首页 > 最新文献

2017 IEEE International Joint Conference on Biometrics (IJCB)最新文献

英文 中文
Repeatability and reproducibility of forensic likelihood ratio methods when sample size ratio varies 当样本量比变化时法医似然比方法的可重复性和再现性
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272737
Xiaochen Zhu, Larry L Tang, Elham Tabassi
Existing statistical methods for estimating the log-likelihood ratio from biometric scores include parametric estimation, kernel density estimation, and recently adopted logistic regression estimation. There has been a growing interest to study the repeatability and reproducibility of these methods on biometric datasets after the 2009 National Research Council report [15] and the 2016 President's Council of Advisors on Science and Technology report [1]. For a statistical forensic evaluation method to be repeatable, it needs to generate consistent log-likelihood ratios for various sample size ratios between the genuine (mated) and imposter (non-mated) scores from the same database. It is a well known fact, that for logistic regression methods, the estimated intercept value depends on the sample size ratio between the two groups. Therefore, when computing log-likelihood ratios using logistic regression estimation, different genuine and impostor sample size ratios could result in different log-likelihood ratio values. We performed extensive simulations and used face and fingerprint biometric datasets to investigate repeatability and reproducibility of existing log-likelihood ratio estimation methods.
从生物特征分数估计对数似然比的现有统计方法包括参数估计、核密度估计和最近采用的逻辑回归估计。在2009年国家研究委员会报告[15]和2016年总统科学技术顾问委员会报告[1]之后,人们对研究这些方法在生物特征数据集上的可重复性和再现性越来越感兴趣。为了使统计法医评估方法具有可重复性,它需要为来自同一数据库的真实(配对)和冒名(非配对)分数之间的各种样本量比率生成一致的对数似然比。众所周知,对于逻辑回归方法,估计的截距值取决于两组之间的样本量比。因此,当使用逻辑回归估计计算对数似然比时,不同的真品和冒牌货样本量比可能导致不同的对数似然比值。我们进行了广泛的模拟,并使用面部和指纹生物特征数据集来研究现有对数似然比估计方法的可重复性和再现性。
{"title":"Repeatability and reproducibility of forensic likelihood ratio methods when sample size ratio varies","authors":"Xiaochen Zhu, Larry L Tang, Elham Tabassi","doi":"10.1109/BTAS.2017.8272737","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272737","url":null,"abstract":"Existing statistical methods for estimating the log-likelihood ratio from biometric scores include parametric estimation, kernel density estimation, and recently adopted logistic regression estimation. There has been a growing interest to study the repeatability and reproducibility of these methods on biometric datasets after the 2009 National Research Council report [15] and the 2016 President's Council of Advisors on Science and Technology report [1]. For a statistical forensic evaluation method to be repeatable, it needs to generate consistent log-likelihood ratios for various sample size ratios between the genuine (mated) and imposter (non-mated) scores from the same database. It is a well known fact, that for logistic regression methods, the estimated intercept value depends on the sample size ratio between the two groups. Therefore, when computing log-likelihood ratios using logistic regression estimation, different genuine and impostor sample size ratios could result in different log-likelihood ratio values. We performed extensive simulations and used face and fingerprint biometric datasets to investigate repeatability and reproducibility of existing log-likelihood ratio estimation methods.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern 交换!基于加权局部幅度模式的数字人脸呈现攻击检测
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272754
Akshay Agarwal, Richa Singh, Mayank Vatsa, A. Noore
Advancements in smartphone applications have empowered even non-technical users to perform sophisticated operations such as morphing in faces as few tap operations. While such enablements have positive effects, as a negative side, now anyone can digitally attack face (biometric) recognition systems. For example, face swapping application of Snapchat can easily create “swapped” identities and circumvent face recognition system. This research presents a novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos. The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90% rank-1 accuracy when attack videos are used as probe. As a second contribution, this research also presents a novel Weighted Local Magnitude Pattern feature descriptor based presentation attack detection algorithm which outperforms several existing approaches.
智能手机应用程序的进步使非技术用户甚至可以像轻触操作一样执行面部变形等复杂操作。虽然这样的启用有积极的影响,但作为消极的一面,现在任何人都可以对面部(生物识别)识别系统进行数字攻击。例如,Snapchat的换脸应用可以很容易地创建“交换”身份,绕过人脸识别系统。本研究提出了一个新的数据库,称为交换-数字攻击视频面部数据库,使用Snap chat的应用程序准备,该应用程序交换/缝合两张脸并创建视频。该数据库包含多受试者的真实人脸视频和人脸交换视频。基于商业系统的基线人脸识别实验表明,当攻击视频作为探针时,该算法的rank-1准确率超过90%。作为第二个贡献,本研究还提出了一种新的基于加权局部幅度模式特征描述符的表示攻击检测算法,该算法优于现有的几种方法。
{"title":"SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern","authors":"Akshay Agarwal, Richa Singh, Mayank Vatsa, A. Noore","doi":"10.1109/BTAS.2017.8272754","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272754","url":null,"abstract":"Advancements in smartphone applications have empowered even non-technical users to perform sophisticated operations such as morphing in faces as few tap operations. While such enablements have positive effects, as a negative side, now anyone can digitally attack face (biometric) recognition systems. For example, face swapping application of Snapchat can easily create “swapped” identities and circumvent face recognition system. This research presents a novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos. The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90% rank-1 accuracy when attack videos are used as probe. As a second contribution, this research also presents a novel Weighted Local Magnitude Pattern feature descriptor based presentation attack detection algorithm which outperforms several existing approaches.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134306561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Soft biometric privacy: Retaining biometric utility of face images while perturbing gender 软生物识别隐私:在干扰性别的同时保留面部图像的生物识别效用
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272743
Vahid Mirjalili, A. Ross
While the primary purpose for collecting biometric data (such as face images, iris, fingerprints, etc.) is for person recognition, yet recent advances in machine learning has shown the possibility of extracting auxiliary information from biometric data such as age, gender, health attributes, etc. These auxiliary attributes are sometimes referred to as soft biometrics. This automatic extraction of soft biometric attributes can happen without the user's agreement, thereby raising several privacy concerns. In this work, we design a technique that modifies a face image such that its gender as assessed by a gender classifier is perturbed, while its biometric utility as assessed by a face matcher is retained. Given an arbitrary biometric matcher and an attribute classifier, the proposed method systematically perturbs the input image such that the output of the attribute classifier is confounded, while the output of the biometric matcher is not significantly impacted. Experimental analysis convey the efficacy of the scheme in imparting gender privacy to face images.
虽然收集生物特征数据(如面部图像、虹膜、指纹等)的主要目的是为了识别人,但机器学习的最新进展表明,可以从生物特征数据(如年龄、性别、健康属性等)中提取辅助信息。这些辅助属性有时被称为软生物识别技术。这种软生物特征属性的自动提取可以在没有用户同意的情况下进行,从而引起了一些隐私问题。在这项工作中,我们设计了一种修改人脸图像的技术,使性别分类器评估的性别受到干扰,同时保留了人脸匹配器评估的生物识别效用。给定任意的生物特征匹配器和属性分类器,该方法对输入图像进行系统扰动,使属性分类器的输出受到干扰,而生物特征匹配器的输出没有受到显著影响。实验分析表明,该方案对人脸图像的性别隐私保护效果良好。
{"title":"Soft biometric privacy: Retaining biometric utility of face images while perturbing gender","authors":"Vahid Mirjalili, A. Ross","doi":"10.1109/BTAS.2017.8272743","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272743","url":null,"abstract":"While the primary purpose for collecting biometric data (such as face images, iris, fingerprints, etc.) is for person recognition, yet recent advances in machine learning has shown the possibility of extracting auxiliary information from biometric data such as age, gender, health attributes, etc. These auxiliary attributes are sometimes referred to as soft biometrics. This automatic extraction of soft biometric attributes can happen without the user's agreement, thereby raising several privacy concerns. In this work, we design a technique that modifies a face image such that its gender as assessed by a gender classifier is perturbed, while its biometric utility as assessed by a face matcher is retained. Given an arbitrary biometric matcher and an attribute classifier, the proposed method systematically perturbs the input image such that the output of the attribute classifier is confounded, while the output of the biometric matcher is not significantly impacted. Experimental analysis convey the efficacy of the scheme in imparting gender privacy to face images.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133550897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Fingerprint spoof detection using minutiae-based local patches 使用基于细节的本地补丁的指纹欺骗检测
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272745
T. Chugh, Kai Cao, Anil K. Jain
The individuality of fingerprints is being leveraged for a plethora of day-to-day applications, ranging from unlocking a smartphone to international border security. While the primary purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, the security of the recognition system itself can be jeopardized by spoof attacks. This study addresses the problem of developing accurate and generalizable algorithms for detecting fingerprint spoof attacks. We propose a deep convolutional neural network based approach utilizing local patches extracted around fingerprint minutiae. Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides state of the art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios. For example, the proposed approach achieves a 69% reduction in average classification error for spoof detection under both known material and cross-material scenarios on LivDet 2015 datasets.
指纹的个性正被用于大量的日常应用,从解锁智能手机到国际边境安全。虽然指纹识别系统的主要目的是确保用户身份的可靠和准确,但识别系统本身的安全性可能会受到欺骗攻击的威胁。本研究解决了开发准确和可推广的算法来检测指纹欺骗攻击的问题。我们提出了一种基于深度卷积神经网络的方法,利用指纹细节周围提取的局部补丁。在三个公共领域LivDet数据集(2011年、2013年和2015年)上的实验结果表明,所提出的方法在传感器内、跨材料、跨传感器以及跨数据集测试场景下提供了最先进的指纹欺骗检测精度。例如,在LivDet 2015数据集上,在已知材料和跨材料场景下,所提出的方法可以将欺骗检测的平均分类误差降低69%。
{"title":"Fingerprint spoof detection using minutiae-based local patches","authors":"T. Chugh, Kai Cao, Anil K. Jain","doi":"10.1109/BTAS.2017.8272745","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272745","url":null,"abstract":"The individuality of fingerprints is being leveraged for a plethora of day-to-day applications, ranging from unlocking a smartphone to international border security. While the primary purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, the security of the recognition system itself can be jeopardized by spoof attacks. This study addresses the problem of developing accurate and generalizable algorithms for detecting fingerprint spoof attacks. We propose a deep convolutional neural network based approach utilizing local patches extracted around fingerprint minutiae. Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides state of the art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios. For example, the proposed approach achieves a 69% reduction in average classification error for spoof detection under both known material and cross-material scenarios on LivDet 2015 datasets.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"25 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Spoofing analysis of mobile device data as behavioral biometric modalities 作为行为生物识别模式的移动设备数据欺骗分析
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272683
T. Neal, D. Woodard
While mobile devices are no longer a new technology, using the data generated from the use of these devices for security purposes has just recently been explored. Current methods, such as passwords, are quickly becoming antiquated, lacking the robustness, accuracy, and convenience desired to serve as reliable security measures. Since, researchers have resorted to alternative techniques, such as measurements obtained from keyboard interactions and movement, and behavioral interactions, such as application usage. However, practical implementations require further evaluation of circumvention. Thus, this work thoroughly analyzes various threats against mobile devices which use mobile device usage data as behavioral biometrics for authentication. Experimental results indicate that an outsider with a certain level of knowledge regarding the behavior of the device's owner poses a great security threat. Possible countermeasures to prevent such attacks are also provided.
虽然移动设备不再是一项新技术,但最近才开始探索将使用这些设备产生的数据用于安全目的。当前的方法,如密码,正在迅速过时,缺乏作为可靠安全措施所需的健壮性、准确性和便利性。从那时起,研究人员就开始求助于其他技术,比如从键盘交互和移动中获得的测量,以及行为交互,比如应用程序的使用。然而,实际实现需要进一步评估规避。因此,这项工作彻底分析了针对移动设备的各种威胁,这些威胁使用移动设备使用数据作为行为生物识别技术进行身份验证。实验结果表明,对设备所有者的行为有一定了解的外部人员构成了很大的安全威胁。还提出了防止这种攻击的可能对策。
{"title":"Spoofing analysis of mobile device data as behavioral biometric modalities","authors":"T. Neal, D. Woodard","doi":"10.1109/BTAS.2017.8272683","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272683","url":null,"abstract":"While mobile devices are no longer a new technology, using the data generated from the use of these devices for security purposes has just recently been explored. Current methods, such as passwords, are quickly becoming antiquated, lacking the robustness, accuracy, and convenience desired to serve as reliable security measures. Since, researchers have resorted to alternative techniques, such as measurements obtained from keyboard interactions and movement, and behavioral interactions, such as application usage. However, practical implementations require further evaluation of circumvention. Thus, this work thoroughly analyzes various threats against mobile devices which use mobile device usage data as behavioral biometrics for authentication. Experimental results indicate that an outsider with a certain level of knowledge regarding the behavior of the device's owner poses a great security threat. Possible countermeasures to prevent such attacks are also provided.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users 生物识别干扰器:防止偷拍指纹而不给用户带来不便
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272705
Tateo Ogane, I. Echizen
As fingerprint authentication technology becomes more advanced, it is being used in a growing range of personal devices such as PCs and smartphones. On the other hand, it has been pointed out that digital cameras can be used to capture people's fingerprints remotely, leaving them at risk of illegal log-ins or identity theft. This article shows how photographs can be processed to facilitate illegal fingerprint authentication. To prevent this from happening, we also propose a method that defeats the use of surreptitious photography to replicate fingerprints from photographs while still allowing contact-based fingerprint sensors to respond normally. We have verified that an implementation of the proposed method called Biometric Jammer can be worn to effectively prevent the illegal acquisition of fingerprints by surreptitious photography without inconveniencing the user or preventing the use of legitimate fingerprint authentication devices.
随着指纹认证技术的发展,越来越多的个人设备,如个人电脑和智能手机上使用指纹认证技术。另一方面,有人指出,数码相机可以用来远程采集人们的指纹,使他们面临非法登录或身份盗用的风险。本文展示了如何处理照片以促进非法指纹身份验证。为了防止这种情况发生,我们还提出了一种方法,该方法可以挫败使用秘密摄影从照片中复制指纹,同时仍然允许基于接触的指纹传感器正常响应。我们已证实,采用生物识别干扰器(Biometric Jammer)的方法,可以有效防止透过偷拍非法获取指纹,而不会给使用者带来不便或阻止合法指纹认证装置的使用。
{"title":"Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users","authors":"Tateo Ogane, I. Echizen","doi":"10.1109/BTAS.2017.8272705","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272705","url":null,"abstract":"As fingerprint authentication technology becomes more advanced, it is being used in a growing range of personal devices such as PCs and smartphones. On the other hand, it has been pointed out that digital cameras can be used to capture people's fingerprints remotely, leaving them at risk of illegal log-ins or identity theft. This article shows how photographs can be processed to facilitate illegal fingerprint authentication. To prevent this from happening, we also propose a method that defeats the use of surreptitious photography to replicate fingerprints from photographs while still allowing contact-based fingerprint sensors to respond normally. We have verified that an implementation of the proposed method called Biometric Jammer can be worn to effectively prevent the illegal acquisition of fingerprints by surreptitious photography without inconveniencing the user or preventing the use of legitimate fingerprint authentication devices.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Risk assessment in the face-based watchlist screening in e-borders 电子边境基于人脸的观察名单筛查的风险评估
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272677
K. Lai, S. Yanushkevich, V. Shmerko
This paper concerns with facial-based watch list technology as a component of automated border control machines deployed in e-borders. The key task of the watch list technology is to mitigate effects of mis-identification and impersonation. To address this problem, we developed a novel cost-based model of traveler risk assessment and proved its efficiency via intensive experiments using large-scale facial databases. The results of this study are applicable to any biometric modality to be used in watch list technology.
本文关注基于面部的监视列表技术作为部署在电子边境的自动边境控制机器的组成部分。监视列表技术的关键任务是减轻错误识别和冒充的影响。为了解决这一问题,我们开发了一种基于成本的旅行者风险评估模型,并通过大规模面部数据库的大量实验证明了该模型的有效性。本研究结果适用于观察名单技术中使用的任何生物识别模式。
{"title":"Risk assessment in the face-based watchlist screening in e-borders","authors":"K. Lai, S. Yanushkevich, V. Shmerko","doi":"10.1109/BTAS.2017.8272677","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272677","url":null,"abstract":"This paper concerns with facial-based watch list technology as a component of automated border control machines deployed in e-borders. The key task of the watch list technology is to mitigate effects of mis-identification and impersonation. To address this problem, we developed a novel cost-based model of traveler risk assessment and proved its efficiency via intensive experiments using large-scale facial databases. The results of this study are applicable to any biometric modality to be used in watch list technology.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local classifier chains for deep face recognition 深度人脸识别的局部分类器链
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272694
Lingfeng Zhang, I. Kakadiaris
This paper focuses on improving the performance of current convolutional neural networks in face recognition without changing the network architecture. We propose a hierarchical framework that builds chains of local binary neural networks after one global neural network over all the class labels, Local Classifier Chains based Convolutional Neural Networks (LCC-CNN). Two different criteria based on a similarity matrix and confusion matrix are introduced to select binary label pairs to create local deep networks. To avoid error propagation, each testing sample travels through one global model and a local classifier chain to obtain its final prediction. The proposed framework has been evaluated with UHDB31 and CASIA-WebFace datasets. The experimental results indicate that our framework achieves better performance when compared with using only baseline methods as the global deep network. The accuracy is improved by 2.7% and 0.7% on the two datasets, respectively.
本文的重点是在不改变卷积神经网络结构的情况下,提高现有卷积神经网络在人脸识别中的性能。我们提出了一种分层框架,在一个覆盖所有类标签的全局神经网络之后构建局部二元神经网络链,即基于局部分类器链的卷积神经网络(lc - cnn)。引入基于相似矩阵和混淆矩阵的两种不同准则来选择二元标签对以创建局部深度网络。为了避免误差传播,每个测试样本通过一个全局模型和一个局部分类器链来获得最终的预测。已使用UHDB31和CASIA-WebFace数据集对提议的框架进行了评估。实验结果表明,与仅使用基线方法作为全局深度网络相比,我们的框架取得了更好的性能。在两个数据集上,准确率分别提高了2.7%和0.7%。
{"title":"Local classifier chains for deep face recognition","authors":"Lingfeng Zhang, I. Kakadiaris","doi":"10.1109/BTAS.2017.8272694","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272694","url":null,"abstract":"This paper focuses on improving the performance of current convolutional neural networks in face recognition without changing the network architecture. We propose a hierarchical framework that builds chains of local binary neural networks after one global neural network over all the class labels, Local Classifier Chains based Convolutional Neural Networks (LCC-CNN). Two different criteria based on a similarity matrix and confusion matrix are introduced to select binary label pairs to create local deep networks. To avoid error propagation, each testing sample travels through one global model and a local classifier chain to obtain its final prediction. The proposed framework has been evaluated with UHDB31 and CASIA-WebFace datasets. The experimental results indicate that our framework achieves better performance when compared with using only baseline methods as the global deep network. The accuracy is improved by 2.7% and 0.7% on the two datasets, respectively.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Feature map pooling for cross-view gait recognition based on silhouette sequence images 基于轮廓序列图像的跨视步态识别特征映射池
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272682
Qiang Chen, Yunhong Wang, Zheng Liu, Qingjie Liu, Di Huang
In this paper, we develop a novel convolutional neural network based approach to extract and aggregate useful information from gait silhouette sequence images instead of simply representing the gait process by averaging silhouette images. The network takes a pair of arbitrary length sequence images as inputs and extracts features for each silhouette independently. Then a feature map pooling strategy is adopted to aggregate sequence features. Subsequently, a network which is similar to Siamese network is designed to perform recognition. The proposed network is simple and easy to implement and can be trained in an end-to-end manner Cross-view gait recognition experiments are conducted on OU-ISIR large population dataset. The results demonstrate that our network can extract and aggregate features from silhouette sequence effectively. It also achieves significant equal error rates and comparable identification rates when compared with the state of the art.
在本文中,我们开发了一种新的基于卷积神经网络的方法,从步态轮廓序列图像中提取和聚合有用的信息,而不是简单地通过平均轮廓图像来表示步态过程。该网络以一对任意长度的序列图像作为输入,独立提取每个轮廓的特征。然后采用特征映射池策略对序列特征进行聚合。随后,设计了一种类似于暹罗网络的网络进行识别。本文提出的网络结构简单,易于实现,可以端到端训练,并在OU-ISIR大种群数据集上进行了横视步态识别实验。结果表明,该网络可以有效地提取和聚合轮廓序列中的特征。与现有技术相比,它还实现了显著相等的错误率和可比较的识别率。
{"title":"Feature map pooling for cross-view gait recognition based on silhouette sequence images","authors":"Qiang Chen, Yunhong Wang, Zheng Liu, Qingjie Liu, Di Huang","doi":"10.1109/BTAS.2017.8272682","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272682","url":null,"abstract":"In this paper, we develop a novel convolutional neural network based approach to extract and aggregate useful information from gait silhouette sequence images instead of simply representing the gait process by averaging silhouette images. The network takes a pair of arbitrary length sequence images as inputs and extracts features for each silhouette independently. Then a feature map pooling strategy is adopted to aggregate sequence features. Subsequently, a network which is similar to Siamese network is designed to perform recognition. The proposed network is simple and easy to implement and can be trained in an end-to-end manner Cross-view gait recognition experiments are conducted on OU-ISIR large population dataset. The results demonstrate that our network can extract and aggregate features from silhouette sequence effectively. It also achieves significant equal error rates and comparable identification rates when compared with the state of the art.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123338638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Fingerprint indexing and matching: An integrated approach 指纹索引和匹配:一个集成的方法
Pub Date : 2017-10-01 DOI: 10.1109/BTAS.2017.8272728
Kai Cao, Anil K. Jain
Large scale fingerprint recognition systems have been deployed worldwide not only in law enforcement but also in many civilian applications. Thus, it is of great value o identify a query fingerprint in a large background finger-print database both effectively and efficiently based on indexing strategies. The published indexing algorithms do not meet the requirements, especially at low penetrate rates, because of the difficulty in extracting reliable minutiae and other features in low quality fingerprint images. We propose a Convolutional Neural Network (ConvNet) based fingerprint indexing algorithm. An orientation field dictionary is learned to align fingerprints in a unified coordinate system and a large longitudinal fingerprint database, where each finger has multiple impressions over time, is used to train the ConvNet. Experimental results on NIST SD4 and NIST SD14 show that the proposed approach outperforms state-of-the-art fingerprint indexing techniques reported in the literature. Further indexing results on an augmented gallery set of 250K rolled prints demonstrate the scalability of the proposed algorithm. At a penetrate rate of 1%, a score-level fusion of the proposed indexing and a state-of-the-art COTS SDK provides 97.8% rank-1 identification accuracy with a 100-fold reduction in the search space.
大规模的指纹识别系统不仅在执法部门,而且在许多民用领域得到了广泛的应用。因此,基于索引策略在大型后台指纹数据库中高效地识别查询指纹具有重要的意义。由于在低质量指纹图像中难以提取可靠的细节和其他特征,现有的索引算法不能满足要求,特别是在低穿透率下。提出一种基于卷积神经网络(ConvNet)的指纹索引算法。学习方向场字典将指纹对齐到统一的坐标系统中,并使用大型纵向指纹数据库来训练卷积神经网络,其中每个手指随着时间的推移有多个印痕。在NIST SD4和NIST SD14上的实验结果表明,所提出的方法优于文献中报道的最先进的指纹索引技术。对250K卷印刷品扩充图库集的进一步索引结果证明了该算法的可扩展性。在1%的渗透率下,提议的索引和最先进的COTS SDK的分数级融合提供了97.8%的1级识别准确率,搜索空间减少了100倍。
{"title":"Fingerprint indexing and matching: An integrated approach","authors":"Kai Cao, Anil K. Jain","doi":"10.1109/BTAS.2017.8272728","DOIUrl":"https://doi.org/10.1109/BTAS.2017.8272728","url":null,"abstract":"Large scale fingerprint recognition systems have been deployed worldwide not only in law enforcement but also in many civilian applications. Thus, it is of great value o identify a query fingerprint in a large background finger-print database both effectively and efficiently based on indexing strategies. The published indexing algorithms do not meet the requirements, especially at low penetrate rates, because of the difficulty in extracting reliable minutiae and other features in low quality fingerprint images. We propose a Convolutional Neural Network (ConvNet) based fingerprint indexing algorithm. An orientation field dictionary is learned to align fingerprints in a unified coordinate system and a large longitudinal fingerprint database, where each finger has multiple impressions over time, is used to train the ConvNet. Experimental results on NIST SD4 and NIST SD14 show that the proposed approach outperforms state-of-the-art fingerprint indexing techniques reported in the literature. Further indexing results on an augmented gallery set of 250K rolled prints demonstrate the scalability of the proposed algorithm. At a penetrate rate of 1%, a score-level fusion of the proposed indexing and a state-of-the-art COTS SDK provides 97.8% rank-1 identification accuracy with a 100-fold reduction in the search space.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2017 IEEE International Joint Conference on Biometrics (IJCB)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1