首页 > 最新文献

2023 11th International Workshop on Biometrics and Forensics (IWBF)最新文献

英文 中文
Frequency-Domain Analysis of Traces for the Detection of AI-based Compression 基于ai压缩检测的轨迹频域分析
Pub Date : 2023-04-19 DOI: 10.1109/IWBF57495.2023.10157489
Sandra Bergmann, Denise Moussa, Fabian Brand, A. Kaup, C. Riess
The JPEG algorithm is the most popular compression method on the internet. Its properties have been extensively studied in image forensics for examining image origin and authenticity. However, the JPEG standard will in the near future be extended with AI-based compression. This approach is fundamentally different from the classic JPEG algorithm, and requires an entirely new set of forensics tools.As a first step towards forensic tools for AI compression, we present a first investigation of forensic traces in HiFiC, the current state-of-the-art AI-based compression method. We investigate the frequency space of the compressed images, and identify two types of traces, which likely arise from GAN upsampling and in homogeneous areas. We evaluate the detectability on different patch sizes and unseen postprocessing, and report a detectability of 96.37%. Our empirical results also suggest that further, yet unidentified, compression traces can be expected in the spatial domain.
JPEG算法是目前网络上最流行的压缩方法。它的性质在图像取证中得到了广泛的研究,用于检测图像的起源和真实性。然而,JPEG标准将在不久的将来扩展为基于人工智能的压缩。这种方法从根本上不同于经典的JPEG算法,需要一套全新的取证工具。作为迈向人工智能压缩法医工具的第一步,我们提出了HiFiC中法医痕迹的首次调查,这是目前最先进的基于人工智能的压缩方法。我们研究了压缩图像的频率空间,并识别了两种类型的迹线,它们可能来自GAN上采样和均匀区域。我们评估了不同补丁大小和不可见后处理的可检测性,并报告了96.37%的可检测性。我们的实证结果还表明,进一步的,尚未确定的,压缩痕迹可以预期在空间领域。
{"title":"Frequency-Domain Analysis of Traces for the Detection of AI-based Compression","authors":"Sandra Bergmann, Denise Moussa, Fabian Brand, A. Kaup, C. Riess","doi":"10.1109/IWBF57495.2023.10157489","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157489","url":null,"abstract":"The JPEG algorithm is the most popular compression method on the internet. Its properties have been extensively studied in image forensics for examining image origin and authenticity. However, the JPEG standard will in the near future be extended with AI-based compression. This approach is fundamentally different from the classic JPEG algorithm, and requires an entirely new set of forensics tools.As a first step towards forensic tools for AI compression, we present a first investigation of forensic traces in HiFiC, the current state-of-the-art AI-based compression method. We investigate the frequency space of the compressed images, and identify two types of traces, which likely arise from GAN upsampling and in homogeneous areas. We evaluate the detectability on different patch sizes and unseen postprocessing, and report a detectability of 96.37%. Our empirical results also suggest that further, yet unidentified, compression traces can be expected in the spatial domain.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Quality and Diversity of Synthetic Face Data and its Relation to the Generator Training Data 合成人脸数据的质量和多样性及其与生成器训练数据的关系
Pub Date : 2023-04-19 DOI: 10.1109/IWBF57495.2023.10157014
Biying Fu, Marcel Klemt, F. Boutros, N. Damer
In recent years, advances in deep learning techniques and large-scale identity-labeled datasets have enabled facial recognition algorithms to rapidly gain performance. However, due to privacy issues, ethical concerns, and regulations governing the processing, transmission, and storage of biometric samples, several publicly available face image datasets are being withdrawn by their creators. The reason is that these datasets are mostly crawled from the web with the possibility that not all users had properly consented to processing their biometric data. To mitigate this problem, synthetic face images from generative approaches are motivated to substitute the need for authentic face images to train and test face recognition. In this work, we investigate both the relation between synthetic face image data and the generator authentic training data and the relation between the authentic data and the synthetic data in general under two aspects, i.e. the general image quality and face image quality. The first term refers to perceived image quality and the second measures the utility of a face image for automatic face recognition algorithms. To further quantify these relations, we build the analyses under two terms denoted as the dissimilarity in quality values expressing the general difference in quality distributions and the dissimilarity in quality diversity expressing the diversity in the quality values.
近年来,深度学习技术和大规模身份标记数据集的进步使面部识别算法能够快速获得性能。然而,由于隐私问题、伦理问题以及管理生物识别样本处理、传输和存储的法规,一些公开可用的人脸图像数据集正在被其创建者撤回。原因是这些数据集大多是从网上抓取的,可能并非所有用户都正确同意处理他们的生物特征数据。为了缓解这一问题,基于生成方法的合成人脸图像被用来代替真实人脸图像来训练和测试人脸识别。在这项工作中,我们从一般图像质量和人脸图像质量两个方面研究了合成人脸图像数据与生成器真实训练数据之间的关系,以及真实数据与合成数据之间的关系。第一个术语是指感知图像质量,第二个术语是衡量人脸图像对自动人脸识别算法的效用。为了进一步量化这些关系,我们建立了两个术语的分析,即质量值的不相似性表示质量分布的一般差异,质量多样性的不相似性表示质量值的多样性。
{"title":"On the Quality and Diversity of Synthetic Face Data and its Relation to the Generator Training Data","authors":"Biying Fu, Marcel Klemt, F. Boutros, N. Damer","doi":"10.1109/IWBF57495.2023.10157014","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157014","url":null,"abstract":"In recent years, advances in deep learning techniques and large-scale identity-labeled datasets have enabled facial recognition algorithms to rapidly gain performance. However, due to privacy issues, ethical concerns, and regulations governing the processing, transmission, and storage of biometric samples, several publicly available face image datasets are being withdrawn by their creators. The reason is that these datasets are mostly crawled from the web with the possibility that not all users had properly consented to processing their biometric data. To mitigate this problem, synthetic face images from generative approaches are motivated to substitute the need for authentic face images to train and test face recognition. In this work, we investigate both the relation between synthetic face image data and the generator authentic training data and the relation between the authentic data and the synthetic data in general under two aspects, i.e. the general image quality and face image quality. The first term refers to perceived image quality and the second measures the utility of a face image for automatic face recognition algorithms. To further quantify these relations, we build the analyses under two terms denoted as the dissimilarity in quality values expressing the general difference in quality distributions and the dissimilarity in quality diversity expressing the diversity in the quality values.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Design of the MITLL Trimodal Dataset for Identity Verification 身份验证用MITLL三模态数据集的设计
Pub Date : 2023-04-19 DOI: 10.1109/IWBF57495.2023.10157658
E. Singer, B. J. Borgstrom, Kenneth Alperin, Trang Nguyen, C. Dagli, Melissa R. Dale, A. Ross
The recent advances in deep learning have led to an increased interest in the development of techniques for multimodal identity verification applications, particularly in the area of biometric fusion. Associated with these efforts is a corresponding need for large scale multimodal datasets to provide the bases for establishing performance baselines for proposed approaches. After examining the characteristics of existing multimodal datasets, this paper will describe the development of the MITLL Trimodal dataset, a new triple-modality collection of data comprising parallel samples of audio, image, and text for 553 subjects. The dataset is formed from YouTube videos and Twitter tweets. Baseline single modality results using a common processing pipeline are presented, along with the results of applying a conventional fusion algorithm to the individual stream scores.
深度学习的最新进展导致了对多模态身份验证应用技术开发的兴趣增加,特别是在生物识别融合领域。与这些努力相关的是对大规模多模态数据集的相应需求,以提供为拟议方法建立性能基线的基础。在研究了现有多模态数据集的特征之后,本文将描述MITLL三模态数据集的发展,这是一个新的三模态数据集,包括553个受试者的音频、图像和文本的并行样本。该数据集由YouTube视频和Twitter推文组成。给出了使用通用处理管道的基线单模态结果,以及将传统融合算法应用于单个流分数的结果。
{"title":"On the Design of the MITLL Trimodal Dataset for Identity Verification","authors":"E. Singer, B. J. Borgstrom, Kenneth Alperin, Trang Nguyen, C. Dagli, Melissa R. Dale, A. Ross","doi":"10.1109/IWBF57495.2023.10157658","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157658","url":null,"abstract":"The recent advances in deep learning have led to an increased interest in the development of techniques for multimodal identity verification applications, particularly in the area of biometric fusion. Associated with these efforts is a corresponding need for large scale multimodal datasets to provide the bases for establishing performance baselines for proposed approaches. After examining the characteristics of existing multimodal datasets, this paper will describe the development of the MITLL Trimodal dataset, a new triple-modality collection of data comprising parallel samples of audio, image, and text for 553 subjects. The dataset is formed from YouTube videos and Twitter tweets. Baseline single modality results using a common processing pipeline are presented, along with the results of applying a conventional fusion algorithm to the individual stream scores.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Continual Social Network Identification 走向持续的社会网络认同
Pub Date : 2023-04-19 DOI: 10.1109/IWBF57495.2023.10157835
Simone Magistri, Daniele Baracchi, D. Shullani, Andrew D. Bagdanov, A. Piva
Social networks have become most widely used channels for sharing images and videos, and discovering the social platform of origin of multimedia content is of great interest to the forensics community. Several techniques address this problem, however the rapid development of new social platforms, and the deployment of updates to existing ones, often render forensic tools obsolete shortly after their introduction. This effectively requires constant updating of methods and models, which is especially cumbersome when dealing with techniques based on neural networks, as trained models cannot be easily fine-tuned to handle new classes without drastically reducing the performance on the old ones – a phenomenon known as catastrophic forgetting. Updating a model thus often entails retraining the network from scratch on all available data, including that used for training previous versions of the model. Continual learning refers to techniques specifically designed to mitigate catastrophic forgetting, thus making it possible to extend an existing model requiring no or a limited number of examples from the original dataset. In this paper, we investigate the potential of continual learning techniques to build an extensible social network identification neural network. We introduce a simple yet effective neural network architecture for Social Network Identification (SNI) and perform extensive experimental validation of continual learning approaches on it. Our results demonstrate that, although Continual SNI remains a challenging problem, catastrophic forgetting can be significantly reduced by only retaining a fraction of the original training data.
社交网络已经成为最广泛使用的图像和视频共享渠道,发现多媒体内容的社交来源平台是取证界非常感兴趣的问题。有几种技术可以解决这个问题,然而,新的社交平台的快速发展,以及对现有平台的更新部署,往往使取证工具在引入后不久就过时了。这实际上需要不断地更新方法和模型,这在处理基于神经网络的技术时尤其麻烦,因为训练过的模型不能轻易地进行微调来处理新的类,而不会大幅降低旧类的性能——一种被称为灾难性遗忘的现象。因此,更新模型通常需要在所有可用数据上从头开始重新训练网络,包括用于训练模型以前版本的数据。持续学习指的是专门为减轻灾难性遗忘而设计的技术,从而使扩展现有模型成为可能,该模型不需要原始数据集中的样本或样本数量有限。在本文中,我们研究了持续学习技术的潜力,以建立一个可扩展的社会网络识别神经网络。我们为社会网络识别(SNI)引入了一个简单而有效的神经网络架构,并对其上的持续学习方法进行了广泛的实验验证。我们的研究结果表明,尽管持续SNI仍然是一个具有挑战性的问题,但只保留一小部分原始训练数据可以显著减少灾难性遗忘。
{"title":"Towards Continual Social Network Identification","authors":"Simone Magistri, Daniele Baracchi, D. Shullani, Andrew D. Bagdanov, A. Piva","doi":"10.1109/IWBF57495.2023.10157835","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157835","url":null,"abstract":"Social networks have become most widely used channels for sharing images and videos, and discovering the social platform of origin of multimedia content is of great interest to the forensics community. Several techniques address this problem, however the rapid development of new social platforms, and the deployment of updates to existing ones, often render forensic tools obsolete shortly after their introduction. This effectively requires constant updating of methods and models, which is especially cumbersome when dealing with techniques based on neural networks, as trained models cannot be easily fine-tuned to handle new classes without drastically reducing the performance on the old ones – a phenomenon known as catastrophic forgetting. Updating a model thus often entails retraining the network from scratch on all available data, including that used for training previous versions of the model. Continual learning refers to techniques specifically designed to mitigate catastrophic forgetting, thus making it possible to extend an existing model requiring no or a limited number of examples from the original dataset. In this paper, we investigate the potential of continual learning techniques to build an extensible social network identification neural network. We introduce a simple yet effective neural network architecture for Social Network Identification (SNI) and perform extensive experimental validation of continual learning approaches on it. Our results demonstrate that, although Continual SNI remains a challenging problem, catastrophic forgetting can be significantly reduced by only retaining a fraction of the original training data.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Feature Visualisation of Single Morphing Attack Detection 单变形攻击检测的人脸特征可视化
Pub Date : 2023-04-19 DOI: 10.1109/IWBF57495.2023.10157534
Juan E. Tapia, C. Busch
This paper proposes an explainable visualisation of different face feature extraction algorithms that enable the detection of bona fide and morphing images for single morphing attack detection. The feature extraction is based on raw image, shape, texture, frequency and compression. This visualisation may help to develop a Graphical User Interface for border policies and specifically for border guard personnel that have to investigate details of suspect images. A Random forest classifier was trained in a leave-one-out protocol on three landmarks-based face morphing methods and a StyleGAN-based morphing method for which morphed images are available in the FRLL database. For morphing attack detection, the Discrete Cosine-Transformation-based method obtained the best results for synthetic images and BSIF for landmark-based image features.
本文提出了一种可解释的可视化的不同的人脸特征提取算法,使检测真实和变形图像的单一变形攻击检测。特征提取是基于原始图像、形状、纹理、频率和压缩。这种可视化可能有助于为边境政策开发图形用户界面,特别是为必须调查可疑图像细节的边防人员开发图形用户界面。在三种基于地标的人脸变形方法和一种基于stylegan的人脸变形方法(变形后的图像在FRLL数据库中可用)的基础上,采用留一协议训练随机森林分类器。在变形攻击检测中,基于离散余弦变换的方法对合成图像检测效果最好,基于地标的图像特征检测效果最好。
{"title":"Face Feature Visualisation of Single Morphing Attack Detection","authors":"Juan E. Tapia, C. Busch","doi":"10.1109/IWBF57495.2023.10157534","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157534","url":null,"abstract":"This paper proposes an explainable visualisation of different face feature extraction algorithms that enable the detection of bona fide and morphing images for single morphing attack detection. The feature extraction is based on raw image, shape, texture, frequency and compression. This visualisation may help to develop a Graphical User Interface for border policies and specifically for border guard personnel that have to investigate details of suspect images. A Random forest classifier was trained in a leave-one-out protocol on three landmarks-based face morphing methods and a StyleGAN-based morphing method for which morphed images are available in the FRLL database. For morphing attack detection, the Discrete Cosine-Transformation-based method obtained the best results for synthetic images and BSIF for landmark-based image features.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins 面部变形攻击的脆弱性:以长得像和同卵双胞胎为例
Pub Date : 2023-03-24 DOI: 10.1109/IWBF57495.2023.10157461
Raghavendra Ramachandra, S. Venkatesh, Gaurav Jaswal, Guoqiang Li
Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike and identical twins as the source of face morphing generation. We present a systematic study on benchmarking the vulnerability of Face Recognition Systems (FRS) to lookalike and identical twin morphing images. Therefore, we constructed new face morphing datasets using 16 pairs of identical twin and lookalike data subjects. Morphing images from lookalike and identical twins are generated using a landmark-based method. Extensive experiments are carried out to benchmark the attack potential of lookalike and identical twins. Furthermore, experiments are designed to provide insights into the impact of vulnerability with normal face morphing compared with lookalike and identical twin face morphing.
面部变形攻击已成为潜在威胁,特别是在自动边境控制场景中。变形攻击允许不止一个人使用旅行证件,这些证件可以通过自动边境控制门越过边境。变形攻击的可能性取决于数据主体(同谋和恶意参与者)的选择。这项工作调查了长相相似和同卵双胞胎作为面部变形产生的来源。我们对人脸识别系统(FRS)对相似和相同的双胞胎变形图像的脆弱性进行了系统的基准测试研究。因此,我们使用16对同卵双胞胎和长相相似的数据主体构建了新的人脸变形数据集。使用基于地标的方法生成相似和同卵双胞胎的变形图像。大量的实验进行了基准的攻击潜力长得像和同卵双胞胎。此外,实验旨在提供对脆弱性的影响,正常面部变形,比较相似和同卵双胞胎面部变形。
{"title":"Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins","authors":"Raghavendra Ramachandra, S. Venkatesh, Gaurav Jaswal, Guoqiang Li","doi":"10.1109/IWBF57495.2023.10157461","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157461","url":null,"abstract":"Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike and identical twins as the source of face morphing generation. We present a systematic study on benchmarking the vulnerability of Face Recognition Systems (FRS) to lookalike and identical twin morphing images. Therefore, we constructed new face morphing datasets using 16 pairs of identical twin and lookalike data subjects. Morphing images from lookalike and identical twins are generated using a landmark-based method. Extensive experiments are carried out to benchmark the attack potential of lookalike and identical twins. Furthermore, experiments are designed to provide insights into the impact of vulnerability with normal face morphing compared with lookalike and identical twin face morphing.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128746047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Longitudinal Performance of Iris Recognition in Children: Time Intervals up to Six years 儿童虹膜识别的纵向表现:时间间隔长达6年
Pub Date : 2023-03-10 DOI: 10.1109/IWBF57495.2023.10157312
Priyanka Das, N. Venkataswamy, Laura Holsopple, M. Imtiaz, M. Schuckers, S. Schuckers
The temporal stability of iris recognition performance is core to its success as a biometric modality. With the expanding horizon of applications for children, gaps in the knowledge base on the temporal stability of iris recognition performance in children have impacted decision-making during applications at the global scale. This report presents the most extensive analysis of longitudinal iris recognition performance in children with data from the same 230 children over 6.5 years between enrollment and query for ages 4 to 17 years. Assessment of match scores, statistical modelling of variability factors impacting match scores and in-depth assessment of the root causes of the false rejections concludes no impact on iris recognition performance due to aging.
虹膜识别性能的时间稳定性是其作为一种生物识别模式成功的核心。随着儿童应用领域的不断扩大,儿童虹膜识别性能的时间稳定性知识库的空白影响了全球范围内应用中的决策。本报告对儿童纵向虹膜识别表现进行了最广泛的分析,数据来自230名年龄在6.5岁以上的儿童,年龄在4至17岁之间。通过对匹配分数的评估,对影响匹配分数的变异性因素的统计建模,以及对错误拒绝的根本原因的深入评估,得出的结论是,老化对虹膜识别性能没有影响。
{"title":"Longitudinal Performance of Iris Recognition in Children: Time Intervals up to Six years","authors":"Priyanka Das, N. Venkataswamy, Laura Holsopple, M. Imtiaz, M. Schuckers, S. Schuckers","doi":"10.1109/IWBF57495.2023.10157312","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157312","url":null,"abstract":"The temporal stability of iris recognition performance is core to its success as a biometric modality. With the expanding horizon of applications for children, gaps in the knowledge base on the temporal stability of iris recognition performance in children have impacted decision-making during applications at the global scale. This report presents the most extensive analysis of longitudinal iris recognition performance in children with data from the same 230 children over 6.5 years between enrollment and query for ages 4 to 17 years. Assessment of match scores, statistical modelling of variability factors impacting match scores and in-depth assessment of the root causes of the false rejections concludes no impact on iris recognition performance due to aging.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Presentation Attack Detection with Advanced CNN Models for Noncontact-based Fingerprint Systems 基于非接触指纹系统的高级CNN模型表示攻击检测
Pub Date : 2023-03-09 DOI: 10.1109/IWBF57495.2023.10157605
Sandip Purnapatra, Conor Miller-Lynch, Stephen Miner, Yu Liu, Keivan Bahmani, Soumyabrata Dey, S. Schuckers
Touch-based fingerprint biometrics is one of the most popular biometric modalities with applications in several fields. Problems associated with touch-based techniques such as the presence of latent fingerprints and hygiene issues due to many people touching the same surface motivated the community to look for non-contact-based solutions. For the last few years, contactless fingerprint systems are on the rise and in demand because of the ability to turn any device with a camera into a fingerprint reader. Yet, before we can fully utilize the benefit of noncontact-based methods, the biometric community needs to resolve a few concerns such as the resiliency of the system against presentation attacks. One of the major obstacles is the limited publicly available data sets with inadequate spoof and live data. In this publication, we have developed a Presentation attack detection (PAD) dataset of more than 7500 four-finger images and more than 14,000 manually segmented single-fingertip images, and 10,000 synthetic fingertips (deepfakes). The PAD dataset was collected from six different Presentation Attack Instruments (PAI) of three different difficulty levels according to FIDO protocols, with five different types of PAI materials, and different smartphone cameras with manual focusing. We have utilized DenseNet-121 and NasNetMobile models and our proposed dataset to develop PAD algorithms and achieved PAD accuracy of Attack presentation classification error rate (APCER) 0.14% and Bonafide presentation classification error rate (BPCER) 0.18%. We have also reported the test results of the models against unseen spoof types to replicate uncertain real-world testing scenarios.
基于触摸的指纹识别技术是目前最流行的生物识别技术之一,在多个领域都有广泛的应用。与基于触摸的技术相关的问题,如潜在指纹的存在和由于许多人触摸同一个表面而引起的卫生问题,促使社区寻找非接触式解决方案。在过去的几年里,非接触式指纹识别系统的需求不断增加,因为它能够将任何带摄像头的设备变成指纹识别器。然而,在我们能够充分利用非接触式方法的好处之前,生物识别社区需要解决一些问题,例如系统对表示攻击的弹性。其中一个主要障碍是公开可用的数据集有限,欺骗和实时数据不足。在本文中,我们开发了一个包含超过7500个四指图像和超过14,000个手动分割的单指图像以及10,000个合成指尖(深度伪造)的呈现攻击检测(PAD)数据集。PAD数据集收集自六种不同的呈现攻击工具(PAI),根据FIDO协议具有三种不同的难度级别,五种不同类型的PAI材料,以及不同的手动对焦智能手机相机。我们利用DenseNet-121和NasNetMobile模型和我们提出的数据集开发了PAD算法,并实现了攻击呈现分类错误率(APCER) 0.14%和Bonafide呈现分类错误率(BPCER) 0.18%的PAD准确率。我们还报告了模型针对未见的欺骗类型的测试结果,以复制不确定的真实世界测试场景。
{"title":"Presentation Attack Detection with Advanced CNN Models for Noncontact-based Fingerprint Systems","authors":"Sandip Purnapatra, Conor Miller-Lynch, Stephen Miner, Yu Liu, Keivan Bahmani, Soumyabrata Dey, S. Schuckers","doi":"10.1109/IWBF57495.2023.10157605","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157605","url":null,"abstract":"Touch-based fingerprint biometrics is one of the most popular biometric modalities with applications in several fields. Problems associated with touch-based techniques such as the presence of latent fingerprints and hygiene issues due to many people touching the same surface motivated the community to look for non-contact-based solutions. For the last few years, contactless fingerprint systems are on the rise and in demand because of the ability to turn any device with a camera into a fingerprint reader. Yet, before we can fully utilize the benefit of noncontact-based methods, the biometric community needs to resolve a few concerns such as the resiliency of the system against presentation attacks. One of the major obstacles is the limited publicly available data sets with inadequate spoof and live data. In this publication, we have developed a Presentation attack detection (PAD) dataset of more than 7500 four-finger images and more than 14,000 manually segmented single-fingertip images, and 10,000 synthetic fingertips (deepfakes). The PAD dataset was collected from six different Presentation Attack Instruments (PAI) of three different difficulty levels according to FIDO protocols, with five different types of PAI materials, and different smartphone cameras with manual focusing. We have utilized DenseNet-121 and NasNetMobile models and our proposed dataset to develop PAD algorithms and achieved PAD accuracy of Attack presentation classification error rate (APCER) 0.14% and Bonafide presentation classification error rate (BPCER) 0.18%. We have also reported the test results of the models against unseen spoof types to replicate uncertain real-world testing scenarios.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders 基于扩散自编码器的人脸变形攻击的识别漏洞和攻击可检测性
Pub Date : 2023-02-03 DOI: 10.1109/IWBF57495.2023.10157869
N. Damer, Meiling Fang, Patrick Siebke, J. Kolf, Marco Huber, F. Boutros
Investigating new methods of creating face morphing attacks is essential to foresee novel attacks and help mitigate them. Creating morphing attacks is commonly either performed on the image-level or on the representation-level. The representation-level morphing has been performed so far based on generative adversarial networks (GAN) where the encoded images are interpolated in the latent space to produce a morphed image based on the interpolated vector. Such a process was constrained by the limited reconstruction fidelity of GAN architectures. Recent advances in the diffusion autoencoder models have overcome the GAN limitations, leading to high reconstruction fidelity. This theoretically makes them a perfect candidate to perform representation-level face morphing. This work investigates using diffusion autoencoders to create face morphing attacks by comparing them to a wide range of image-level and representation-level morphs. Our vulnerability analyses on four state-of-the-art face recognition models have shown that such models are highly vulnerable to the created attacks, the MorDIFF, especially when compared to existing representation-level morphs. Detailed detectability analyses are also performed on the MorDIFF, showing that they are as challenging to detect as other morphing attacks created on the image- or representation-level. Data and morphing script are made public1.
研究创建面部变形攻击的新方法对于预见新的攻击并帮助减轻攻击至关重要。创建变形攻击通常是在图像级或表示级执行的。到目前为止,基于生成对抗网络(GAN)的表示级变形已经完成,其中编码图像在潜在空间中插值,以产生基于插值向量的变形图像。这一过程受到GAN结构重构保真度有限的限制。扩散自编码器模型的最新进展已经克服了氮化镓的限制,导致高重建保真度。从理论上讲,这使它们成为执行表征级面部变形的完美候选者。这项工作研究了使用扩散自动编码器来创建面部变形攻击,将它们与广泛的图像级和表示级变形进行比较。我们对四个最先进的人脸识别模型的脆弱性分析表明,这些模型非常容易受到创建的攻击,MorDIFF,特别是与现有的表示级变体相比。对MorDIFF进行了详细的可检测性分析,表明它们与在图像或表示级别上创建的其他变形攻击一样具有挑战性。数据和变形脚本是公开的。
{"title":"MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders","authors":"N. Damer, Meiling Fang, Patrick Siebke, J. Kolf, Marco Huber, F. Boutros","doi":"10.1109/IWBF57495.2023.10157869","DOIUrl":"https://doi.org/10.1109/IWBF57495.2023.10157869","url":null,"abstract":"Investigating new methods of creating face morphing attacks is essential to foresee novel attacks and help mitigate them. Creating morphing attacks is commonly either performed on the image-level or on the representation-level. The representation-level morphing has been performed so far based on generative adversarial networks (GAN) where the encoded images are interpolated in the latent space to produce a morphed image based on the interpolated vector. Such a process was constrained by the limited reconstruction fidelity of GAN architectures. Recent advances in the diffusion autoencoder models have overcome the GAN limitations, leading to high reconstruction fidelity. This theoretically makes them a perfect candidate to perform representation-level face morphing. This work investigates using diffusion autoencoders to create face morphing attacks by comparing them to a wide range of image-level and representation-level morphs. Our vulnerability analyses on four state-of-the-art face recognition models have shown that such models are highly vulnerable to the created attacks, the MorDIFF, especially when compared to existing representation-level morphs. Detailed detectability analyses are also performed on the MorDIFF, showing that they are as challenging to detect as other morphing attacks created on the image- or representation-level. Data and morphing script are made public1.","PeriodicalId":273412,"journal":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2023 11th International Workshop on Biometrics and Forensics (IWBF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1