首页 > 最新文献

2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)最新文献

英文 中文
ISBA 2019 Sponsors Page ISBA 2019赞助商页面
{"title":"ISBA 2019 Sponsors Page","authors":"","doi":"10.1109/isba.2019.8778478","DOIUrl":"https://doi.org/10.1109/isba.2019.8778478","url":null,"abstract":"","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127641726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features
C. Vorugunti, D. S. Guru, Viswanath Pulabaigari
Online Signature Verification (OSV) is a pattern recognition problem, which involves analysis of discrete-time signals of signature samples to classify them as genuine or forgery. One of the core difficulties in designing online signature verification (OSV) system is the inherent intra-writer variability in genuine handwritten signatures, combined with the likelihood of close resemblances and dissimilarities of skilled forgeries with the genuine signatures. To address this issue, in this manuscript, we emphasize the concept of writer dependent parameter fixation (i.e. features, decision threshold and feature dimension) using interval valued representation grounded on feature fusion. For an individual writer, a subset of discriminative features is selected from the original set of features using feature clustering techniques. This is at variance with the writer independent models in which common features are used for all the writers. To practically exhibit the efficiency of the proposed model, thorough experiments are carried out on benchmarking online signature datasets MCYT-100 (DB1), MCYT-330 (DB2) consist of signatures of 100, 330 individuals respectively. Experimental result confirms the efficiency of writer specific parameters for online signature verification. The EER value, the model computes, is lower compared to various latest signature verification models.
在线签名验证(Online Signature Verification, OSV)是一个模式识别问题,它涉及到对签名样本的离散时间信号进行分析,以区分签名样本的真伪。设计在线签名验证(OSV)系统的核心困难之一是真实手写签名固有的写作者内部可变性,以及熟练的伪造者与真实签名的相似性和差异性的可能性。为了解决这个问题,在本文中,我们强调了基于特征融合的区间值表示的作者依赖参数固定(即特征、决策阈值和特征维度)的概念。对于单个作者,使用特征聚类技术从原始特征集中选择一个判别特征子集。这与独立于编写器的模型不同,在该模型中,所有编写器都使用共同的特征。为了实际证明该模型的有效性,在分别包含100个和330个个体签名的在线签名数据集MCYT-100 (DB1)和MCYT-330 (DB2)上进行了全面的测试。实验结果证实了该算法用于在线签名验证的有效性。与各种最新的签名验证模型相比,该模型计算的EER值较低。
{"title":"An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features","authors":"C. Vorugunti, D. S. Guru, Viswanath Pulabaigari","doi":"10.1109/ISBA.2019.8778566","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778566","url":null,"abstract":"Online Signature Verification (OSV) is a pattern recognition problem, which involves analysis of discrete-time signals of signature samples to classify them as genuine or forgery. One of the core difficulties in designing online signature verification (OSV) system is the inherent intra-writer variability in genuine handwritten signatures, combined with the likelihood of close resemblances and dissimilarities of skilled forgeries with the genuine signatures. To address this issue, in this manuscript, we emphasize the concept of writer dependent parameter fixation (i.e. features, decision threshold and feature dimension) using interval valued representation grounded on feature fusion. For an individual writer, a subset of discriminative features is selected from the original set of features using feature clustering techniques. This is at variance with the writer independent models in which common features are used for all the writers. To practically exhibit the efficiency of the proposed model, thorough experiments are carried out on benchmarking online signature datasets MCYT-100 (DB1), MCYT-330 (DB2) consist of signatures of 100, 330 individuals respectively. Experimental result confirms the efficiency of writer specific parameters for online signature verification. The EER value, the model computes, is lower compared to various latest signature verification models.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
User Behavior Profiling using Ensemble Approach for Insider Threat Detection 基于集成方法的内部威胁检测用户行为分析
Malvika Singh, B. Mehtre, S. Sangeetha
The greatest threat towards securing the organization and its assets are no longer the attackers attacking beyond the network walls of the organization but the insiders present within the organization with malicious intent. Existing approaches helps to monitor, detect and prevent any malicious activities within an organization’s network while ignoring the human behavior impact on security. In this paper we have focused on user behavior profiling approach to monitor and analyze user behavior action sequence to detect insider threats. We present an ensemble hybrid machine learning approach using Multi State Long Short Term Memory (MSLSTM) and Convolution Neural Networks (CNN) based time series anomaly detection to detect the additive outliers in the behavior patterns based on their spatial-temporal behavior features. We find that using Multistate LSTM is better than basic single state LSTM. The proposed method with Multistate LSTM can successfully detect the insider threats providing the AUC of 0.9042 on train data and AUC of 0.9047 on test data when trained with publically available dataset for insider threats.
确保组织及其资产安全的最大威胁不再是攻击者在组织的网络墙之外进行攻击,而是组织内部存在恶意意图的内部人员。现有的方法有助于监视、检测和防止组织网络中的任何恶意活动,而忽略了人类行为对安全性的影响。本文主要研究用户行为分析方法,对用户行为动作序列进行监控和分析,以检测内部威胁。本文提出了一种基于多状态长短期记忆(MSLSTM)和卷积神经网络(CNN)的时间序列异常检测的集成混合机器学习方法,根据其时空行为特征检测行为模式中的附加异常值。我们发现使用多状态LSTM比使用基本的单状态LSTM效果更好。使用公开的内部威胁数据集进行训练时,训练数据的AUC为0.9042,测试数据的AUC为0.9047,采用Multistate LSTM方法可以成功检测内部威胁。
{"title":"User Behavior Profiling using Ensemble Approach for Insider Threat Detection","authors":"Malvika Singh, B. Mehtre, S. Sangeetha","doi":"10.1109/ISBA.2019.8778466","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778466","url":null,"abstract":"The greatest threat towards securing the organization and its assets are no longer the attackers attacking beyond the network walls of the organization but the insiders present within the organization with malicious intent. Existing approaches helps to monitor, detect and prevent any malicious activities within an organization’s network while ignoring the human behavior impact on security. In this paper we have focused on user behavior profiling approach to monitor and analyze user behavior action sequence to detect insider threats. We present an ensemble hybrid machine learning approach using Multi State Long Short Term Memory (MSLSTM) and Convolution Neural Networks (CNN) based time series anomaly detection to detect the additive outliers in the behavior patterns based on their spatial-temporal behavior features. We find that using Multistate LSTM is better than basic single state LSTM. The proposed method with Multistate LSTM can successfully detect the insider threats providing the AUC of 0.9042 on train data and AUC of 0.9047 on test data when trained with publically available dataset for insider threats.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Utilization of HOG-SVD based Features with Connected Component Labeling for Multiple Copy-move Image Forgery Detection 基于HOG-SVD特征的连通分量标记在多重复制-移动图像伪造检测中的应用
Anuja Dixit, Soumen Bag
Copy-move forgery is one of the most regarded image forgery technique to tamper information conveyed by the image. In this technique, segment of original image is replicated and pasted across the same image to produce forged image. This technique is capable to hide selective information or to add fictitious details in image. Detection of this form of forgery is one of the significant area of information security. In this paper, we propose block-based approach for copy-move image forgery detection to secure information conveyed through the image by identifying the forged images and to prevent spreading of tampered subject matter. Proposed model divides suspicious image in overlapping blocks. We extracted block features using Histogram of Oriented Gradients (HOG) and Singular Value Decomposition (SVD). Lexicographical sorting is performed over feature matrix followed by Euclidean distance computation to recognize similar feature vectors. To remove false match detection, Connected component labeling is utilized. Our scheme achieves highest F-measure than former techniques, when forged image sustain plain multiple copy-move, multiple copy-move with contrast adjustment, color reduction, and image blurring attacks.
复制-移动伪造是目前最受重视的图像伪造技术之一,其目的是篡改图像所传递的信息。该技术将原始图像的片段复制并粘贴在同一图像上,从而产生伪造图像。该技术能够隐藏选择性信息或在图像中添加虚构的细节。这种伪造形式的检测是信息安全的重要领域之一。在本文中,我们提出了基于块的复制-移动图像伪造检测方法,通过识别伪造图像来保护图像中所传递的信息,并防止篡改主题的传播。该模型将可疑图像划分为重叠块。我们使用定向梯度直方图(HOG)和奇异值分解(SVD)来提取块特征。对特征矩阵进行字典排序,然后进行欧几里得距离计算以识别相似的特征向量。为了消除假匹配检测,使用了连通组件标记。当伪造图像承受普通的多次复制移动、带有对比度调整的多次复制移动、颜色减少和图像模糊攻击时,我们的方案比以前的技术实现了最高的f值。
{"title":"Utilization of HOG-SVD based Features with Connected Component Labeling for Multiple Copy-move Image Forgery Detection","authors":"Anuja Dixit, Soumen Bag","doi":"10.1109/ISBA.2019.8778494","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778494","url":null,"abstract":"Copy-move forgery is one of the most regarded image forgery technique to tamper information conveyed by the image. In this technique, segment of original image is replicated and pasted across the same image to produce forged image. This technique is capable to hide selective information or to add fictitious details in image. Detection of this form of forgery is one of the significant area of information security. In this paper, we propose block-based approach for copy-move image forgery detection to secure information conveyed through the image by identifying the forged images and to prevent spreading of tampered subject matter. Proposed model divides suspicious image in overlapping blocks. We extracted block features using Histogram of Oriented Gradients (HOG) and Singular Value Decomposition (SVD). Lexicographical sorting is performed over feature matrix followed by Euclidean distance computation to recognize similar feature vectors. To remove false match detection, Connected component labeling is utilized. Our scheme achieves highest F-measure than former techniques, when forged image sustain plain multiple copy-move, multiple copy-move with contrast adjustment, color reduction, and image blurring attacks.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Biometric based User Authentication Protocol for Mobile Cloud Environment 移动云环境下基于生物特征的用户认证协议
M. Vivekanandan, V. N. Sastry, U. S. Reddy
Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.
在移动云计算中,移动用户认证是一项具有挑战性的任务。2015年,Tsai和Lo开发了分布式MCC中的认证协议。这是脆弱的生物识别误用,不正确的登录凭据(密码和指纹)和攻击的服务提供商冒充。它没有智能卡撤销的规定,也缺乏相互认证。为了解决上述问题,我们提出了一种新的基于生物识别的MCC用户身份验证协议。该协议支持参与者的会话密钥协议和完美的相互认证。我们的协议使用Burrows-Abadi-Needham (BAN)逻辑进行验证。它进一步抵御了所有已知的攻击,并且在计算成本方面表现良好。
{"title":"Biometric based User Authentication Protocol for Mobile Cloud Environment","authors":"M. Vivekanandan, V. N. Sastry, U. S. Reddy","doi":"10.1109/ISBA.2019.8778529","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778529","url":null,"abstract":"Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Super-Resolution and Image Re-projection for Iris Recognition 虹膜识别的超分辨率和图像重投影
E. Ribeiro, A. Uhl, F. Alonso-Fernandez
Several recent works have addressed the ability of deep learning to disclose rich, hierarchical and discriminative models for the most diverse purposes. Specifically in the super-resolution field, Convolutional Neural Networks (CNNs) using different deep learning approaches attempt to recover realistic texture and fine grained details from low resolution images. In this work we explore the viability of these approaches for iris Super-Resolution (SR) in an iris recognition environment. For this, we test different architectures with and without a so called image re-projection to reduce artifacts applying it to different iris databases to verify the viability of the different CNNs for iris super-resolution. Results show that CNNs and image re-projection can improve the results specially for the accuracy of recognition systems using a complete different training database performing the transfer learning successfully.
最近的一些工作已经解决了深度学习为最多样化的目的揭示丰富、分层和判别模型的能力。特别是在超分辨率领域,卷积神经网络(cnn)使用不同的深度学习方法试图从低分辨率图像中恢复真实的纹理和细粒度细节。在这项工作中,我们探讨了这些方法在虹膜识别环境中用于虹膜超分辨率(SR)的可行性。为此,我们测试了不同的架构,使用和不使用所谓的图像重投影来减少伪影,将其应用于不同的虹膜数据库,以验证不同cnn对虹膜超分辨率的可行性。结果表明,cnn和图像重投影可以提高结果的准确性,特别是在使用完全不同的训练数据库进行迁移学习的识别系统中。
{"title":"Super-Resolution and Image Re-projection for Iris Recognition","authors":"E. Ribeiro, A. Uhl, F. Alonso-Fernandez","doi":"10.1109/ISBA.2019.8778581","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778581","url":null,"abstract":"Several recent works have addressed the ability of deep learning to disclose rich, hierarchical and discriminative models for the most diverse purposes. Specifically in the super-resolution field, Convolutional Neural Networks (CNNs) using different deep learning approaches attempt to recover realistic texture and fine grained details from low resolution images. In this work we explore the viability of these approaches for iris Super-Resolution (SR) in an iris recognition environment. For this, we test different architectures with and without a so called image re-projection to reduce artifacts applying it to different iris databases to verify the viability of the different CNNs for iris super-resolution. Results show that CNNs and image re-projection can improve the results specially for the accuracy of recognition systems using a complete different training database performing the transfer learning successfully.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114614472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration 文字篡改笔迹鉴定的法医学性能研究
Priyanka Roy, Soumen Bag
Forgery activity in legal handwritten documents is an identifiable problem. Falsification of document due to minute alteration of existings not only causes immense financial loss to a person or to any organization but also lessens the economic growth of a country. Here, we introduce and present a solution to detect forgery in handwritten documents by analyzing perceptually similar ink of different pens. The research is all about forensic investigation of handwritten word alteration which is performed by adding extra letter in a way such that the whole meaning of the word changes. The problem is formulated as binary classification problem. If words of the corresponding document are written by same pen, these are classified as positive class and words of a document accompanied with little inclusion of letters as a forgery attack, are classified as negative class. The article proposes Multilayer Perceptron classifier which has been adopted to classify data instances that have been computed by extracting Y CbCr color-based statistical features. This proposal has been tested on data set which has been generated by 10 blue and 10 black ball point pens. The respective obtained average accuracy is 83.71% and 78. 18% for blue pen data and black pen data.
法律手写文件中的伪造活动是一个可识别的问题。由于存单的微小变更而造成的文件伪造不仅给个人或组织造成巨大的经济损失,而且还会减少一个国家的经济增长。在这里,我们介绍并提出了一种通过分析不同笔的感知相似墨水来检测手写文件伪造的解决方案。本研究是对手写文字的修改进行法医学调查,这种修改是通过添加额外的字母来完成的,从而使单词的整个意思发生变化。该问题被表述为二元分类问题。如果对应文件的文字是由同一支笔书写的,则这些文字被归类为正面类,而文件的文字几乎没有包含字母作为伪造攻击,则被归类为负面类。本文提出了多层感知器分类器,该分类器通过提取Y CbCr基于颜色的统计特征来对计算出来的数据实例进行分类。该方案已在由10支蓝色圆珠笔和10支黑色圆珠笔生成的数据集上进行了测试。得到的平均准确率分别为83.71%和78。18%为蓝笔数据和黑笔数据。
{"title":"Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration","authors":"Priyanka Roy, Soumen Bag","doi":"10.1109/ISBA.2019.8778490","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778490","url":null,"abstract":"Forgery activity in legal handwritten documents is an identifiable problem. Falsification of document due to minute alteration of existings not only causes immense financial loss to a person or to any organization but also lessens the economic growth of a country. Here, we introduce and present a solution to detect forgery in handwritten documents by analyzing perceptually similar ink of different pens. The research is all about forensic investigation of handwritten word alteration which is performed by adding extra letter in a way such that the whole meaning of the word changes. The problem is formulated as binary classification problem. If words of the corresponding document are written by same pen, these are classified as positive class and words of a document accompanied with little inclusion of letters as a forgery attack, are classified as negative class. The article proposes Multilayer Perceptron classifier which has been adopted to classify data instances that have been computed by extracting Y CbCr color-based statistical features. This proposal has been tested on data set which has been generated by 10 blue and 10 black ball point pens. The respective obtained average accuracy is 83.71% and 78. 18% for blue pen data and black pen data.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo Filters 利用自定义杜鹃滤波器降低虹膜识别模板保护的错误率
K. Raja, Ramachandra Raghavendra, C. Busch
The need to protect biometric data within iris systems has resulted in a number of template protection schemes. A primary issue with current template protection schemes for iris recognition is the unavoidable biometric error rates, i.e., for any given False Non-Match Rate (FNMR) there is a high False Match Rate (FMR), especially at lower values of FNMR. In this work, we primarily focus on addressing this problem using a new approach with Cuckoo Filtering simultaneously using both stable bits and discriminative bits to derive a stronger template protection scheme. The proposed template protection scheme performs in a robust manner for various configurations as compared to earlier template protection schemes that need empirical fine-tuning. With the set of experiments on a publicly available iris dataset, we benchmark our results against the state-of-art template protection scheme based on Bloom-Filters. Specifically, we demonstrate the gain in performance and robustness of proposed approach at lower FNMR and invariance of performance to configurations of template protection scheme. With a specific configuration of proposed approach, we achieve Genuine Match Rate (GMR) = 100% at FMR = 0:01% and EER = 0% in the best case and GMR = 98:44% at FMR = 0:01% and EER = 0:33% in the worst case on IITD Iris database.
为了保护虹膜系统内的生物识别数据,出现了许多模板保护方案。当前用于虹膜识别的模板保护方案的一个主要问题是不可避免的生物特征错误率,即对于任何给定的假非匹配率(FNMR),都存在较高的假匹配率(FMR),特别是在较低的FNMR值时。在这项工作中,我们主要关注使用杜鹃滤波的新方法来解决这个问题,同时使用稳定位和判别位来推导更强的模板保护方案。与需要经验微调的早期模板保护方案相比,本文提出的模板保护方案对各种配置具有鲁棒性。通过在公开可用的虹膜数据集上进行的一组实验,我们将我们的结果与基于Bloom-Filters的最先进的模板保护方案进行了基准测试。具体来说,我们证明了该方法在较低FNMR下的性能增益和鲁棒性,以及性能对模板保护方案配置的不变性。在IITD Iris数据库上,通过对该方法的具体配置,在最佳情况下,在FMR = 0:01%时,GMR = 100%, EER = 0%;在最差情况下,在FMR = 0:01%时,GMR = 98:44%, EER = 0:33%。
{"title":"Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo Filters","authors":"K. Raja, Ramachandra Raghavendra, C. Busch","doi":"10.1109/ISBA.2019.8778470","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778470","url":null,"abstract":"The need to protect biometric data within iris systems has resulted in a number of template protection schemes. A primary issue with current template protection schemes for iris recognition is the unavoidable biometric error rates, i.e., for any given False Non-Match Rate (FNMR) there is a high False Match Rate (FMR), especially at lower values of FNMR. In this work, we primarily focus on addressing this problem using a new approach with Cuckoo Filtering simultaneously using both stable bits and discriminative bits to derive a stronger template protection scheme. The proposed template protection scheme performs in a robust manner for various configurations as compared to earlier template protection schemes that need empirical fine-tuning. With the set of experiments on a publicly available iris dataset, we benchmark our results against the state-of-art template protection scheme based on Bloom-Filters. Specifically, we demonstrate the gain in performance and robustness of proposed approach at lower FNMR and invariance of performance to configurations of template protection scheme. With a specific configuration of proposed approach, we achieve Genuine Match Rate (GMR) = 100% at FMR = 0:01% and EER = 0% in the best case and GMR = 98:44% at FMR = 0:01% and EER = 0:33% in the worst case on IITD Iris database.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FDSNet: Finger dorsal image spoof detection network using light field camera FDSNet:使用光场相机的手指背图像欺骗检测网络
Avantika Singh, Gaurav Jaswal, A. Nigam
At present spoofing attacks via which biometric system is potentially vulnerable against a fake biometric characteristic, introduces a great challenge to recognition performance. Despite the availability of a broad range of presentation attack detection (PAD) or liveness detection algorithms, fingerprint sensors are vulnerable to spoofing via fake fingers. In such situations, finger dorsal images can be thought of as an alternative which can be captured without much user cooperation and are more appropriate for outdoor security applications. In this paper, we present a first feasibility study of spoofing attack scenarios on finger dorsal authentication system, which include four types of presentation attacks such as printed paper, wrapped printed paper, scan and mobile. This study also presents a CNN based spoofing attack detection method which employ state-of-the-art deep learning techniques along with transfer learning mechanism. We have collected 196 finger dorsal real images from 33 subjects, captured with a Lytro camera and also created a set of 784 finger dorsal spoofing images. Extensive experimental results have been performed that demonstrates the superiority of the proposed approach for various spoofing attacks.
目前,生物识别系统容易受到伪造生物特征的欺骗攻击,对识别性能提出了很大的挑战。尽管存在广泛的表现攻击检测(PAD)或活体检测算法,但指纹传感器很容易受到假手指的欺骗。在这种情况下,手指背侧图像可以被认为是一种替代方案,可以在没有太多用户合作的情况下捕获,并且更适合户外安全应用。本文首次对指纹背侧认证系统的欺骗攻击场景进行了可行性研究,包括印刷纸、包装印刷纸、扫描和移动四种类型的表示攻击。本研究还提出了一种基于CNN的欺骗攻击检测方法,该方法采用了最先进的深度学习技术和迁移学习机制。我们收集了来自33名受试者的196张手指背的真实图像,用Lytro相机拍摄,并创建了一组784张手指背的欺骗图像。大量的实验结果表明,所提出的方法对各种欺骗攻击具有优越性。
{"title":"FDSNet: Finger dorsal image spoof detection network using light field camera","authors":"Avantika Singh, Gaurav Jaswal, A. Nigam","doi":"10.1109/ISBA.2019.8778453","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778453","url":null,"abstract":"At present spoofing attacks via which biometric system is potentially vulnerable against a fake biometric characteristic, introduces a great challenge to recognition performance. Despite the availability of a broad range of presentation attack detection (PAD) or liveness detection algorithms, fingerprint sensors are vulnerable to spoofing via fake fingers. In such situations, finger dorsal images can be thought of as an alternative which can be captured without much user cooperation and are more appropriate for outdoor security applications. In this paper, we present a first feasibility study of spoofing attack scenarios on finger dorsal authentication system, which include four types of presentation attacks such as printed paper, wrapped printed paper, scan and mobile. This study also presents a CNN based spoofing attack detection method which employ state-of-the-art deep learning techniques along with transfer learning mechanism. We have collected 196 finger dorsal real images from 33 subjects, captured with a Lytro camera and also created a set of 784 finger dorsal spoofing images. Extensive experimental results have been performed that demonstrates the superiority of the proposed approach for various spoofing attacks.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features PVSNet:通过学习强制领域特定特征,使用三重损失和自适应硬挖掘训练的手掌静脉认证连体网络
Daksh Thapar, Gaurav Jaswal, A. Nigam, Vivek Kanhangad
Designing an end-to-end deep learning network to match the biometric features with limited training samples is an extremely challenging task. To address this problem, we propose a new way to design an end-to-end deep CNN framework i.e., PVSNet that works in two major steps: first, an encoder-decoder network is used to learn generative domain-specific features followed by a Siamese network in which convolutional layers are pre-trained in an unsupervised fashion as an autoencoder. The proposed model is trained via triplet loss function that is adjusted for learning feature embeddings in a way that minimizes the distance between embedding-pairs from the same subject and maximizes the distance with those from different subjects, with a margin. In particular, a triplet Siamese matching network using an adaptive margin based hard negative mining has been suggested. The hyper-parameters associated with the training strategy, like the adaptive margin, have been tuned to make the learning more effective on biometric datasets. In extensive experimentation, the proposed network outperforms most of the existing deep learning solutions on three type of typical vein datasets which clearly demonstrates the effectiveness of our proposed method.
设计一个端到端的深度学习网络来匹配生物特征和有限的训练样本是一项极具挑战性的任务。为了解决这个问题,我们提出了一种设计端到端深度CNN框架的新方法,即PVSNet,它分为两个主要步骤:首先,使用编码器-解码器网络来学习生成的特定领域特征,然后使用Siamese网络,其中卷积层以无监督的方式作为自动编码器进行预训练。所提出的模型通过三重损失函数进行训练,该函数经过调整以学习特征嵌入,以最小化来自同一主题的嵌入对之间的距离,并在一定范围内最大化来自不同主题的嵌入对之间的距离。特别提出了一种基于自适应边际的硬负挖掘的三重连体匹配网络。与训练策略相关的超参数,如自适应裕度,已经被调整,使学习在生物特征数据集上更有效。在广泛的实验中,所提出的网络在三种典型的静脉数据集上优于大多数现有的深度学习解决方案,这清楚地证明了我们所提出方法的有效性。
{"title":"PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features","authors":"Daksh Thapar, Gaurav Jaswal, A. Nigam, Vivek Kanhangad","doi":"10.1109/ISBA.2019.8778623","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778623","url":null,"abstract":"Designing an end-to-end deep learning network to match the biometric features with limited training samples is an extremely challenging task. To address this problem, we propose a new way to design an end-to-end deep CNN framework i.e., PVSNet that works in two major steps: first, an encoder-decoder network is used to learn generative domain-specific features followed by a Siamese network in which convolutional layers are pre-trained in an unsupervised fashion as an autoencoder. The proposed model is trained via triplet loss function that is adjusted for learning feature embeddings in a way that minimizes the distance between embedding-pairs from the same subject and maximizes the distance with those from different subjects, with a margin. In particular, a triplet Siamese matching network using an adaptive margin based hard negative mining has been suggested. The hyper-parameters associated with the training strategy, like the adaptive margin, have been tuned to make the learning more effective on biometric datasets. In extensive experimentation, the proposed network outperforms most of the existing deep learning solutions on three type of typical vein datasets which clearly demonstrates the effectiveness of our proposed method.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1