首页 > 最新文献

2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems最新文献

英文 中文
Impact of combining quality measures on biometric sample matching 综合质量措施对生物特征样本匹配的影响
Krzysztof Kryszczuk, J. Richiardi, A. Drygajlo
Biometric matching involves a comparison of two biometric data samples. In practical applications, one or both of the samples may be of degraded quality, in respect to the nominal quality of similar samples acquired in controlled conditions. It has been shown in prior art that in such situations, the integration of quality information into the process of bio-metric matching can lead to significantly improved classification performance of the biometric matcher. To facilitate such an integration, quality measures originating from both compared biometric samples are usually combined into one quality score. In this paper, we analyze the merit of doing so. We revisit the problem from a pattern classification perspective, and show that using individual quality measures as separate classification features frequently leads to a superior performance of a biometric system in comparison with the system in which quality measures are mapped into one quality score. We provide experimental support of this claim using synthetic data, as well as real biometric database, on the examples of face, fingerprint and multi-modal matching.
生物特征匹配涉及两个生物特征数据样本的比较。在实际应用中,相对于在受控条件下获得的类似样品的标称质量,一个或两个样品的质量可能会降低。现有技术已经表明,在这种情况下,将质量信息集成到生物特征匹配过程中可以显著提高生物特征匹配器的分类性能。为了方便这样的整合,来自两个比较的生物特征样本的质量测量通常合并为一个质量分数。在本文中,我们分析了这样做的优点。我们从模式分类的角度重新审视了这个问题,并表明与将质量度量映射到一个质量分数的系统相比,使用单个质量度量作为单独的分类特征通常会导致生物识别系统的优越性能。利用合成数据和真实生物特征数据库,以人脸、指纹和多模态匹配为例,为这一说法提供了实验支持。
{"title":"Impact of combining quality measures on biometric sample matching","authors":"Krzysztof Kryszczuk, J. Richiardi, A. Drygajlo","doi":"10.1109/BTAS.2009.5339054","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339054","url":null,"abstract":"Biometric matching involves a comparison of two biometric data samples. In practical applications, one or both of the samples may be of degraded quality, in respect to the nominal quality of similar samples acquired in controlled conditions. It has been shown in prior art that in such situations, the integration of quality information into the process of bio-metric matching can lead to significantly improved classification performance of the biometric matcher. To facilitate such an integration, quality measures originating from both compared biometric samples are usually combined into one quality score. In this paper, we analyze the merit of doing so. We revisit the problem from a pattern classification perspective, and show that using individual quality measures as separate classification features frequently leads to a superior performance of a biometric system in comparison with the system in which quality measures are mapped into one quality score. We provide experimental support of this claim using synthetic data, as well as real biometric database, on the examples of face, fingerprint and multi-modal matching.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Improvements in Active Appearance Model based synthetic age progression for adult aging 基于动态外观模型的成人衰老综合年龄进展的改进
E. Patterson, Amrutha Sethuram, K. Ricanek, Frederick J. Bingham
Normal adult aging in the face can drastically affect performance of face recognition systems. Synthetically generating age-progressed or age-regressed images for aiding recognizers is one method of improving the robustness of face-based biometrics. These synthetic age progressions may also aid human law enforcement and other applications. There has been wide interest in these techniques in recent years, and the use of Active Appearance Models (AAMs) for synthetic age progression has been shown to be a promising approach but has not yet been demonstrated on a large human population with wide variation. This paper presents improvements in AAM-based age progression that generate significantly improved visual results, taking into account a much wider gender, age, and ethnic range than published to date for age progression techniques.
正常成年人的面部衰老会严重影响人脸识别系统的性能。合成年龄进展或年龄退化图像是提高人脸生物识别鲁棒性的一种方法。这些合成的年龄进展也可能有助于人类执法和其他应用。近年来,人们对这些技术产生了广泛的兴趣,使用活性外观模型(AAMs)进行合成年龄进展已被证明是一种很有前途的方法,但尚未在具有广泛差异的大量人群中得到证实。本文介绍了基于aam的年龄进展的改进,与迄今为止发表的年龄进展技术相比,该技术考虑了更广泛的性别、年龄和种族范围,从而显著改善了视觉效果。
{"title":"Improvements in Active Appearance Model based synthetic age progression for adult aging","authors":"E. Patterson, Amrutha Sethuram, K. Ricanek, Frederick J. Bingham","doi":"10.1109/BTAS.2009.5339060","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339060","url":null,"abstract":"Normal adult aging in the face can drastically affect performance of face recognition systems. Synthetically generating age-progressed or age-regressed images for aiding recognizers is one method of improving the robustness of face-based biometrics. These synthetic age progressions may also aid human law enforcement and other applications. There has been wide interest in these techniques in recent years, and the use of Active Appearance Models (AAMs) for synthetic age progression has been shown to be a promising approach but has not yet been demonstrated on a large human population with wide variation. This paper presents improvements in AAM-based age progression that generate significantly improved visual results, taking into account a much wider gender, age, and ethnic range than published to date for age progression techniques.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Adaptive client-impostor centric score normalization: A case study in fingerprint verification 以客户端冒名顶替者为中心的自适应分数规范化:指纹验证的案例研究
N. Poh, A. Merati, J. Kittler
Cohort-based score normalization as examplified by the T-norm (for Test normalization) has been the state-of-the-art approach to account for the variability of signal quality in testing. On the other hand, user-specific score normalization such as the Z-norm and the F-norm, designed to handle variability in performance across different reference models, has also been shown to be very effective. Exploiting the strenghth of both approaches, this paper proposes a novel score normalization called adaptive F-norm, which is client-impostor centric, i.e., utilizing both the genuine and impostor score information, as well as adaptive, i.e, adaptive to the test condition thanks to the use of a pool of cohort models. Experiments based on the BioSecure DS2 database which contains 6 fingers of 415 subjects, each acquired using a thermal and an optical device, show that the proposed adaptive F-norm is better or at least as good as the other alternatives, including those recently proposed in the literature.
以t范数(测试归一化)为例的基于队列的分数归一化是最先进的方法,用于解释测试中信号质量的可变性。另一方面,特定于用户的分数标准化,如z规范和f规范,旨在处理不同参考模型之间的性能变化,也被证明是非常有效的。利用这两种方法的优势,本文提出了一种新的分数归一化,称为自适应f规范,它以客户冒充者为中心,即利用真实和冒充者的分数信息,以及自适应,即由于使用队列模型池而适应测试条件。基于BioSecure DS2数据库的实验,该数据库包含415名受试者的6个手指,每个手指都使用热敏和光学设备获取,表明所提出的自适应f -范数更好或至少与其他替代方案一样好,包括最近在文献中提出的替代方案。
{"title":"Adaptive client-impostor centric score normalization: A case study in fingerprint verification","authors":"N. Poh, A. Merati, J. Kittler","doi":"10.1109/BTAS.2009.5339033","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339033","url":null,"abstract":"Cohort-based score normalization as examplified by the T-norm (for Test normalization) has been the state-of-the-art approach to account for the variability of signal quality in testing. On the other hand, user-specific score normalization such as the Z-norm and the F-norm, designed to handle variability in performance across different reference models, has also been shown to be very effective. Exploiting the strenghth of both approaches, this paper proposes a novel score normalization called adaptive F-norm, which is client-impostor centric, i.e., utilizing both the genuine and impostor score information, as well as adaptive, i.e, adaptive to the test condition thanks to the use of a pool of cohort models. Experiments based on the BioSecure DS2 database which contains 6 fingers of 415 subjects, each acquired using a thermal and an optical device, show that the proposed adaptive F-norm is better or at least as good as the other alternatives, including those recently proposed in the literature.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An automated method for predicting iris segmentation failures 预测虹膜分割失败的自动方法
N. Kalka, Nick Bartlow, B. Cukic
Arguably the most important task in iris recognition systems involves localization of the iris region of interest, a process known as iris segmentation. Research has found that segmentation results are a dominant factor that drives iris recognition matching performance. This work proposes techniques based on probabilistic intensity features and geometric features to arrive at scores indicating the success of both pupil and iris segmentation. The technique is fully automated and therefore requires no human supervision or manual evaluation. This work also presents a machine learning approach which utilizes the pupil and iris scores to arrive at an overall iris segmentation result prediction. We test the techniques using two iris segmentation algorithms of varying performance on two publicly available iris datasets. Our analysis shows that the approach is capable of arriving at segmentation scores suitable for predicting both the success and failure of pupil or iris segmentation. The proposed machine learning approach achieves an average classification accuracy of 98.45% across the four combinations of algorithms and datasets tested when predicting overall segmentation results. Finally, we present one potential application of the technique specific to iris match score performance and outline many other potential uses for the algorithm.
虹膜识别系统中最重要的任务是定位感兴趣的虹膜区域,这一过程被称为虹膜分割。研究发现,分割结果是影响虹膜识别匹配性能的主要因素。这项工作提出了基于概率强度特征和几何特征的技术,以达到表明瞳孔和虹膜分割成功的分数。该技术是全自动的,因此不需要人工监督或人工评估。本文还提出了一种利用瞳孔和虹膜分数来预测虹膜分割结果的机器学习方法。我们使用两种不同性能的虹膜分割算法在两个公开可用的虹膜数据集上测试了这些技术。我们的分析表明,该方法能够达到分割分数适合预测瞳孔或虹膜分割的成功和失败。在预测整体分割结果时,所提出的机器学习方法在四种算法和数据集的组合中实现了98.45%的平均分类准确率。最后,我们提出了一种特定于虹膜匹配分数性能的技术的潜在应用,并概述了该算法的许多其他潜在用途。
{"title":"An automated method for predicting iris segmentation failures","authors":"N. Kalka, Nick Bartlow, B. Cukic","doi":"10.1109/BTAS.2009.5339062","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339062","url":null,"abstract":"Arguably the most important task in iris recognition systems involves localization of the iris region of interest, a process known as iris segmentation. Research has found that segmentation results are a dominant factor that drives iris recognition matching performance. This work proposes techniques based on probabilistic intensity features and geometric features to arrive at scores indicating the success of both pupil and iris segmentation. The technique is fully automated and therefore requires no human supervision or manual evaluation. This work also presents a machine learning approach which utilizes the pupil and iris scores to arrive at an overall iris segmentation result prediction. We test the techniques using two iris segmentation algorithms of varying performance on two publicly available iris datasets. Our analysis shows that the approach is capable of arriving at segmentation scores suitable for predicting both the success and failure of pupil or iris segmentation. The proposed machine learning approach achieves an average classification accuracy of 98.45% across the four combinations of algorithms and datasets tested when predicting overall segmentation results. Finally, we present one potential application of the technique specific to iris match score performance and outline many other potential uses for the algorithm.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128639273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Cost curve analysis of biometric system performance 生物识别系统性能的成本曲线分析
Mayra Sacanamboy, B. Cukic
Biometric classification algorithms typically offer a range of performance characteristics which balance false non-match and false match rates. Nevertheless, the threshold which meets application requirements is usually selected without explicit consideration of cost implications of misclassification. This paper presents the analysis of recognition performance of multiple face and fingerprint algorithms using cost curves. Cost curves allow the introduction of misclassification costs and prior probabilities of proportions of genuine and impostor classes in the selection of biometric system thresholds. The inclusion of misclassification costs and prior probabilities is important since they can either change with time, or with the location where the biometric system is deployed.
生物识别分类算法通常提供一系列性能特征来平衡虚假不匹配率和虚假匹配率。然而,通常在选择满足应用要求的阈值时没有明确考虑错误分类所涉成本问题。本文利用代价曲线分析了多人脸和指纹识别算法的识别性能。成本曲线允许在生物识别系统阈值的选择中引入错误分类成本和正品和仿冒品类别比例的先验概率。包含错误分类成本和先验概率很重要,因为它们可能随着时间或生物识别系统部署的位置而变化。
{"title":"Cost curve analysis of biometric system performance","authors":"Mayra Sacanamboy, B. Cukic","doi":"10.1109/BTAS.2009.5339073","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339073","url":null,"abstract":"Biometric classification algorithms typically offer a range of performance characteristics which balance false non-match and false match rates. Nevertheless, the threshold which meets application requirements is usually selected without explicit consideration of cost implications of misclassification. This paper presents the analysis of recognition performance of multiple face and fingerprint algorithms using cost curves. Cost curves allow the introduction of misclassification costs and prior probabilities of proportions of genuine and impostor classes in the selection of biometric system thresholds. The inclusion of misclassification costs and prior probabilities is important since they can either change with time, or with the location where the biometric system is deployed.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133531540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Eye-verifier using ternary template for reliable eye detection in facial color images 眼睛验证器使用三元模板对面部彩色图像进行可靠的眼睛检测
Nguyen van Huan, N. T. Binh, Hakil Kim
This paper introduces an eye-verifier for reliable detection of eyes in facial color images. At first, the eye region candidates are searched by the circular filter to the binary face image. The eye candidates are then fed into an eye-verifier. The eye-verifier uses a ternary template, generated from the eye area consisting of iris, sclera and skin. Then the template matching is made by ternary Hamming distance. Experimental results evaluating the proposed method on our own face database and FERET database show promising performance in terms of detection rate. The proposed algorithm showed a robust performance to the face poses and eye directions
本文介绍了一种可靠检测人脸彩色图像中眼睛的眼睛验证器。首先,用圆形滤波器对二值人脸图像进行眼部候选区域搜索;然后将眼睛候选者送入眼睛验证器。眼睛验证器使用由虹膜、巩膜和皮肤组成的眼睛区域生成的三元模板。然后利用三元汉明距离进行模板匹配。在我们自己的人脸数据库和FERET数据库上进行的实验结果表明,该方法在检测率方面具有良好的性能。该算法对人脸姿态和眼睛方向具有较强的鲁棒性
{"title":"Eye-verifier using ternary template for reliable eye detection in facial color images","authors":"Nguyen van Huan, N. T. Binh, Hakil Kim","doi":"10.1109/BTAS.2009.5339035","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339035","url":null,"abstract":"This paper introduces an eye-verifier for reliable detection of eyes in facial color images. At first, the eye region candidates are searched by the circular filter to the binary face image. The eye candidates are then fed into an eye-verifier. The eye-verifier uses a ternary template, generated from the eye area consisting of iris, sclera and skin. Then the template matching is made by ternary Hamming distance. Experimental results evaluating the proposed method on our own face database and FERET database show promising performance in terms of detection rate. The proposed algorithm showed a robust performance to the face poses and eye directions","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Periocular biometrics in the visible spectrum: A feasibility study 可见光谱中的眼周生物识别技术:可行性研究
U. Park, A. Ross, Anil K. Jain
Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close capture distance unlike other ocular biometrics (e.g., iris, retina, and sclera). We study the feasibility of using periocular images of an individual as a biometric trait. Global and local information are extracted from the periocular region using texture and point operators resulting in a feature set that can be used for matching. The effect of fusing these feature sets is also studied. The experimental results show a 77% rank-1 recognition accuracy using 958 images captured from 30 different subjects.
眼周生物特征是指眼睛附近的面部区域。与其他眼部生物特征(如虹膜、视网膜和巩膜)不同,眼周生物特征的获取不需要高度的用户配合和近距离的捕捉。我们研究了使用个体眼周图像作为生物特征特征的可行性。使用纹理和点算子从眼周区域提取全局和局部信息,得到可用于匹配的特征集。研究了这些特征集的融合效果。实验结果表明,从30个不同的对象中捕获的958张图像的识别准确率为77%。
{"title":"Periocular biometrics in the visible spectrum: A feasibility study","authors":"U. Park, A. Ross, Anil K. Jain","doi":"10.1109/BTAS.2009.5339068","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339068","url":null,"abstract":"Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close capture distance unlike other ocular biometrics (e.g., iris, retina, and sclera). We study the feasibility of using periocular images of an individual as a biometric trait. Global and local information are extracted from the periocular region using texture and point operators resulting in a feature set that can be used for matching. The effect of fusing these feature sets is also studied. The experimental results show a 77% rank-1 recognition accuracy using 958 images captured from 30 different subjects.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116000729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 257
A novel approach to design of user re-authentication systems 一种设计用户再认证系统的新方法
Harini Jagadeesan, M. Hsiao
In the internet age, security is a major concern as identity thefts often cause detrimental effects. Masquerading is an important factor for identity theft and current authentication systems using traditional methods woefully lack mechanisms to detect and prevent it. This paper presents an application independent, continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. These behavioral attributes are extracted from the keyboard and mouse operations of the user. They are used to identify and non-intrusively authenticate the user periodically. To extract suitable user attributes, we propose a novel heuristic that uses the percentage of mouse-to-keyboard interaction ratio and interaction quotient (IQ). In the re-authentication process, every time, the current behavior of the user is compared with the stored “expected” behavior. All deviations are noted and after a certain deviation threshold is reached, the system logs the user out of the current session. The underlying heuristic prevents imposters from misusing the system. Experimental results show that the proposed heuristic can greatly improve the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively.
在互联网时代,安全是一个主要问题,因为身份盗窃经常造成有害影响。伪装是身份盗窃的一个重要因素,目前使用传统方法的认证系统严重缺乏检测和预防机制。提出了一种基于行为生物识别技术的应用独立、连续、非侵入、快速、易部署的用户再认证系统。这些行为属性是从用户的键盘和鼠标操作中提取的。它们用于周期性地识别和非侵入性地验证用户。为了提取合适的用户属性,我们提出了一种新的启发式算法,该算法使用鼠标与键盘交互比例的百分比和交互商(IQ)。在重新认证过程中,每次都会将用户的当前行为与存储的“预期”行为进行比较。所有的偏差都会被记录下来,当达到一定的偏差阈值后,系统会记录用户退出当前会话。潜在的启发式可以防止冒名顶替者滥用系统。实验结果表明,该启发式算法可将基于应用的系统和独立于应用的系统的准确率分别提高到96.4%和82.2%。
{"title":"A novel approach to design of user re-authentication systems","authors":"Harini Jagadeesan, M. Hsiao","doi":"10.1109/BTAS.2009.5339075","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339075","url":null,"abstract":"In the internet age, security is a major concern as identity thefts often cause detrimental effects. Masquerading is an important factor for identity theft and current authentication systems using traditional methods woefully lack mechanisms to detect and prevent it. This paper presents an application independent, continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. These behavioral attributes are extracted from the keyboard and mouse operations of the user. They are used to identify and non-intrusively authenticate the user periodically. To extract suitable user attributes, we propose a novel heuristic that uses the percentage of mouse-to-keyboard interaction ratio and interaction quotient (IQ). In the re-authentication process, every time, the current behavior of the user is compared with the stored “expected” behavior. All deviations are noted and after a certain deviation threshold is reached, the system logs the user out of the current session. The underlying heuristic prevents imposters from misusing the system. Experimental results show that the proposed heuristic can greatly improve the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A study on security evaluation methodology for image-based biometrics authentication systems 基于图像的生物识别认证系统安全评估方法研究
Yasuhiro Tanabe, Kazuki Yoshizoe, H. Imai
We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.
我们在这里提出了一种基于图像的生物识别认证系统对抗狼攻击的安全评估方法。狼式攻击是一种试图通过将狼喂进被攻击的系统来冒充受害者的行为。狼是可以被错误地接受为与多个模板匹配的输入数据。为了建立一个安全的系统,我们必须评估狼攻击的可能性。现有的研究依赖于人类对算法进行的理论分析,只有在有可能进行理论分析的情况下才有效。因此,我们提出了一种基于搜索的更通用的方法来帮助匹配算法的开发人员。我们使用最近开发的算法蒙特卡罗树搜索(MCTS)来搜索狼。我们成功地在匹配算法中检测到狼,考虑到这是这种方法的第一次试验,这看起来很有希望。
{"title":"A study on security evaluation methodology for image-based biometrics authentication systems","authors":"Yasuhiro Tanabe, Kazuki Yoshizoe, H. Imai","doi":"10.1109/BTAS.2009.5339016","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339016","url":null,"abstract":"We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Isometric deformation modeling using singular value decomposition for 3D expression-invariant face recognition 基于奇异值分解的三维人脸识别等距变形建模
D. Smeets, T. Fabry, Jeroen Hermans, D. Vandermeulen, P. Suetens
Currently, the recognition of faces under varying expressions is one of the main challenges in the face recognition community. In this paper a method is presented dealing with those expression variations by using an isometric deformation model. The method is built upon the geodesic distance matrix as a representation of the 3D face. We will show that the set of largest singular values is an excellent expression-invariant shape descriptor. Face comparison is performed by comparison of their shape descriptors using the mean normalized Manhattan distance as dissimilarity measure. The presented method is validated on a subset of 900 faces of the BU-3DFE face database resulting in an equal error rate of 13.37% for the verification scenario. This result is comparable with the equal error rates of other 3D expression-invariant face recognition methods using an isometric deformation model on the same database.
当前,人脸表情的识别是人脸识别领域面临的主要挑战之一。本文提出了一种用等距变形模型处理这些表达式变化的方法。该方法建立在测地线距离矩阵作为三维人脸的表示的基础上。我们将证明最大奇异值集是一个优秀的表达式不变形状描述符。面部比较是通过使用平均归一化曼哈顿距离作为不相似度量来比较它们的形状描述符来进行的。在BU-3DFE人脸数据库的900张人脸子集上进行了验证,验证场景的错误率为13.37%。该结果与在同一数据库上使用等距变形模型的其他三维表情不变人脸识别方法的错误率相当。
{"title":"Isometric deformation modeling using singular value decomposition for 3D expression-invariant face recognition","authors":"D. Smeets, T. Fabry, Jeroen Hermans, D. Vandermeulen, P. Suetens","doi":"10.1109/BTAS.2009.5339015","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339015","url":null,"abstract":"Currently, the recognition of faces under varying expressions is one of the main challenges in the face recognition community. In this paper a method is presented dealing with those expression variations by using an isometric deformation model. The method is built upon the geodesic distance matrix as a representation of the 3D face. We will show that the set of largest singular values is an excellent expression-invariant shape descriptor. Face comparison is performed by comparison of their shape descriptors using the mean normalized Manhattan distance as dissimilarity measure. The presented method is validated on a subset of 900 faces of the BU-3DFE face database resulting in an equal error rate of 13.37% for the verification scenario. This result is comparable with the equal error rates of other 3D expression-invariant face recognition methods using an isometric deformation model on the same database.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1