首页 > 最新文献

2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)最新文献

英文 中文
Inheritable Fisher vector feature for kinship verification 用于亲属关系验证的可遗传Fisher向量特征
Qingfeng Liu, Ajit Puthenputhussery, Chengjun Liu
An innovative inheritable Fisher vector feature (IFVF) method is presented in this paper for kinship verification. Specifically, Fisher vector is first derived for each image by aggregating the densely sampled SIFT features in the opponent color space. Second, a new inheritable transformation, which maximizes the similarity between kinship images while minimizes that between non-kinship images for each image pair simultaneously, is learned based on the Fisher vectors. As a result, the IFVF is derived by applying the inheritable transformation on the Fisher vector for each image. Finally, a novel fractional power cosine similarity measure, which shows its theoretical roots in the Bayes decision rule for minimum error, is proposed for kinship verification. Experimental results on two representative kinship data sets, namely the KinFaceW-I and the KinFaceW-II data sets, show the feasibility of the proposed method.
提出了一种基于遗传Fisher向量特征(IFVF)的亲属关系验证方法。具体而言,首先通过在对手颜色空间中聚集密集采样的SIFT特征来导出每张图像的Fisher向量。其次,基于Fisher向量学习一种新的可继承变换,使每对图像之间的亲缘关系图像之间的相似性最大化,同时使非亲缘关系图像之间的相似性最小化。因此,IFVF是通过对每个图像的Fisher向量应用可继承变换而得到的。最后,提出了一种新的分数阶幂余弦相似性度量,该度量的理论根源在于贝叶斯最小误差决策规则,用于亲属关系验证。在两个具有代表性的亲属数据集KinFaceW-I和KinFaceW-II数据集上的实验结果表明了所提出方法的可行性。
{"title":"Inheritable Fisher vector feature for kinship verification","authors":"Qingfeng Liu, Ajit Puthenputhussery, Chengjun Liu","doi":"10.1109/BTAS.2015.7358768","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358768","url":null,"abstract":"An innovative inheritable Fisher vector feature (IFVF) method is presented in this paper for kinship verification. Specifically, Fisher vector is first derived for each image by aggregating the densely sampled SIFT features in the opponent color space. Second, a new inheritable transformation, which maximizes the similarity between kinship images while minimizes that between non-kinship images for each image pair simultaneously, is learned based on the Fisher vectors. As a result, the IFVF is derived by applying the inheritable transformation on the Fisher vector for each image. Finally, a novel fractional power cosine similarity measure, which shows its theoretical roots in the Bayes decision rule for minimum error, is proposed for kinship verification. Experimental results on two representative kinship data sets, namely the KinFaceW-I and the KinFaceW-II data sets, show the feasibility of the proposed method.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Robust biometrics recognition using joint weighted dictionary learning and smoothed L0 norm
R. Khorsandi, A. Taalimi, M. Abdel-Mottaleb
In this paper, we present an automated system for robust biometric recognition based upon sparse representation and dictionary learning. In sparse representation, extracted features from the training data are used to develop a dictionary. Classification is achieved by representing the extracted features of the test data as a linear combination of entries in the dictionary. Dictionary learning for sparse representation has shown to improve the results in classification and recognition tasks since class labels can be used in obtaining the atoms of learnt dictionary. We propose a joint weighted dictionary learning which simultaneously learns from a set of training samples an over complete dictionary along with weight vectors that correspond to the atoms in the learnt dictionary. The components of the weight vector associated with an atom represent the relationship between the atom and each of the classes. The weight vectors and atoms are jointly obtained during the dictionary learning. In the proposed method, a constraint is imposed on the correlation between the obtained atoms that represent different classes to decrease the similarity between these atoms. In addition, we use smoothed L0 norm which is a fast algorithm to find the sparsest solution. Experiments conducted on the West Virginia University (WVU) and the University of Notre Dame (UND) datasets for ear recognition show that the proposed method outperforms other state-of-the-art classifiers.
在本文中,我们提出了一个基于稀疏表示和字典学习的鲁棒生物特征自动识别系统。在稀疏表示中,从训练数据中提取的特征用于开发字典。分类是通过将测试数据的提取特征表示为字典中条目的线性组合来实现的。基于稀疏表示的字典学习可以改善分类和识别任务的结果,因为类标签可以用来获得学习字典的原子。我们提出了一种联合加权字典学习方法,它同时从一组训练样本中学习一个过完整字典以及与学习字典中原子对应的权向量。与原子相关联的权重向量的分量表示原子与每个类之间的关系。在字典学习过程中,权重向量和原子是联合获得的。在该方法中,对获得的代表不同类别的原子之间的相关性施加约束,以降低这些原子之间的相似性。此外,我们使用平滑L0范数,这是一种快速找到最稀疏解的算法。在西弗吉尼亚大学(WVU)和圣母大学(UND)的耳朵识别数据集上进行的实验表明,所提出的方法优于其他最先进的分类器。
{"title":"Robust biometrics recognition using joint weighted dictionary learning and smoothed L0 norm","authors":"R. Khorsandi, A. Taalimi, M. Abdel-Mottaleb","doi":"10.1109/BTAS.2015.7358792","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358792","url":null,"abstract":"In this paper, we present an automated system for robust biometric recognition based upon sparse representation and dictionary learning. In sparse representation, extracted features from the training data are used to develop a dictionary. Classification is achieved by representing the extracted features of the test data as a linear combination of entries in the dictionary. Dictionary learning for sparse representation has shown to improve the results in classification and recognition tasks since class labels can be used in obtaining the atoms of learnt dictionary. We propose a joint weighted dictionary learning which simultaneously learns from a set of training samples an over complete dictionary along with weight vectors that correspond to the atoms in the learnt dictionary. The components of the weight vector associated with an atom represent the relationship between the atom and each of the classes. The weight vectors and atoms are jointly obtained during the dictionary learning. In the proposed method, a constraint is imposed on the correlation between the obtained atoms that represent different classes to decrease the similarity between these atoms. In addition, we use smoothed L0 norm which is a fast algorithm to find the sparsest solution. Experiments conducted on the West Virginia University (WVU) and the University of Notre Dame (UND) datasets for ear recognition show that the proposed method outperforms other state-of-the-art classifiers.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ECG biometric authentication using a dynamical model 基于动态模型的心电生物识别认证
Abhijit Sarkar, A. L. Abbott, Zachary R. Doerzaph
This paper concerns the authentication of individuals through analysis of electrocardiogram (ECG) signals. Because the human heart differs physiologically from one person to the next, ECG signals represent a rich source of information that offers strong potential for authentication or identification. We describe a novel approach to ECG-based biometrics in which a dynamical-systems model is employed, resulting in improved registration of pulses as compared to previous techniques. Parameters at the fiducial points are detected using a sum-of-Gaussians representation, resulting in an 18-component feature vector that can be used for classification. Using a publicly available dataset of ECG signals from 47 participants, a classifier was formulated using quadratic discriminant analysis (QDA). The observed mean authentication accuracies were 90% and 97% using 100 beats and 300 beats, respectively. Although tested with standard ECG signals only, we believe that the approach can be extended to other sensor types, such as fingertip-ECG devices.
本文研究的是通过对心电图信号的分析来实现个人身份认证。由于人与人之间的心脏在生理上是不同的,因此心电图信号代表了丰富的信息来源,为身份验证或识别提供了强大的潜力。我们描述了一种基于脑电图的生物识别新方法,其中采用了动态系统模型,与以前的技术相比,可以改善脉冲的配准。使用高斯和表示检测基点上的参数,从而产生可用于分类的18分量特征向量。使用来自47名参与者的公开可用的心电信号数据集,使用二次判别分析(QDA)制定分类器。使用100拍和300拍时,平均认证准确率分别为90%和97%。虽然仅对标准ECG信号进行了测试,但我们相信该方法可以扩展到其他类型的传感器,例如指尖ECG设备。
{"title":"ECG biometric authentication using a dynamical model","authors":"Abhijit Sarkar, A. L. Abbott, Zachary R. Doerzaph","doi":"10.1109/BTAS.2015.7358757","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358757","url":null,"abstract":"This paper concerns the authentication of individuals through analysis of electrocardiogram (ECG) signals. Because the human heart differs physiologically from one person to the next, ECG signals represent a rich source of information that offers strong potential for authentication or identification. We describe a novel approach to ECG-based biometrics in which a dynamical-systems model is employed, resulting in improved registration of pulses as compared to previous techniques. Parameters at the fiducial points are detected using a sum-of-Gaussians representation, resulting in an 18-component feature vector that can be used for classification. Using a publicly available dataset of ECG signals from 47 participants, a classifier was formulated using quadratic discriminant analysis (QDA). The observed mean authentication accuracies were 90% and 97% using 100 beats and 300 beats, respectively. Although tested with standard ECG signals only, we believe that the approach can be extended to other sensor types, such as fingertip-ECG devices.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126613539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Pose-robust face signature for multi-view face recognition 多视图人脸识别的姿态鲁棒性人脸签名
Pengfei Dou, Lingfeng Zhang, Yuhang Wu, S. Shah, I. Kakadiaris
Despite the great progress achieved in unconstrained face recognition, pose variations still remain a challenging and unsolved practical issue. We propose a novel framework for multi-view face recognition based on extracting and matching pose-robust face signatures from 2D images. Specifically, we propose an efficient method for monocular 3D face reconstruction, which is used to lift the 2D facial appearance to a canonical texture space and estimate the self-occlusion. On the lifted facial texture we then extract various local features, which are further enhanced by the occlusion encodings computed on the self-occlusion mask, resulting in a pose-robust face signature, a novel feature representation of the original 2D facial image. Extensive experiments on two public datasets demonstrate that our method not only simplifies the matching of multi-view 2D facial images by circumventing the requirement for pose-adaptive classifiers, but also achieves superior performance.
尽管在无约束人脸识别方面取得了很大的进展,但姿态变化仍然是一个具有挑战性和未解决的实际问题。本文提出了一种基于从二维图像中提取和匹配姿态鲁棒性人脸特征的多视图人脸识别框架。具体而言,我们提出了一种有效的单眼三维人脸重建方法,该方法将二维人脸外观提升到规范纹理空间并估计自遮挡。然后,在提升的面部纹理上提取各种局部特征,并通过在自遮挡掩模上计算的遮挡编码进一步增强这些局部特征,从而得到一种姿态鲁棒性的面部特征,这是原始二维面部图像的一种新的特征表示。在两个公开数据集上的大量实验表明,我们的方法不仅简化了多视图二维人脸图像的匹配,避免了对姿态自适应分类器的要求,而且取得了优异的性能。
{"title":"Pose-robust face signature for multi-view face recognition","authors":"Pengfei Dou, Lingfeng Zhang, Yuhang Wu, S. Shah, I. Kakadiaris","doi":"10.1109/BTAS.2015.7358788","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358788","url":null,"abstract":"Despite the great progress achieved in unconstrained face recognition, pose variations still remain a challenging and unsolved practical issue. We propose a novel framework for multi-view face recognition based on extracting and matching pose-robust face signatures from 2D images. Specifically, we propose an efficient method for monocular 3D face reconstruction, which is used to lift the 2D facial appearance to a canonical texture space and estimate the self-occlusion. On the lifted facial texture we then extract various local features, which are further enhanced by the occlusion encodings computed on the self-occlusion mask, resulting in a pose-robust face signature, a novel feature representation of the original 2D facial image. Extensive experiments on two public datasets demonstrate that our method not only simplifies the matching of multi-view 2D facial images by circumventing the requirement for pose-adaptive classifiers, but also achieves superior performance.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122721128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Spoofing key-press latencies with a generative keystroke dynamics model 欺骗按键延迟与生成键击动力学模型
John V. Monaco, M. Ali, C. Tappert
This work provides strong empirical evidence for a two-state generative model of typing behavior in which the user can be in either a passive or active state. Given key-press latencies with missing key names, the model is then used to spoof the key-press latencies of a user by exploiting the scaling behavior between inter-key distance and key-press latency. Key-press latencies with missing key names can be remotely obtained over a network by observing traffic from an interactive application, such as SSH in interactive mode. The proposed generative model uses this partial information to perform a key-press-only sample-level attack on a victim's keystroke dynamics template. Results show that some users are more susceptible to this type of attack than others. For about 10% of users, the spoofed samples obtain classifier output scores of at least 50% of those obtained by authentic samples. With at least 50 observed keystrokes, the chance of success over a zero-effort attack doubles on average.
这项工作为打字行为的两状态生成模型提供了强有力的经验证据,其中用户可以处于被动或主动状态。给定缺少键名的按键延迟,然后使用该模型利用键间距离和按键延迟之间的缩放行为来欺骗用户的按键延迟。通过观察来自交互式应用程序(如交互式模式下的SSH)的流量,可以通过网络远程获得缺少密钥名称的按键延迟。提出的生成模型使用该部分信息对受害者的击键动力学模板执行仅按键的样本级攻击。结果表明,一些用户比其他用户更容易受到这种类型的攻击。对于大约10%的用户,欺骗样本获得的分类器输出分数至少是真实样本的50%。如果观察到至少50次击键,平均而言,零努力攻击的成功几率会增加一倍。
{"title":"Spoofing key-press latencies with a generative keystroke dynamics model","authors":"John V. Monaco, M. Ali, C. Tappert","doi":"10.1109/BTAS.2015.7358795","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358795","url":null,"abstract":"This work provides strong empirical evidence for a two-state generative model of typing behavior in which the user can be in either a passive or active state. Given key-press latencies with missing key names, the model is then used to spoof the key-press latencies of a user by exploiting the scaling behavior between inter-key distance and key-press latency. Key-press latencies with missing key names can be remotely obtained over a network by observing traffic from an interactive application, such as SSH in interactive mode. The proposed generative model uses this partial information to perform a key-press-only sample-level attack on a victim's keystroke dynamics template. Results show that some users are more susceptible to this type of attack than others. For about 10% of users, the spoofed samples obtain classifier output scores of at least 50% of those obtained by authentic samples. With at least 50 observed keystrokes, the chance of success over a zero-effort attack doubles on average.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
e-BioSign tool: Towards scientific assessment of dynamic signatures under forensic conditions 电子生物签名工具:在法医条件下对动态签名进行科学评估
R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia, A. Acien, Rubén Tolosana
This paper presents a new tool specifically designed to carry out dynamic signature forensic analysis and give scientific support to forensic handwriting examiners (FHEs). Traditionally FHEs have performed forensic analysis of paper-based signatures for court cases, but with the rapid evolution of the technology, nowadays they are being asked to carry out analysis based on signatures acquired by digitizing tablets more and more often. In some cases, an option followed has been to obtain a paper impression of these signatures and carry out a traditional analysis, but there are many deficiencies in this approach regarding the low spatial resolution of some devices compared to original off-line signatures and also the fact that the dynamic information, which has been proved to be very discriminative by the biometric community, is lost and not taken into account at all. The tool we present in this paper allows the FHEs to carry out a forensic analysis taking into account both the traditional off-line information normally used in paper-based signature analysis, and also the dynamic information of the signatures. Additionally, the tool incorporates two important functionalities, the first is the provision of statistical support to the analysis by including population statistics for genuine and forged signatures for some selected features, and the second is the incorporation of an automatic dynamic signature matcher, from which a likelihood ratio (LR) can be obtained from the matching comparison between the known and questioned signatures under analysis.
本文提出了一种专门用于动态签名取证分析的新工具,为法医笔迹鉴定人提供科学支持。传统上,fhe对法庭案件的纸质签名进行法医分析,但随着技术的快速发展,现在他们越来越频繁地被要求对数字化平板电脑获得的签名进行分析。在某些情况下,一种选择是获得这些签名的纸印并进行传统的分析,但是与原始离线签名相比,某些设备的空间分辨率较低,而且生物识别界已经证明动态信息具有很强的区别性,因此这种方法存在许多不足,根本没有考虑到动态信息。我们在本文中提出的工具允许fhe进行法医分析,同时考虑到通常用于基于纸张的签名分析的传统离线信息,以及签名的动态信息。此外,该工具还包含两个重要的功能,第一个是为分析提供统计支持,包括对某些选定特征的真实和伪造签名的总体统计,第二个是包含自动动态签名匹配器,从中可以从分析中已知和可疑签名之间的匹配比较中获得似然比(LR)。
{"title":"e-BioSign tool: Towards scientific assessment of dynamic signatures under forensic conditions","authors":"R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia, A. Acien, Rubén Tolosana","doi":"10.1109/BTAS.2015.7358756","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358756","url":null,"abstract":"This paper presents a new tool specifically designed to carry out dynamic signature forensic analysis and give scientific support to forensic handwriting examiners (FHEs). Traditionally FHEs have performed forensic analysis of paper-based signatures for court cases, but with the rapid evolution of the technology, nowadays they are being asked to carry out analysis based on signatures acquired by digitizing tablets more and more often. In some cases, an option followed has been to obtain a paper impression of these signatures and carry out a traditional analysis, but there are many deficiencies in this approach regarding the low spatial resolution of some devices compared to original off-line signatures and also the fact that the dynamic information, which has been proved to be very discriminative by the biometric community, is lost and not taken into account at all. The tool we present in this paper allows the FHEs to carry out a forensic analysis taking into account both the traditional off-line information normally used in paper-based signature analysis, and also the dynamic information of the signatures. Additionally, the tool incorporates two important functionalities, the first is the provision of statistical support to the analysis by including population statistics for genuine and forged signatures for some selected features, and the second is the incorporation of an automatic dynamic signature matcher, from which a likelihood ratio (LR) can be obtained from the matching comparison between the known and questioned signatures under analysis.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133907948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Acquiring high-resolution face images in outdoor environments: A master-slave calibration algorithm 室外环境下高分辨率人脸图像的获取:主从校准算法
J. Neves, J. Moreno, Silvio Barra, Hugo Proença
Facial recognition at-a-distance in surveillance scenarios remains an open problem, particularly due to the small number of pixels representing the facial region. The use of pan-tilt-zoom (PTZ) cameras has been advocated to solve this problem, however, the existing approaches either rely on rough approximations or additional constraints to estimate the mapping between image coordinates and pan-tilt parameters. In this paper, we aim at extending PTZ-assisted facial recognition to surveillance scenarios by proposing a master-slave calibration algorithm capable of accurately estimating pan-tilt parameters without depending on additional constraints. Our approach exploits geometric cues to automatically estimate subjects height and thus determine their 3D position. Experimental results show that the presented algorithm is able to acquire high-resolution face images at a distance ranging from 5 to 40 meters with high success rate. Additionally, we certify the applicability of the aforementioned algorithm to biometric recognition through a face recognition test, comprising 20 probe subjects and 13,020 gallery subjects.
监视场景中的远距离面部识别仍然是一个悬而未决的问题,特别是由于代表面部区域的像素数量很少。使用平移-倾斜-变焦(PTZ)相机来解决这一问题,然而,现有的方法要么依赖于粗略的近似,要么依赖于附加的约束来估计图像坐标与平移参数之间的映射。在本文中,我们的目标是通过提出一种主从校准算法,将ptz辅助面部识别扩展到监视场景,该算法能够在不依赖于额外约束的情况下准确估计pan-tilt参数。我们的方法利用几何线索来自动估计受试者的高度,从而确定他们的3D位置。实验结果表明,该算法能够在5 ~ 40米范围内获取高分辨率人脸图像,成功率高。此外,我们通过包括20个探针受试者和13020个画廊受试者的人脸识别测试,证明了上述算法对生物特征识别的适用性。
{"title":"Acquiring high-resolution face images in outdoor environments: A master-slave calibration algorithm","authors":"J. Neves, J. Moreno, Silvio Barra, Hugo Proença","doi":"10.1109/BTAS.2015.7358744","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358744","url":null,"abstract":"Facial recognition at-a-distance in surveillance scenarios remains an open problem, particularly due to the small number of pixels representing the facial region. The use of pan-tilt-zoom (PTZ) cameras has been advocated to solve this problem, however, the existing approaches either rely on rough approximations or additional constraints to estimate the mapping between image coordinates and pan-tilt parameters. In this paper, we aim at extending PTZ-assisted facial recognition to surveillance scenarios by proposing a master-slave calibration algorithm capable of accurately estimating pan-tilt parameters without depending on additional constraints. Our approach exploits geometric cues to automatically estimate subjects height and thus determine their 3D position. Experimental results show that the presented algorithm is able to acquire high-resolution face images at a distance ranging from 5 to 40 meters with high success rate. Additionally, we certify the applicability of the aforementioned algorithm to biometric recognition through a face recognition test, comprising 20 probe subjects and 13,020 gallery subjects.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132636052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Post-mortem iris biometric analysis in Sus scrofa domesticus 家蝇死后虹膜生物特征分析
S. Saripalle, Adam McLaughlin, R. Krishna, A. Ross, R. Derakhshani
Although biometric utility of ante-mortem human iris tissue has been long established, post-mortem study of human iris tissue for its biometric utility has only been speculated. Given obstacles in measuring and analyzing biometric capability of post-mortem human iris tissue, an investigation into the feasibility of using post-mortem Sus scrofa domesticus iris tissue as a biometric is undertaken. The contributions of our work are two-fold: first, our method discusses a feasible alternative to human iris for study of post-mortem iris biometric analysis. Second, we report the performance of iris biometrics over a period of time after death. Previous studies have only reported qualitative changes in iris after death while for the first time we measure the biometric capacity of post-mortem iris tissue.
虽然人类死前虹膜组织的生物识别功能早已确立,但对人类死后虹膜组织的生物识别功能研究仅是推测。鉴于人类死后虹膜组织生物识别能力的测量和分析存在诸多障碍,本文研究了将猪死后虹膜组织作为生物识别的可行性。我们的工作有两个方面的贡献:首先,我们的方法讨论了一种可行的替代人类虹膜的方法,用于研究死后虹膜的生物识别分析。其次,我们报告了虹膜生物识别技术在死亡后一段时间内的表现。以往的研究只报道了死后虹膜的定性变化,而我们首次测量了死后虹膜组织的生物识别能力。
{"title":"Post-mortem iris biometric analysis in Sus scrofa domesticus","authors":"S. Saripalle, Adam McLaughlin, R. Krishna, A. Ross, R. Derakhshani","doi":"10.1109/BTAS.2015.7358789","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358789","url":null,"abstract":"Although biometric utility of ante-mortem human iris tissue has been long established, post-mortem study of human iris tissue for its biometric utility has only been speculated. Given obstacles in measuring and analyzing biometric capability of post-mortem human iris tissue, an investigation into the feasibility of using post-mortem Sus scrofa domesticus iris tissue as a biometric is undertaken. The contributions of our work are two-fold: first, our method discusses a feasible alternative to human iris for study of post-mortem iris biometric analysis. Second, we report the performance of iris biometrics over a period of time after death. Previous studies have only reported qualitative changes in iris after death while for the first time we measure the biometric capacity of post-mortem iris tissue.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On humanoid robots imitating human touch gestures on the smart phone 在智能手机上模仿人类触摸手势的人形机器人
Sujit Poudel, Abdul Serwadda, V. Phoha
We showcase an attack in which an autonomous humanoid robot is trained to execute touch gestures that match those of a target user. Different from past work which addressed a similar problem using a Lego robot, we harness the significant processing power and unique motoric capabilities of the autonomous humanoid robot to implement an attack that: (1) executes touch gestures with high precision, (2) is easily adapted to execute gestures on different touch screen devices, and (3) requires minimal human involvement. Relative to the traditional zero-effort impostor attacks, we show, based on a dataset of 26 users, that our attack significantly degrades the performance of touch-based authentication systems. In addition to the paper highlighting the threat that sophisticated adversaries pose to touch-based authentication systems, our robotic attack design provides a blueprint for much needed impostor testing mechanisms that simulate algorithmic (or sophisticated) adversaries against touch-based authentication systems.
我们展示了一种攻击,其中一个自主人形机器人被训练来执行与目标用户相匹配的触摸手势。与过去使用乐高机器人解决类似问题的工作不同,我们利用自主人形机器人的显著处理能力和独特的运动能力来实现攻击:(1)高精度地执行触摸手势,(2)易于适应在不同的触摸屏设备上执行手势,以及(3)需要最少的人类参与。相对于传统的零努力冒充者攻击,我们显示,基于26个用户的数据集,我们的攻击显着降低了基于触摸的身份验证系统的性能。除了论文强调了复杂的对手对基于触摸的身份验证系统构成的威胁之外,我们的机器人攻击设计为急需的冒充者测试机制提供了蓝图,该机制可以模拟针对基于触摸的身份验证系统的算法(或复杂)对手。
{"title":"On humanoid robots imitating human touch gestures on the smart phone","authors":"Sujit Poudel, Abdul Serwadda, V. Phoha","doi":"10.1109/BTAS.2015.7358781","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358781","url":null,"abstract":"We showcase an attack in which an autonomous humanoid robot is trained to execute touch gestures that match those of a target user. Different from past work which addressed a similar problem using a Lego robot, we harness the significant processing power and unique motoric capabilities of the autonomous humanoid robot to implement an attack that: (1) executes touch gestures with high precision, (2) is easily adapted to execute gestures on different touch screen devices, and (3) requires minimal human involvement. Relative to the traditional zero-effort impostor attacks, we show, based on a dataset of 26 users, that our attack significantly degrades the performance of touch-based authentication systems. In addition to the paper highlighting the threat that sophisticated adversaries pose to touch-based authentication systems, our robotic attack design provides a blueprint for much needed impostor testing mechanisms that simulate algorithmic (or sophisticated) adversaries against touch-based authentication systems.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125747258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Leap Password based verification system 基于Leap密码的验证系统
A. Chahar, Shivangi Yadav, Ishan Nigam, Richa Singh, Mayank Vatsa
Recent developments in three-dimensional sensing devices has led to the proposal of a number of biometric modalities for non-critical scenarios. Leap Motion device has received attention from Vision and Biometrics community due to its high precision tracking. In this research, we propose Leap Password; a novel approach for biometric authentication. The Leap Password consists of a string of successive gestures performed by the user during which physiological as well as behavioral information is captured. The Conditional Mutual Information Maximization algorithm selects the optimal feature set from the extracted information. Match-score fusion is performed to reconcile information from multiple classifiers. Experiments are performed on the Leap Password Dataset, which consists of over 1700 samples obtained from 150 subjects. An accuracy of over 81% is achieved, which shows the effectiveness of the proposed approach.
三维传感装置的最新发展导致了一些非关键场景的生物识别模式的提出。Leap Motion设备因其高精度的跟踪功能而受到视觉和生物识别界的关注。在本研究中,我们提出了Leap密码;一种新的生物识别认证方法。Leap密码由用户执行的一系列连续手势组成,在此期间捕获生理和行为信息。条件互信息最大化算法从提取的信息中选择最优特征集。进行匹配分数融合以协调来自多个分类器的信息。实验在Leap密码数据集上进行,该数据集由来自150个受试者的1700多个样本组成。结果表明,该方法的准确率达到81%以上。
{"title":"A Leap Password based verification system","authors":"A. Chahar, Shivangi Yadav, Ishan Nigam, Richa Singh, Mayank Vatsa","doi":"10.1109/BTAS.2015.7358745","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358745","url":null,"abstract":"Recent developments in three-dimensional sensing devices has led to the proposal of a number of biometric modalities for non-critical scenarios. Leap Motion device has received attention from Vision and Biometrics community due to its high precision tracking. In this research, we propose Leap Password; a novel approach for biometric authentication. The Leap Password consists of a string of successive gestures performed by the user during which physiological as well as behavioral information is captured. The Conditional Mutual Information Maximization algorithm selects the optimal feature set from the extracted information. Match-score fusion is performed to reconcile information from multiple classifiers. Experiments are performed on the Leap Password Dataset, which consists of over 1700 samples obtained from 150 subjects. An accuracy of over 81% is achieved, which shows the effectiveness of the proposed approach.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127465878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1