首页 > 最新文献

2007 Biometrics Symposium最新文献

英文 中文
Fuzzy Vault for Face Based Cryptographic Key Generation 基于人脸的密码密钥生成模糊保险库
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430549
Yongjin Wang, K. Plataniotis
This paper presents a method for changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. In this paper, the proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors. A windowing process is applied to tolerate the variations of biometrics signals. Further, we also introduce a two-factor scheme, where the quantized distance vectors are generated with user-dependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.
提出了一种利用人脸生物特征信号生成可变密码密钥的方法。之前介绍的模糊保险库方案用于将随机生成的密钥与提取的生物特征进行安全绑定。主要的技术难点是将有噪声的生物特征表示映射到完全正确的密钥。本文提出的方法是基于生物特征特征与随机向量对之间的距离向量的二维量化。采用开窗处理来容忍生物特征信号的变化。此外,我们还引入了一种双因子方案,其中量化的距离向量由用户相关的随机向量生成。通过对第二因子的积分,使得生物特征和密钥都是可变的,从而实现了零错误率。
{"title":"Fuzzy Vault for Face Based Cryptographic Key Generation","authors":"Yongjin Wang, K. Plataniotis","doi":"10.1109/BCC.2007.4430549","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430549","url":null,"abstract":"This paper presents a method for changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. In this paper, the proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors. A windowing process is applied to tolerate the variations of biometrics signals. Further, we also introduce a two-factor scheme, where the quantized distance vectors are generated with user-dependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Person Identification Using Evoked Potentials and Peak Matching 基于诱发电位和峰值匹配的人物识别
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430555
G. K. Singhal, Pavan Ramkumar
In this paper, we explore visually evoked potentials (VEPs) as a potential tool for biometric identification. Using a clinical stimulation paradigm, single channel pattern onset VEPs are recorded from raw EEG from 10 healthy male subjects aged between 20 and 24. Following this, two feature extraction techniques are employed to characterize the signals. Specifically, a novel, physiologically relevant peak matching algorithm is proposed and its performance is compared to features obtained from multi-resolution wavelet analysis. Once suitably characterized, the VEPs from different individuals are classified using a standard distance-measure based algorithm.
在本文中,我们探索视觉诱发电位(VEPs)作为生物特征识别的潜在工具。采用临床刺激模式,记录了10例20 ~ 24岁健康男性受试者的原始脑电图单通道模式vep。随后,采用两种特征提取技术对信号进行表征。具体而言,提出了一种新的生理相关峰值匹配算法,并将其性能与多分辨率小波分析获得的特征进行了比较。一旦适当的特征,来自不同个体的vep使用基于标准距离测量的算法进行分类。
{"title":"Person Identification Using Evoked Potentials and Peak Matching","authors":"G. K. Singhal, Pavan Ramkumar","doi":"10.1109/BCC.2007.4430555","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430555","url":null,"abstract":"In this paper, we explore visually evoked potentials (VEPs) as a potential tool for biometric identification. Using a clinical stimulation paradigm, single channel pattern onset VEPs are recorded from raw EEG from 10 healthy male subjects aged between 20 and 24. Following this, two feature extraction techniques are employed to characterize the signals. Specifically, a novel, physiologically relevant peak matching algorithm is proposed and its performance is compared to features obtained from multi-resolution wavelet analysis. Once suitably characterized, the VEPs from different individuals are classified using a standard distance-measure based algorithm.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Dots and Incipients: Extended Features for Partial Fingerprint Matching 点和起始点:部分指纹匹配的扩展特征
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430538
Yi Chen, A.K. Jain
There are fundamental differences in the way fingerprints are compared by forensic examiners and current automatic systems. For example, while automatic systems focus mainly on the quantitative measures of fingerprint minutiae (ridge ending and bifurcation points), forensic examiners often analyze details of intrinsic ridge characteristics and relational information. This process, known as qualitative friction ridge analysis [1], includes examination of ridge shape, pores, dots, incipient ridges, etc. This explains the challenges that current automatic systems face in processing partial fingerprints, mostly seen in latents. The forensics and automatic fingerprint identification systems (AFIS) communities have been active in standardizing the definition of extended feature set, as well as quantifying the relevance and reliability of these features for automatic matching systems. CDEFFS (committee to define an extended feature set) has proposed a working draft on possible definitions and representations of extended features [2]. However, benefits of utilizing these extended features in automatic systems are not yet known. While fingerprint matching technology is quite mature for matching tenprints [3], matching partial fingerprints, especially latents, still needs a lot of improvement. We propose an algorithm to extract two major level 3 feature types, dots and incipients, based on local phase symmetry and demonstrate their effectiveness in partial print matching. Since dots and incipients can be easily encoded by forensic examiners, we believe the results of this research will have benefits to next generation identification (NGI) systems.
法医鉴定人员比较指纹的方式与目前的自动系统有根本的不同。例如,自动系统主要关注指纹细节的定量测量(脊末和分岔点),而法医检验人员通常分析固有脊特征和相关信息的细节。这一过程被称为定性摩擦脊分析[1],包括对脊形状、孔隙、点、初始脊等的检查。这就解释了当前自动系统在处理部分指纹时所面临的挑战,这些指纹大多出现在潜在的指纹中。取证和自动指纹识别系统(AFIS)社区一直在积极标准化扩展特征集的定义,以及量化自动匹配系统中这些特征的相关性和可靠性。CDEFFS(定义扩展特征集委员会)已经就扩展特征[2]的可能定义和表示提出了一个工作草案。然而,在自动系统中利用这些扩展特性的好处尚不清楚。虽然指纹匹配技术对于10个指纹的匹配已经相当成熟,但是部分指纹尤其是潜在指纹的匹配仍然需要大量的改进。我们提出了一种基于局部相位对称提取两种主要的3级特征类型(点和初始点)的算法,并证明了它们在部分打印匹配中的有效性。由于点和起始点可以很容易地被法医鉴定人员编码,我们相信这项研究的结果将有利于下一代识别(NGI)系统。
{"title":"Dots and Incipients: Extended Features for Partial Fingerprint Matching","authors":"Yi Chen, A.K. Jain","doi":"10.1109/BCC.2007.4430538","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430538","url":null,"abstract":"There are fundamental differences in the way fingerprints are compared by forensic examiners and current automatic systems. For example, while automatic systems focus mainly on the quantitative measures of fingerprint minutiae (ridge ending and bifurcation points), forensic examiners often analyze details of intrinsic ridge characteristics and relational information. This process, known as qualitative friction ridge analysis [1], includes examination of ridge shape, pores, dots, incipient ridges, etc. This explains the challenges that current automatic systems face in processing partial fingerprints, mostly seen in latents. The forensics and automatic fingerprint identification systems (AFIS) communities have been active in standardizing the definition of extended feature set, as well as quantifying the relevance and reliability of these features for automatic matching systems. CDEFFS (committee to define an extended feature set) has proposed a working draft on possible definitions and representations of extended features [2]. However, benefits of utilizing these extended features in automatic systems are not yet known. While fingerprint matching technology is quite mature for matching tenprints [3], matching partial fingerprints, especially latents, still needs a lot of improvement. We propose an algorithm to extract two major level 3 feature types, dots and incipients, based on local phase symmetry and demonstrate their effectiveness in partial print matching. Since dots and incipients can be easily encoded by forensic examiners, we believe the results of this research will have benefits to next generation identification (NGI) systems.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Fingerprint Reconstruction Method Using Partial Differential Equation and Exemplar-Based Inpainting Methods 基于偏微分方程和基于样本的指纹重建方法
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430539
M. Rahmes, J. Allen, A. Elharti, G. Tenali
Manual latent fingerprint reconstruction to restore missing ridges is a tedious, time consuming, and expensive process. Latent fingerprint ridges are typically partially smudged, partially missing, aged, etc. This type of fingerprint cannot be used in the court of law directly to garner a conviction unless it can be matched to a known fingerprint. However, latent prints minimize the search for potential suspects and finding missing people. We propose an automated reconstruction method which minimizes manual restoration. Our nonlinear partial differential equation (PDE) and exemplar inpainting processes can aid the fingerprint expert. Larger missing regions are repaired using our coherent-based exemplar inpainting algorithm. PDE inpainting is used to fill small fissures in ridge structure. Ridge-lines are sharpened with anisotropic diffusion filters. These technologies improve latent fingerprint computer matching by allowing more minutiae. Accuracy assessment for inpainting missing ridges is described.
手动潜在指纹重建以恢复缺失的脊是一个繁琐、耗时和昂贵的过程。潜在的指纹脊通常是部分污迹,部分缺失,老化等。这种类型的指纹不能直接用于法庭定罪,除非它能与已知的指纹相匹配。然而,潜在的指纹减少了寻找潜在嫌疑人和寻找失踪人口的工作。我们提出了一种自动化重建方法,最大限度地减少人工恢复。我们的非线性偏微分方程(PDE)和典型的喷漆过程可以帮助指纹专家。更大的缺失区域使用我们的基于相干的样本绘制算法进行修复。PDE涂漆用于填充脊状结构的小裂缝。脊线用各向异性扩散滤波器锐化。这些技术通过允许更多的细节来改进潜在指纹计算机匹配。描述了补漆缺失脊线的精度评估。
{"title":"Fingerprint Reconstruction Method Using Partial Differential Equation and Exemplar-Based Inpainting Methods","authors":"M. Rahmes, J. Allen, A. Elharti, G. Tenali","doi":"10.1109/BCC.2007.4430539","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430539","url":null,"abstract":"Manual latent fingerprint reconstruction to restore missing ridges is a tedious, time consuming, and expensive process. Latent fingerprint ridges are typically partially smudged, partially missing, aged, etc. This type of fingerprint cannot be used in the court of law directly to garner a conviction unless it can be matched to a known fingerprint. However, latent prints minimize the search for potential suspects and finding missing people. We propose an automated reconstruction method which minimizes manual restoration. Our nonlinear partial differential equation (PDE) and exemplar inpainting processes can aid the fingerprint expert. Larger missing regions are repaired using our coherent-based exemplar inpainting algorithm. PDE inpainting is used to fill small fissures in ridge structure. Ridge-lines are sharpened with anisotropic diffusion filters. These technologies improve latent fingerprint computer matching by allowing more minutiae. Accuracy assessment for inpainting missing ridges is described.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cracking Fuzzy Vaults and Biometric Encryption 破解模糊保险库和生物识别加密
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430534
W. Scheirer, T. Boult
This paper is a security analysis of leading privacy enhanced technologies (PETs) for biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of published attacks, combined with various "proven" security properties has been taken by some as a sign that these technologies are ready for deployment. While some of the existing BFV and BE techniques do have "proven" security properties, those proofs make assumptions that may not, in general, be valid for biometric systems. We briefly review some of the other known attacks against BFV and BE techniques. We introduce three disturbing classes of attacks against PET techniques including attack via record multiplicity, surreptitious key-inversion attack, and novel blended substitution attacks. The paper ends with a discussion of the requirements for an architecture to address the privacy and security requirements.
本文对生物特征识别领域的主要隐私增强技术(pet)进行了安全性分析,包括生物特征模糊保险库(BFV)和生物特征加密技术(BE)。缺乏公开的攻击,加上各种“经过验证的”安全属性,已经被一些人视为这些技术已经准备好部署的迹象。虽然一些现有的BFV和BE技术确实具有“被证明”的安全特性,但这些证明所做的假设通常对生物识别系统无效。我们简要回顾了一些其他已知的针对BFV和BE技术的攻击。我们介绍了针对PET技术的三种令人不安的攻击类型,包括通过记录多重性攻击,秘密密钥反转攻击和新型混合替换攻击。本文最后讨论了解决隐私和安全需求的体系结构需求。
{"title":"Cracking Fuzzy Vaults and Biometric Encryption","authors":"W. Scheirer, T. Boult","doi":"10.1109/BCC.2007.4430534","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430534","url":null,"abstract":"This paper is a security analysis of leading privacy enhanced technologies (PETs) for biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of published attacks, combined with various \"proven\" security properties has been taken by some as a sign that these technologies are ready for deployment. While some of the existing BFV and BE techniques do have \"proven\" security properties, those proofs make assumptions that may not, in general, be valid for biometric systems. We briefly review some of the other known attacks against BFV and BE techniques. We introduce three disturbing classes of attacks against PET techniques including attack via record multiplicity, surreptitious key-inversion attack, and novel blended substitution attacks. The paper ends with a discussion of the requirements for an architecture to address the privacy and security requirements.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 342
Webbiometrics: User Verification Via Web Interaction 网络生物计量学:通过网络交互进行用户验证
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430552
Hugo Gamboa, Ana L. N. Fred, Anil K. Jain
We introduce a biometric trait based on the user behavior extracted from his interaction with a Web page. We propose the integration of this soft biometric trait in a conventional login Internet page to enhance the security of the system. We call this security layer WebBiometrics. This layer monitors the user mouse movements while he clicks his PIN code numbers. The proposed biometric method provides a non-intrusive soft behavioral biometric add-on to enhance on-line security. We describe the functionality of the system, the set of algorithms developed for the verification framework and preliminary experimental results. We also present quantitative measures of security enhancement offered by the introduction of this soft biometric compared to a PIN only based Web access.
我们引入了一种基于从用户与网页交互中提取的用户行为的生物特征。我们建议将这种软生物特征集成到传统的登录网页中,以提高系统的安全性。我们称这个安全层为网络生物识别技术。当用户点击PIN码时,这一层监控用户的鼠标移动。提出的生物识别方法提供了一种非侵入性的软行为生物识别附加组件,以提高在线安全性。我们描述了系统的功能,为验证框架开发的一套算法和初步实验结果。我们还介绍了与仅基于PIN的Web访问相比,引入这种软生物识别技术所提供的安全性增强的定量措施。
{"title":"Webbiometrics: User Verification Via Web Interaction","authors":"Hugo Gamboa, Ana L. N. Fred, Anil K. Jain","doi":"10.1109/BCC.2007.4430552","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430552","url":null,"abstract":"We introduce a biometric trait based on the user behavior extracted from his interaction with a Web page. We propose the integration of this soft biometric trait in a conventional login Internet page to enhance the security of the system. We call this security layer WebBiometrics. This layer monitors the user mouse movements while he clicks his PIN code numbers. The proposed biometric method provides a non-intrusive soft behavioral biometric add-on to enhance on-line security. We describe the functionality of the system, the set of algorithms developed for the verification framework and preliminary experimental results. We also present quantitative measures of security enhancement offered by the introduction of this soft biometric compared to a PIN only based Web access.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Multispectral Whole-Hand Biometric Authentication System 多光谱全手生物识别认证系统
Pub Date : 2007-09-01 DOI: 10.1109/bcc.2007.4430532
Robert K. Rowe, U. Uludag, Meltem Demirkus, Sujan T. V. Parthasaradhi, Anil K. Jain
We describe the design and development of a prototype whole-hand imaging system. The sensor is based on multispectral technology that is able to provide hand shape, fingerprints and palmprint modalities of a user's hand by a single user interaction with the sensor. A clear advantage of our system over other unimodal sensors for these modalities include: (i) faster acquisition time, (ii) better quality images, and (iii) ability to provide spoof detection. Initial results on a medium-size database show good recognition performance based on individual modalities as well as after fusing multiple fingers and fusing finger and palm. The prototype is being refined in order to improve performance even further.
我们描述了一个原型全手成像系统的设计和开发。该传感器基于多光谱技术,通过单个用户与传感器的交互,能够提供用户手的形状、指纹和掌纹模式。对于这些模式,我们的系统与其他单峰传感器相比的明显优势包括:(i)更快的采集时间,(ii)更好的图像质量,以及(iii)提供欺骗检测的能力。在中等规模数据库上的初步结果显示,基于单个模态、多指融合和手指与手掌融合后的识别性能良好。为了进一步提高性能,原型机正在进行改进。
{"title":"A Multispectral Whole-Hand Biometric Authentication System","authors":"Robert K. Rowe, U. Uludag, Meltem Demirkus, Sujan T. V. Parthasaradhi, Anil K. Jain","doi":"10.1109/bcc.2007.4430532","DOIUrl":"https://doi.org/10.1109/bcc.2007.4430532","url":null,"abstract":"We describe the design and development of a prototype whole-hand imaging system. The sensor is based on multispectral technology that is able to provide hand shape, fingerprints and palmprint modalities of a user's hand by a single user interaction with the sensor. A clear advantage of our system over other unimodal sensors for these modalities include: (i) faster acquisition time, (ii) better quality images, and (iii) ability to provide spoof detection. Initial results on a medium-size database show good recognition performance based on individual modalities as well as after fusing multiple fingers and fusing finger and palm. The prototype is being refined in order to improve performance even further.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Contactless Hand Recognition Based on Distribution Estimation 基于分布估计的非接触式手部识别
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430547
J. Doublet, O. Lepetit, M. Revenu
More and more research have been developed very recently for automatic hand recognition. This paper proposes a new method for contactless hand authentication in complex images with low cost devices. Our system uses skin color and hand shape information for hand detection process. Next, the palm is extracted and characterized by a bank of Gabor filters. Finally, the palm features are compared with a distribution estimation given an optimal discrimination. The experimental results present an error rate lower than 1.7% with a population of 49 people.
近年来,对自动识别技术的研究越来越多。本文提出了一种基于低成本设备的复杂图像非接触式手部认证新方法。我们的系统使用皮肤颜色和手部形状信息进行手部检测。接下来,棕榈提取和特征的银行Gabor过滤器。最后,将手掌特征与给定最优判别的分布估计进行比较。实验结果表明,在49人的人群中,错误率低于1.7%。
{"title":"Contactless Hand Recognition Based on Distribution Estimation","authors":"J. Doublet, O. Lepetit, M. Revenu","doi":"10.1109/BCC.2007.4430547","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430547","url":null,"abstract":"More and more research have been developed very recently for automatic hand recognition. This paper proposes a new method for contactless hand authentication in complex images with low cost devices. Our system uses skin color and hand shape information for hand detection process. Next, the palm is extracted and characterized by a bank of Gabor filters. Finally, the palm features are compared with a distribution estimation given an optimal discrimination. The experimental results present an error rate lower than 1.7% with a population of 49 people.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Three-View Surveillance Video Based Face Modeling for Recogniton 基于三视图监控视频的人脸识别建模
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430529
Scott Von Duhn, M. Ko, L. Yin, Terry Hung, Xiaozhou Wei
3D face recognition has been researched intensively in recent decades. Most 3D data (so called range facial data) are obtained from 3D range imaging systems. Such data representations have been proven effective for face recognition in 3D space. However, obtaining such data requires subject cooperation in a constrained environment, which is not practical for many real applications of video surveillance. It is therefore in high demand to use regular video cameras to generate 3D face models for further classification. The goal of our research is to develop a method of tracking feature points on a face in multiple views in order to build 3D models of individual faces. We proposed a three-view based video tracking and model creation algorithm, which is based on the active appearance model and a generic facial model. We will describe how to build useful individual models over time, and validate the created dynamic model sequences. Our experiments demonstrate the feasibility of the proposed work through the application for face recognition.
近几十年来,三维人脸识别技术得到了广泛的研究。大多数三维数据(即所谓的距离面部数据)是从三维距离成像系统获得的。这种数据表示已被证明对三维空间的人脸识别是有效的。然而,获取此类数据需要在受限的环境下进行主体合作,这对于视频监控的许多实际应用来说是不现实的。因此,使用普通摄像机生成3D人脸模型以进行进一步分类的需求很大。我们的研究目标是开发一种在多个视图中跟踪人脸特征点的方法,以建立单个人脸的3D模型。提出了一种基于活动外观模型和通用面部模型的三视图视频跟踪和模型创建算法。我们将描述如何随着时间的推移构建有用的单个模型,并验证创建的动态模型序列。我们的实验通过应用于人脸识别证明了所提出工作的可行性。
{"title":"Three-View Surveillance Video Based Face Modeling for Recogniton","authors":"Scott Von Duhn, M. Ko, L. Yin, Terry Hung, Xiaozhou Wei","doi":"10.1109/BCC.2007.4430529","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430529","url":null,"abstract":"3D face recognition has been researched intensively in recent decades. Most 3D data (so called range facial data) are obtained from 3D range imaging systems. Such data representations have been proven effective for face recognition in 3D space. However, obtaining such data requires subject cooperation in a constrained environment, which is not practical for many real applications of video surveillance. It is therefore in high demand to use regular video cameras to generate 3D face models for further classification. The goal of our research is to develop a method of tracking feature points on a face in multiple views in order to build 3D models of individual faces. We proposed a three-view based video tracking and model creation algorithm, which is based on the active appearance model and a generic facial model. We will describe how to build useful individual models over time, and validate the created dynamic model sequences. Our experiments demonstrate the feasibility of the proposed work through the application for face recognition.","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Signature Legibility and Signature Type in Off-Line Signature Verification 签名易读性和签名类型对离线签名验证的影响
Pub Date : 2007-09-01 DOI: 10.1109/BCC.2007.4430548
F. Alonso-Fernandez, M. Fairhurst, Julian Fierrez, J. Ortega-Garcia
The performance of two popular approaches for off-line signature verification in terms of signature legibility and signature type is studied. We investigate experimentally if the knowledge of letters, syllables or name instances can help in the process of imitating a signature. Experimental results are given on a sub-corpus of the MCYT signature database for random and skilled forgeries. We use for our experiments two machine experts, one based on global image analysis and statistical distance measures, and the second based on local image analysis and Hidden Markov Models. Verification results are reported in terms of Equal Error Rate (EER), False Acceptance Rate (FAR) and False Rejection Rate (FRR).
研究了两种常用的离线签名验证方法在签名易读性和签名类型方面的性能。我们通过实验研究字母、音节或名字实例的知识是否有助于模仿签名的过程。在随机伪造和熟练伪造的MCYT特征库子语料库上给出了实验结果。我们在实验中使用了两个机器专家,一个基于全局图像分析和统计距离度量,另一个基于局部图像分析和隐马尔可夫模型。验证结果以等错误率(EER)、误接受率(FAR)和误拒率(FRR)的形式报告。
{"title":"Impact of Signature Legibility and Signature Type in Off-Line Signature Verification","authors":"F. Alonso-Fernandez, M. Fairhurst, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/BCC.2007.4430548","DOIUrl":"https://doi.org/10.1109/BCC.2007.4430548","url":null,"abstract":"The performance of two popular approaches for off-line signature verification in terms of signature legibility and signature type is studied. We investigate experimentally if the knowledge of letters, syllables or name instances can help in the process of imitating a signature. Experimental results are given on a sub-corpus of the MCYT signature database for random and skilled forgeries. We use for our experiments two machine experts, one based on global image analysis and statistical distance measures, and the second based on local image analysis and Hidden Markov Models. Verification results are reported in terms of Equal Error Rate (EER), False Acceptance Rate (FAR) and False Rejection Rate (FRR).","PeriodicalId":389417,"journal":{"name":"2007 Biometrics Symposium","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
2007 Biometrics Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1