"abstract":"Rating a compression algorithm's performance is usually done in experimental studies, where researchers have frequently used JPEG pre-compressed data. It is not clear yet, whether results of such compression experiments are reliable if conducted from pre-compressed data. To investigate this issue, we study the impact of using pre-compressed data on iris segmentation and evaluate the relation between iris segmentation performance and general quality metrics. Furthermore we propose a method to overcome potential problems in case using pre-compressed data sets cannot be avoided, e.g. for reasons of ground-truth availability.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"74 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face retriever: Pre-filtering the gallery via deep neural net 人脸检索:通过深度神经网络对图库进行预过滤
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139112
Dayong Wang, Anil K. Jain
Face retrieval is an enabling technology for many applications, including automatic face annotation, deduplication, and surveillance. In this paper, we propose a face retrieval system which combines a k-NN search procedure with a COTS matcher (PittPatt1) in a cascaded manner. In particular, given a query face, we first pre-filter the gallery set and find the top-k most similar faces for the query image by using deep facial features that are learned with a deep convolutional neural network. The top-k most similar faces are then re-ranked based on score-level fusion of the similarities between deep features and the COTS matcher. To further boost the retrieval performance, we develop a manifold ranking algorithm. The proposed face retrieval system is evaluated on two large-scale face image databases: (i) a web face image database, which consists of over 3, 880 query images of 1, 507 subjects and a gallery of 5, 000, 000 faces, and (ii) a mugshot database, which consists of 1, 000 query images of 1, 000 subjects and a gallery of 1, 000, 000 faces. Experimental results demonstrate that the proposed face retrieval system can simultaneously improve the retrieval performance (CMC and precision-recall) and scalability for large-scale face retrieval problems.
人脸检索是许多应用程序的支持技术,包括自动人脸注释、重复数据删除和监视。在本文中,我们提出了一种将k-NN搜索过程与COTS匹配器(PittPatt1)以级联方式相结合的人脸检索系统。特别是,给定一张查询脸,我们首先对图库集进行预过滤,并通过使用深度卷积神经网络学习的深度面部特征,为查询图像找到top-k最相似的脸。然后基于深度特征和COTS匹配器之间相似性的分数级融合,对最相似的k个面孔进行重新排序。为了进一步提高检索性能,我们开发了一种流形排序算法。在两个大型人脸图像数据库上对所提出的人脸检索系统进行了评估:(i)一个web人脸图像数据库,其中包含超过3,880张1,507个受试者的查询图像和5,000,000个人脸库;(ii)一个人脸数据库,其中包含1,000个受试者的1,000张查询图像和1,000,000个人脸库。实验结果表明,所提出的人脸检索系统能够同时提高大规模人脸检索问题的检索性能(CMC和查准率)和可扩展性。
{"title":"Face retriever: Pre-filtering the gallery via deep neural net","authors":"Dayong Wang, Anil K. Jain","doi":"10.1109/ICB.2015.7139112","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139112","url":null,"abstract":"Face retrieval is an enabling technology for many applications, including automatic face annotation, deduplication, and surveillance. In this paper, we propose a face retrieval system which combines a k-NN search procedure with a COTS matcher (PittPatt1) in a cascaded manner. In particular, given a query face, we first pre-filter the gallery set and find the top-k most similar faces for the query image by using deep facial features that are learned with a deep convolutional neural network. The top-k most similar faces are then re-ranked based on score-level fusion of the similarities between deep features and the COTS matcher. To further boost the retrieval performance, we develop a manifold ranking algorithm. The proposed face retrieval system is evaluated on two large-scale face image databases: (i) a web face image database, which consists of over 3, 880 query images of 1, 507 subjects and a gallery of 5, 000, 000 faces, and (ii) a mugshot database, which consists of 1, 000 query images of 1, 000 subjects and a gallery of 1, 000, 000 faces. Experimental results demonstrate that the proposed face retrieval system can simultaneously improve the retrieval performance (CMC and precision-recall) and scalability for large-scale face retrieval problems.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128144388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimal feature selection and inter-operability compensation for on-line biometric signature authentication 在线生物特征签名认证的最优特征选择与互操作性补偿
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139047
Rubén Tolosana, R. Vera-Rodríguez, J. Ortega-Garcia, Julian Fierrez
Due to the technological evolution and the increasing popularity of smartphones, people can access an application with many different devices. This device interoperability is a very challenging problem for biometrics. In this paper we focus on inter-operability device compensation for on-line signature verification. The proposed approach is based on two main stages. The first one is a preprocessing stage where data acquired from different devices are processed in order to normalize the signals in similar ranges. The second one is based on a feature selection of time functions taking into account the inter-operability device comparisons in order to select features which are robust in these conditions. The experimental work has been carried out with Biosecure database using a Wacom tablet (DS2) and a PDA tablet (DS3), and the system developed is based on dynamic time warping (DTW) elastic measure over the selected time functions. The performance of the proposed system is very similar compared to an ideal system. Also, the proposed approach provides average relative improvements for the cases of inter-operability comparisons of 26.5% for random forgeries and, around 14.2% for the case of skilled forgeries comparing the results with the case of having a system specifically tuned for each device, proving the robustness of the proposed approach. These results open the door for future works using devices as smartphones or tablets, commonly used nowadays.
由于技术的发展和智能手机的日益普及,人们可以使用许多不同的设备访问应用程序。这种设备的互操作性对生物识别技术来说是一个非常具有挑战性的问题。本文主要研究在线签名验证的互操作性设备补偿问题。建议的方法基于两个主要阶段。第一个是预处理阶段,处理从不同设备获取的数据,以便在相似范围内对信号进行归一化。第二种方法基于考虑互操作性设备比较的时间函数的特征选择,以便选择在这些条件下具有鲁棒性的特征。利用Wacom平板电脑(DS2)和PDA平板电脑(DS3)在Biosecure数据库上进行了实验工作,开发的系统基于对选定时间函数的动态时间规整(DTW)弹性测量。与理想系统相比,所提出系统的性能非常相似。此外,所提出的方法为随机伪造的互操作性比较提供了26.5%的平均相对改进,对于熟练伪造的情况,将结果与为每个设备专门调整系统的情况进行比较,约为14.2%,证明了所提出方法的鲁棒性。这些结果为未来使用智能手机或平板电脑等设备的作品打开了大门。
{"title":"Optimal feature selection and inter-operability compensation for on-line biometric signature authentication","authors":"Rubén Tolosana, R. Vera-Rodríguez, J. Ortega-Garcia, Julian Fierrez","doi":"10.1109/ICB.2015.7139047","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139047","url":null,"abstract":"Due to the technological evolution and the increasing popularity of smartphones, people can access an application with many different devices. This device interoperability is a very challenging problem for biometrics. In this paper we focus on inter-operability device compensation for on-line signature verification. The proposed approach is based on two main stages. The first one is a preprocessing stage where data acquired from different devices are processed in order to normalize the signals in similar ranges. The second one is based on a feature selection of time functions taking into account the inter-operability device comparisons in order to select features which are robust in these conditions. The experimental work has been carried out with Biosecure database using a Wacom tablet (DS2) and a PDA tablet (DS3), and the system developed is based on dynamic time warping (DTW) elastic measure over the selected time functions. The performance of the proposed system is very similar compared to an ideal system. Also, the proposed approach provides average relative improvements for the cases of inter-operability comparisons of 26.5% for random forgeries and, around 14.2% for the case of skilled forgeries comparing the results with the case of having a system specifically tuned for each device, proving the robustness of the proposed approach. These results open the door for future works using devices as smartphones or tablets, commonly used nowadays.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Annotated crowd video face database 标注人群视频人脸数据库
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139083
Tejas I. Dhamecha, Priyanka Verma, Mahek Shah, Richa Singh, Mayank Vatsa
Research in face recognition under constrained environment has achieved an acceptable level of performance. However, there is a significant scope for improving face recognition capabilities in unconstrained environment including surveillance videos. Such videos are likely to record multiple people within the field of view. Face recognition in such a setting poses a set of challenges including unreliable face detection, multiple subjects performing different actions, low resolution, and sensor interoperability. In general, existing video face databases contain one subject in a video sequence. However, real world video sequences are more challenging and generally contain more than one person in a video. Therefore, in this paper, we provide an annotated crowd video face (ACVF-2014) database, along with face landmark information to encourage research in this important problem. The ACVF-2014 dataset contains 201 videos of 133 subjects where each video contains multiple subjects. We provide two distinct use-case scenarios, define their experimental protocols, and report baseline verification results using OpenBR and FaceVACS. The results show that both the baseline results do not yield more than 0.16 genuine accept rate @ 0.01 false accept rate. A software package is also developed to help researchers evaluate their systems using the defined protocols.
约束环境下人脸识别的研究已经达到了可以接受的性能水平。然而,在监控视频等不受约束的环境下,人脸识别能力的提高还有很大的空间。这样的视频很可能会在视野范围内记录多个人。在这种情况下,人脸识别带来了一系列挑战,包括不可靠的人脸检测、多受试者执行不同的动作、低分辨率和传感器互操作性。一般来说,现有的视频人脸数据库在一个视频序列中包含一个主题。然而,真实世界的视频序列更具挑战性,通常在一个视频中包含不止一个人。因此,在本文中,我们提供了一个标注人群视频人脸(ACVF-2014)数据库,以及人脸地标信息,以鼓励对这一重要问题的研究。ACVF-2014数据集包含133个主题的201个视频,其中每个视频包含多个主题。我们提供了两个不同的用例场景,定义了它们的实验协议,并使用OpenBR和FaceVACS报告了基线验证结果。结果表明,这两个基线结果不产生超过0.16真实接受率@ 0.01假接受率。还开发了一个软件包,以帮助研究人员使用定义的协议评估他们的系统。
{"title":"Annotated crowd video face database","authors":"Tejas I. Dhamecha, Priyanka Verma, Mahek Shah, Richa Singh, Mayank Vatsa","doi":"10.1109/ICB.2015.7139083","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139083","url":null,"abstract":"Research in face recognition under constrained environment has achieved an acceptable level of performance. However, there is a significant scope for improving face recognition capabilities in unconstrained environment including surveillance videos. Such videos are likely to record multiple people within the field of view. Face recognition in such a setting poses a set of challenges including unreliable face detection, multiple subjects performing different actions, low resolution, and sensor interoperability. In general, existing video face databases contain one subject in a video sequence. However, real world video sequences are more challenging and generally contain more than one person in a video. Therefore, in this paper, we provide an annotated crowd video face (ACVF-2014) database, along with face landmark information to encourage research in this important problem. The ACVF-2014 dataset contains 201 videos of 133 subjects where each video contains multiple subjects. We provide two distinct use-case scenarios, define their experimental protocols, and report baseline verification results using OpenBR and FaceVACS. The results show that both the baseline results do not yield more than 0.16 genuine accept rate @ 0.01 false accept rate. A software package is also developed to help researchers evaluate their systems using the defined protocols.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The ICB-2015 Competition on Finger Vein Recognition ICB-2015手指静脉识别大赛
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139080
Ran Xian, Liao Ni, Wenxin Li
Finger vein recognition is a newly developed and promising biometrics technology. To facilitate evaluation in this area and study state-of-the-art performance of the finger vein recognition algorithms, we organized The ICB-2015 Competition on Finger Vein Recognition (ICFVR2015). This competition is held on a general recognition algorithm evaluation platform called RATE, with 3 data sets collected from volunteers and actual usage. 7 algorithms were finally submitted, with the best EER achieving 0.375%. This paper will first introduce the organization of the competition and RATE, then describe data sets and test protocols, and finally present results of the competition.
手指静脉识别是一项新兴的生物识别技术。为了促进这一领域的评估并研究手指静脉识别算法的最新性能,我们组织了ICB-2015手指静脉识别竞赛(ICFVR2015)。本次比赛在一个通用的识别算法评估平台RATE上进行,从志愿者那里收集了3组数据并进行了实际使用。最终提交了7种算法,最佳EER达到0.375%。本文将首先介绍比赛的组织和RATE,然后描述数据集和测试协议,最后介绍比赛结果。
{"title":"The ICB-2015 Competition on Finger Vein Recognition","authors":"Ran Xian, Liao Ni, Wenxin Li","doi":"10.1109/ICB.2015.7139080","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139080","url":null,"abstract":"Finger vein recognition is a newly developed and promising biometrics technology. To facilitate evaluation in this area and study state-of-the-art performance of the finger vein recognition algorithms, we organized The ICB-2015 Competition on Finger Vein Recognition (ICFVR2015). This competition is held on a general recognition algorithm evaluation platform called RATE, with 3 data sets collected from volunteers and actual usage. 7 algorithms were finally submitted, with the best EER achieving 0.375%. This paper will first introduce the organization of the competition and RATE, then describe data sets and test protocols, and finally present results of the competition.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Latent fingerprints segmentation based on Rearranged Fourier Subbands 基于重排傅立叶子带的潜在指纹分割
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139063
Phumpat Ruangsakul, V. Areekul, Krisada Phromsuthirak, Arucha Rungchokanun
In this work, we present a latent fingerprint segmentation algorithm based on spatial-frequency domain analysis. The algorithm arranges the overlapped block-based Fourier coefficients into groups of frequency and orientation subbands, called Rearranged Fourier Subband (RFS). The RFS reveals latent fingerprint spectra in only a limited number of subbands. The algorithm then boosts, sorts, and extracts, from complex background and noise, the latent fingerprint spectra in the RFS subbands. Several experiments are evaluated based on ground truth comparison, feature extraction, and latent matching on the NIST SD27 latent database. Our experimental results show that the proposed algorithm achieves better accuracy compared to those of the published automatic segmentation algorithms.
在这项工作中,我们提出了一种基于空频域分析的潜在指纹分割算法。该算法将重叠的基于块的傅里叶系数排列成频率和方向子带组,称为重排傅里叶子带(RFS)。RFS仅在有限的子带中显示潜在指纹光谱。然后,该算法从复杂的背景和噪声中增强、分类和提取RFS子带中的潜在指纹光谱。基于地面真值比较、特征提取和NIST SD27潜在数据库上的潜在匹配,对几个实验进行了评估。实验结果表明,与已有的自动分割算法相比,该算法具有更好的分割精度。
{"title":"Latent fingerprints segmentation based on Rearranged Fourier Subbands","authors":"Phumpat Ruangsakul, V. Areekul, Krisada Phromsuthirak, Arucha Rungchokanun","doi":"10.1109/ICB.2015.7139063","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139063","url":null,"abstract":"In this work, we present a latent fingerprint segmentation algorithm based on spatial-frequency domain analysis. The algorithm arranges the overlapped block-based Fourier coefficients into groups of frequency and orientation subbands, called Rearranged Fourier Subband (RFS). The RFS reveals latent fingerprint spectra in only a limited number of subbands. The algorithm then boosts, sorts, and extracts, from complex background and noise, the latent fingerprint spectra in the RFS subbands. Several experiments are evaluated based on ground truth comparison, feature extraction, and latent matching on the NIST SD27 latent database. Our experimental results show that the proposed algorithm achieves better accuracy compared to those of the published automatic segmentation algorithms.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi-modal authentication system for smartphones using face, iris and periocular 智能手机人脸、虹膜、眼周多模态认证系统
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139044
K. Raja, Ramachandra Raghavendra, Martin Stokkenes, C. Busch
Secure authentication for smartphones is becoming important for many applications such as financial transactions. Until today PIN and password authentication are the most commonly used methods for smartphone access control. Specifically for a PIN and limited length passwords, the level of security is low and thus can be compromised easily. In this work, we propose a multi-modal biometric system, which uses face, periocular and iris biometric characteristics for authentication. The proposed system is tested on two different devices - Samsung Galaxy S5 smartphone and Samsung Galaxy Note 10.1 tablet. An extensive set of experiments conducted using the proposed system shows the applicability for secure authentication scenarios. The proposed system is tested using uni-modal and multi-modal approach. An Equal Error Rate (EER) of 0.68% is obtained from the experiments validating the robust performance of the proposed system.
智能手机的安全认证在金融交易等许多应用中变得越来越重要。直到今天,PIN和密码认证是智能手机访问控制最常用的方法。特别是对于PIN和有限长度的密码,安全级别很低,因此很容易受到损害。在这项工作中,我们提出了一种多模态生物识别系统,该系统使用面部、眼周和虹膜生物特征进行身份验证。该系统在两种不同的设备上进行了测试——三星Galaxy S5智能手机和三星Galaxy Note 10.1平板电脑。使用该系统进行的大量实验表明,该系统适用于安全认证场景。采用单模态和多模态方法对系统进行了测试。实验结果表明,该系统的鲁棒性良好,误差率为0.68%。
{"title":"Multi-modal authentication system for smartphones using face, iris and periocular","authors":"K. Raja, Ramachandra Raghavendra, Martin Stokkenes, C. Busch","doi":"10.1109/ICB.2015.7139044","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139044","url":null,"abstract":"Secure authentication for smartphones is becoming important for many applications such as financial transactions. Until today PIN and password authentication are the most commonly used methods for smartphone access control. Specifically for a PIN and limited length passwords, the level of security is low and thus can be compromised easily. In this work, we propose a multi-modal biometric system, which uses face, periocular and iris biometric characteristics for authentication. The proposed system is tested on two different devices - Samsung Galaxy S5 smartphone and Samsung Galaxy Note 10.1 tablet. An extensive set of experiments conducted using the proposed system shows the applicability for secure authentication scenarios. The proposed system is tested using uni-modal and multi-modal approach. An Equal Error Rate (EER) of 0.68% is obtained from the experiments validating the robust performance of the proposed system.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
On the vulnerability of palm vein recognition to spoofing attacks 手掌静脉识别对欺骗攻击的脆弱性研究
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139056
Pedro Tome, S. Marcel
The vulnerability of palm vein recognition to spoofing attacks is studied in this paper. A collection of spoofing palm vein images has been created from real palm vein samples. Palm vein images are printed using a commercial printer and then, presented at a contactless palm vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Results are presented comparing two automatic segmentations. Experimental results lead to a spoofing false accept rate of 65%, thus showing that palm vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions. A study based on the number of the enrolment samples is also reported, demonstrating a relationship between the number of enrolment samples and the vulnerability of the system to spoofing.
研究了掌纹识别对欺骗攻击的脆弱性。从真实的手掌静脉样本中创建了一个欺骗手掌静脉图像的集合。使用商用打印机打印手掌静脉图像,然后在非接触式手掌静脉传感器上呈现。实验使用可扩展的框架进行,这允许公平和可重复的基准。比较了两种自动分割的结果。实验结果表明,欺骗的误接受率为65%,从而表明手掌静脉生物识别容易受到欺骗攻击,指出研究针对此类欺诈行为的对策的重要性。本文还报道了一项基于注册样本数量的研究,证明了注册样本数量与系统易受欺骗的关系。
{"title":"On the vulnerability of palm vein recognition to spoofing attacks","authors":"Pedro Tome, S. Marcel","doi":"10.1109/ICB.2015.7139056","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139056","url":null,"abstract":"The vulnerability of palm vein recognition to spoofing attacks is studied in this paper. A collection of spoofing palm vein images has been created from real palm vein samples. Palm vein images are printed using a commercial printer and then, presented at a contactless palm vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Results are presented comparing two automatic segmentations. Experimental results lead to a spoofing false accept rate of 65%, thus showing that palm vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions. A study based on the number of the enrolment samples is also reported, demonstrating a relationship between the number of enrolment samples and the vulnerability of the system to spoofing.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks 首届手指静脉欺骗攻击对策竞赛
Pub Date : 2015-05-19 DOI: 10.1109/ICB.2015.7139067
Pedro Tome, Ramachandra Raghavendra, C. Busch, Santosh Tirunagari, N. Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, L. Verdoliva, S. Marcel
The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security problem in the recent years mainly due to the high security applications where biometric technology is used. Recent works shown that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate counter-measures against this type of fraudulent actions. The goal of the 1st Competition on Counter Measures to Finger Vein Spoofing Attacks is to challenge researchers to create counter-measures that can detect printed attacks effectively. The submitted approaches are evaluated on the Spoofing-Attack Finger Vein Database and the achieved results are presented in this paper.
近年来,由于生物识别技术的高安全性应用,手指静脉识别容易受到欺骗攻击已成为一个重要的安全问题。最近的研究表明,手指静脉生物识别技术很容易受到欺骗攻击,指出了调查针对这类欺诈行为的对策的重要性。第一届手指静脉欺骗攻击对策竞赛的目标是挑战研究人员创建能够有效检测打印攻击的对策。在欺骗攻击手指静脉数据库上对所提出的方法进行了评估,并给出了取得的结果。
{"title":"The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks","authors":"Pedro Tome, Ramachandra Raghavendra, C. Busch, Santosh Tirunagari, N. Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, L. Verdoliva, S. Marcel","doi":"10.1109/ICB.2015.7139067","DOIUrl":"https://doi.org/10.1109/ICB.2015.7139067","url":null,"abstract":"The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security problem in the recent years mainly due to the high security applications where biometric technology is used. Recent works shown that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate counter-measures against this type of fraudulent actions. The goal of the 1st Competition on Counter Measures to Finger Vein Spoofing Attacks is to challenge researchers to create counter-measures that can detect printed attacks effectively. The submitted approaches are evaluated on the Spoofing-Attack Finger Vein Database and the achieved results are presented in this paper.","PeriodicalId":237372,"journal":{"name":"2015 International Conference on Biometrics (ICB)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
2015 International Conference on Biometrics (ICB)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1