首页 > 最新文献

2019 International Conference on Biometrics (ICB)最新文献

英文 中文
To Detect or not to Detect: The Right Faces to Morph 检测或不检测:要变形的正确面孔
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987316
N. Damer, Alexandra Mosegui Saladie, Steffen Zienert, Yaza Wainakh, Philipp Terhörst, Florian Kirchbuchner, Arjan Kuijper
Recent works have studied the face morphing attack detection performance generalization over variations in morphing approaches, image re-digitization, and image source variations. However, these works assumed a constant approach for selecting the images to be morphed (pairing) across their training and testing data. A realistic variation in the pairing protocol in the training data can result in challenges and opportunities for a stable attack detector. This work extensively study this issue by building a novel database with three different pairing protocols and two different morphing approaches. We study the detection generalization over these variations for single image and differential attack detection, along with handcrafted and CNN-based features. Our observations included that training an attack detection solution on attacks created from dissimilar face images, in contrary to the common practice, can result in an overall more generalized detection performance. Moreover, we found that differential attack detection is very sensitive to variations in morphing and pairing protocols.
近年来研究了人脸变形攻击检测在变形方法变化、图像再数字化和图像源变化等方面的性能泛化。然而,这些工作假设了一种恒定的方法来选择要在训练和测试数据中变形(配对)的图像。训练数据中配对协议的实际变化可能会给稳定的攻击检测器带来挑战和机遇。本文采用三种不同的配对协议和两种不同的变形方法构建了一个新的数据库,对这一问题进行了广泛的研究。我们研究了这些变化的检测泛化,用于单图像和差分攻击检测,以及手工制作和基于cnn的特征。我们的观察包括,与通常的做法相反,针对不同人脸图像创建的攻击训练攻击检测解决方案可以导致总体上更一般化的检测性能。此外,我们发现差分攻击检测对变形和配对协议的变化非常敏感。
{"title":"To Detect or not to Detect: The Right Faces to Morph","authors":"N. Damer, Alexandra Mosegui Saladie, Steffen Zienert, Yaza Wainakh, Philipp Terhörst, Florian Kirchbuchner, Arjan Kuijper","doi":"10.1109/ICB45273.2019.8987316","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987316","url":null,"abstract":"Recent works have studied the face morphing attack detection performance generalization over variations in morphing approaches, image re-digitization, and image source variations. However, these works assumed a constant approach for selecting the images to be morphed (pairing) across their training and testing data. A realistic variation in the pairing protocol in the training data can result in challenges and opportunities for a stable attack detector. This work extensively study this issue by building a novel database with three different pairing protocols and two different morphing approaches. We study the detection generalization over these variations for single image and differential attack detection, along with handcrafted and CNN-based features. Our observations included that training an attack detection solution on attacks created from dissimilar face images, in contrary to the common practice, can result in an overall more generalized detection performance. Moreover, we found that differential attack detection is very sensitive to variations in morphing and pairing protocols.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Adversarial Perturbations Against Fingerprint Based Authentication Systems 针对指纹认证系统的对抗性扰动
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987399
S. Marrone, Carlo Sansone
Fingerprint-based Authentication Systems (FAS) usage is increasing over the last years thanks to the growing availability of cheap and reliable scanners. In order to bypass a FAS by using a counterfeit fingerprint, a Presentation Attack (PA) can be used. As a consequence, a liveness detector able to discern authentic from fake biometry becomes almost essential in each FAS. Deep Learning based approaches demonstrated to be very effective against fingerprint presentation attacks, becoming the current state-of-the-art in liveness detection. However, it has been shown that it is possible to arbitrarily cause state-of-the-art CNNs to misclassify an image by applying on it a suitable small peturbation, often even imperceptible to human eyes. The aim of this work is to understand if and to what extent adversarial perturbation can affect FASs, as a preliminary step to develop an adversarial presentation attack. Results show that it is possible to exploit adversarial perturbation to mislead both the FAS liveness detector and the authentication system, by giving rise to images that are even almost imperceptible to human eyes.
由于廉价可靠的扫描仪越来越多,基于指纹的身份验证系统(FAS)的使用量在过去几年中不断增加。为了通过伪造指纹绕过FAS,可以使用呈现攻击(Presentation Attack, PA)。因此,在每个FAS中,能够辨别真假生物特征的活体检测器几乎是必不可少的。基于深度学习的方法被证明对指纹呈现攻击非常有效,成为活体检测的最新技术。然而,有研究表明,通过在图像上施加合适的小扰动(通常是人眼无法察觉的),可以任意地使最先进的cnn对图像进行错误分类。这项工作的目的是了解对抗性扰动是否以及在多大程度上影响FASs,作为开发对抗性呈现攻击的初步步骤。结果表明,通过产生人眼几乎无法察觉的图像,利用对抗性扰动来误导FAS活性检测器和认证系统是可能的。
{"title":"Adversarial Perturbations Against Fingerprint Based Authentication Systems","authors":"S. Marrone, Carlo Sansone","doi":"10.1109/ICB45273.2019.8987399","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987399","url":null,"abstract":"Fingerprint-based Authentication Systems (FAS) usage is increasing over the last years thanks to the growing availability of cheap and reliable scanners. In order to bypass a FAS by using a counterfeit fingerprint, a Presentation Attack (PA) can be used. As a consequence, a liveness detector able to discern authentic from fake biometry becomes almost essential in each FAS. Deep Learning based approaches demonstrated to be very effective against fingerprint presentation attacks, becoming the current state-of-the-art in liveness detection. However, it has been shown that it is possible to arbitrarily cause state-of-the-art CNNs to misclassify an image by applying on it a suitable small peturbation, often even imperceptible to human eyes. The aim of this work is to understand if and to what extent adversarial perturbation can affect FASs, as a preliminary step to develop an adversarial presentation attack. Results show that it is possible to exploit adversarial perturbation to mislead both the FAS liveness detector and the authentication system, by giving rise to images that are even almost imperceptible to human eyes.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures 指纹表示攻击检测利用时间序列,彩色指纹捕获
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987297
Richard Plesh, Keivan Bahmani, Ganghee Jang, David Yambay, Ken Brownlee, Timothy Swyka, Peter A. Johnson, A. Ross, S. Schuckers
Fingerprint capture systems can be fooled by widely accessible methods to spoof the system using fake fingers, known as presentation attacks. As biometric recognition systems become more extensively relied upon at international borders and in consumer electronics, presentation attacks are becoming an increasingly serious issue. A robust solution is needed that can handle the increased variability and complexity of spoofing techniques. This paper demonstrates the viability of utilizing a sensor with time-series and color-sensing capabilities to improve the robustness of a traditional fingerprint sensor and introduces a comprehensive fingerprint dataset with over 36,000 image sequences and a state-of-the-art set of spoofing techniques. The specific sensor used in this research captures a traditional gray-scale static capture and a time-series color capture simultaneously. Two different methods for Presentation Attack Detection (PAD) are used to assess the benefit of a color dynamic capture. The first algorithm utilizes Static-Temporal Feature Engineering on the fingerprint capture to generate a classification decision. The second generates its classification decision using features extracted by way of the Inception V3 CNN trained on ImageNet. Classification performance is evaluated using features extracted exclusively from the static capture, exclusively from the dynamic capture, and on a fusion of the two feature sets. With both PAD approaches we find that the fusion of the dynamic and static feature-set is shown to improve performance to a level not individually achievable.
指纹采集系统可以被广泛使用的假手指欺骗系统的方法所欺骗,这种方法被称为表示攻击。随着生物识别系统在国际边界和消费电子产品中得到越来越广泛的依赖,演示攻击正成为日益严重的问题。需要一个健壮的解决方案来处理不断增加的可变性和欺骗技术的复杂性。本文展示了利用具有时间序列和颜色感知能力的传感器来提高传统指纹传感器的鲁棒性的可行性,并介绍了一个包含超过36,000个图像序列的综合指纹数据集和一套最先进的欺骗技术。本研究中使用的特定传感器可以同时捕获传统的灰度静态捕获和时间序列彩色捕获。两种不同的表示攻击检测(PAD)方法被用来评估颜色动态捕获的好处。第一种算法利用静态时序特征工程对指纹采集进行分类决策。第二种算法使用在ImageNet上训练的Inception V3 CNN提取的特征来生成分类决策。分类性能是通过单独从静态捕获、单独从动态捕获和两个特征集的融合提取特征来评估的。通过这两种PAD方法,我们发现动态和静态特征集的融合可以将性能提高到单个无法实现的水平。
{"title":"Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures","authors":"Richard Plesh, Keivan Bahmani, Ganghee Jang, David Yambay, Ken Brownlee, Timothy Swyka, Peter A. Johnson, A. Ross, S. Schuckers","doi":"10.1109/ICB45273.2019.8987297","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987297","url":null,"abstract":"Fingerprint capture systems can be fooled by widely accessible methods to spoof the system using fake fingers, known as presentation attacks. As biometric recognition systems become more extensively relied upon at international borders and in consumer electronics, presentation attacks are becoming an increasingly serious issue. A robust solution is needed that can handle the increased variability and complexity of spoofing techniques. This paper demonstrates the viability of utilizing a sensor with time-series and color-sensing capabilities to improve the robustness of a traditional fingerprint sensor and introduces a comprehensive fingerprint dataset with over 36,000 image sequences and a state-of-the-art set of spoofing techniques. The specific sensor used in this research captures a traditional gray-scale static capture and a time-series color capture simultaneously. Two different methods for Presentation Attack Detection (PAD) are used to assess the benefit of a color dynamic capture. The first algorithm utilizes Static-Temporal Feature Engineering on the fingerprint capture to generate a classification decision. The second generates its classification decision using features extracted by way of the Inception V3 CNN trained on ImageNet. Classification performance is evaluated using features extracted exclusively from the static capture, exclusively from the dynamic capture, and on a fusion of the two feature sets. With both PAD approaches we find that the fusion of the dynamic and static feature-set is shown to improve performance to a level not individually achievable.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection 移动生物识别、重放攻击和行为分析:冒名顶替者检测的实证分析
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987407
T. Neal, D. Woodard
The rise of mobile devices has contributed new biometric modalities which reflect behavioral tendencies as users interact with the device’s services. In this paper, we explore replay attacks against such systems and how a remote attack might affect authentication performance. There are few efforts that focus on replay attacks in mobile biometric systems, and none to our knowledge related to user-device interactions, such as the use of mobile apps. Instead, previous efforts have mainly considered spoofing attacks, which implicate that the attacker has learned their target’s behavior instead of obtaining a direct copy of logged behavior by theft. Here, we explore temporally-derived replay attacks that assume that application, Bluetooth, and Wi-Fi data has been captured remotely and then intelligently combined with some level of noise to avoid the replay of an exact copy of legitimate data. We study several factors that may affect replay attack detection, including the effects of varying the amount of data available during data collection, the number of samples used for training, and supervised and unsupervised learning on attack detection. In our analysis, false positive rates increased from 2.3% when using zero-effort attacks to over 40% as a result of replay attacks. However, our results also show that by contextualizing behavior in the feature representation, false positive rates decrease by over 25%.
移动设备的兴起催生了新的生物识别模式,这些模式反映了用户与设备服务交互时的行为趋势。在本文中,我们将探讨针对此类系统的重放攻击以及远程攻击如何影响身份验证性能。很少有人关注移动生物识别系统中的重播攻击,据我们所知,也没有人关注用户-设备交互,比如移动应用程序的使用。相反,以前的努力主要考虑欺骗攻击,这意味着攻击者已经了解了目标的行为,而不是通过盗窃获得记录行为的直接副本。在这里,我们将探讨暂时衍生的重放攻击,这些攻击假设应用程序、蓝牙和Wi-Fi数据已被远程捕获,然后智能地与某种程度的噪声相结合,以避免重放合法数据的精确副本。我们研究了可能影响重放攻击检测的几个因素,包括数据收集过程中可用数据量的变化,用于训练的样本数量,以及有监督和无监督学习对攻击检测的影响。在我们的分析中,误报率从使用零努力攻击时的2.3%增加到使用重放攻击时的40%以上。然而,我们的结果也表明,通过将特征表示中的行为语境化,误报率降低了25%以上。
{"title":"Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection","authors":"T. Neal, D. Woodard","doi":"10.1109/ICB45273.2019.8987407","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987407","url":null,"abstract":"The rise of mobile devices has contributed new biometric modalities which reflect behavioral tendencies as users interact with the device’s services. In this paper, we explore replay attacks against such systems and how a remote attack might affect authentication performance. There are few efforts that focus on replay attacks in mobile biometric systems, and none to our knowledge related to user-device interactions, such as the use of mobile apps. Instead, previous efforts have mainly considered spoofing attacks, which implicate that the attacker has learned their target’s behavior instead of obtaining a direct copy of logged behavior by theft. Here, we explore temporally-derived replay attacks that assume that application, Bluetooth, and Wi-Fi data has been captured remotely and then intelligently combined with some level of noise to avoid the replay of an exact copy of legitimate data. We study several factors that may affect replay attack detection, including the effects of varying the amount of data available during data collection, the number of samples used for training, and supervised and unsupervised learning on attack detection. In our analysis, false positive rates increased from 2.3% when using zero-effort attacks to over 40% as a result of replay attacks. However, our results also show that by contextualizing behavior in the feature representation, false positive rates decrease by over 25%.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125618011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adversarial Iris Super Resolution 对抗性虹膜超分辨率
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987243
Yanqing Guo, Qianyu Wang, Huaibo Huang, Xin Zheng, Zhaofeng He
Low resolution iris images often degrade iris recognition performance due to the lack of enough texture details. This paper proposes an adversarial iris super resolution method using a densely connected convolutional network and the adversarial learning, namely IrisDNet. The densely connected network is employed for maximum information flow between layers to achieve high iris texture reconstruction performance. An adversarial network is further incorporated into the densely connected network to sharpen texture details of iris. Moreover, for the identity persistence, we employ a pretrained network to compute an identity preserving loss to achieve semantic preserved patterns. Extensive experiments of super resolution and iris verification on multiple upscaling factors demonstrate that the proposed method achieves pleasing results with abundant high-frequency textures while maintaining identity information.
由于缺乏足够的纹理细节,低分辨率的虹膜图像往往会降低虹膜识别的性能。本文提出了一种基于密集连接卷积网络和对抗学习的对抗虹膜超分辨方法,即IrisDNet。利用密集连接的网络实现层与层之间最大的信息流,达到较高的虹膜纹理重建性能。在密集连接的网络中进一步加入对抗网络来锐化虹膜纹理细节。此外,对于身份持久性,我们采用预训练的网络来计算身份保留损失,以获得语义保留模式。大量的超分辨率和多尺度上的虹膜验证实验表明,该方法在保持身份信息的同时,获得了丰富的高频纹理,效果令人满意。
{"title":"Adversarial Iris Super Resolution","authors":"Yanqing Guo, Qianyu Wang, Huaibo Huang, Xin Zheng, Zhaofeng He","doi":"10.1109/ICB45273.2019.8987243","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987243","url":null,"abstract":"Low resolution iris images often degrade iris recognition performance due to the lack of enough texture details. This paper proposes an adversarial iris super resolution method using a densely connected convolutional network and the adversarial learning, namely IrisDNet. The densely connected network is employed for maximum information flow between layers to achieve high iris texture reconstruction performance. An adversarial network is further incorporated into the densely connected network to sharpen texture details of iris. Moreover, for the identity persistence, we employ a pretrained network to compute an identity preserving loss to achieve semantic preserved patterns. Extensive experiments of super resolution and iris verification on multiple upscaling factors demonstrate that the proposed method achieves pleasing results with abundant high-frequency textures while maintaining identity information.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Learning Lightweight Face Detector with Knowledge Distillation 学习轻量级人脸检测器与知识蒸馏
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987309
Haibo Jin, Shifeng Zhang, Xiangyu Zhu, Yinhang Tang, Zhen Lei, S. Li
Despite that face detection has progressed significantly in recent years, it is still a challenging task to get a fast face detector with competitive performance, especially on CPU based devices. In this paper, we propose a novel loss function based on knowledge distillation to boost the performance of lightweight face detectors. More specifically, a student detector learns additional soft label from a teacher detector by mimicking its classification map. To make the knowledge transfer more efficient, a threshold function is designed to assign threshold values adaptively for different objectness scores such that only the informative samples are used for mimicking. Experiments on FDDB and WIDER FACE show that the proposed method improves the performance of face detectors consistently. With the help of the proposed training method, we get a CPU real-time face detector that runs at 20 FPS while being state-of-the-art on performance among CPU based detectors.
尽管近年来人脸检测技术取得了很大的进步,但要想获得具有竞争力的快速人脸检测技术仍然是一项具有挑战性的任务,特别是在基于CPU的设备上。在本文中,我们提出了一种新的基于知识蒸馏的损失函数来提高轻型人脸检测器的性能。更具体地说,学生检测器通过模仿教师检测器的分类图,从其学习额外的软标签。为了提高知识传递的效率,设计了一个阈值函数,自适应地为不同的客观得分分配阈值,从而只使用信息样本进行模仿。在FDDB和WIDER FACE上进行的实验表明,该方法能较好地提高人脸检测器的性能。在此训练方法的帮助下,我们得到了一个CPU实时人脸检测器,其运行速度为20fps,在基于CPU的检测器中性能是最先进的。
{"title":"Learning Lightweight Face Detector with Knowledge Distillation","authors":"Haibo Jin, Shifeng Zhang, Xiangyu Zhu, Yinhang Tang, Zhen Lei, S. Li","doi":"10.1109/ICB45273.2019.8987309","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987309","url":null,"abstract":"Despite that face detection has progressed significantly in recent years, it is still a challenging task to get a fast face detector with competitive performance, especially on CPU based devices. In this paper, we propose a novel loss function based on knowledge distillation to boost the performance of lightweight face detectors. More specifically, a student detector learns additional soft label from a teacher detector by mimicking its classification map. To make the knowledge transfer more efficient, a threshold function is designed to assign threshold values adaptively for different objectness scores such that only the informative samples are used for mimicking. Experiments on FDDB and WIDER FACE show that the proposed method improves the performance of face detectors consistently. With the help of the proposed training method, we get a CPU real-time face detector that runs at 20 FPS while being state-of-the-art on performance among CPU based detectors.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection 基于异常的多单类分类器人脸欺骗攻击检测
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987326
Soroush Fatemifar, Muhammad Awais, S. R. Arashloo, J. Kittler
One-class spoofing detection approaches have been an effective alternative to the two-class learners in the face presentation attack detection particularly in unseen attack scenarios. We propose an ensemble based anomaly detection approach applicable to one-class classifiers. A new score normalisation method is proposed to normalise the output of individual outlier detectors before fusion. To comply with the accuracy and diversity objectives for the component classifiers, three different strategies are utilised to build a pool of anomaly experts. To boost the performance, we also make use of the client-specific information both in the design of individual experts as well as in setting a distinct threshold for each client. We carry out extensive experiments on three face anti-spoofing datasets and show that the proposed ensemble approaches are comparable superior to the techniques based on the two-class formulation or class-independent settings. *
一类欺骗检测方法在人脸表示攻击检测中,特别是在看不见的攻击场景中,已成为两类学习器的有效替代方法。提出了一种适用于单类分类器的基于集成的异常检测方法。提出了一种新的分数归一化方法,在融合前对单个离群检测器的输出进行归一化。为了满足组件分类器的准确性和多样性目标,采用了三种不同的策略来构建异常专家库。为了提高性能,我们还在单个专家的设计以及为每个客户设置不同的阈值时使用特定于客户的信息。我们在三个面抗欺骗数据集上进行了广泛的实验,并表明所提出的集成方法比基于两类公式或类独立设置的技术更优越。*
{"title":"Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection","authors":"Soroush Fatemifar, Muhammad Awais, S. R. Arashloo, J. Kittler","doi":"10.1109/ICB45273.2019.8987326","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987326","url":null,"abstract":"One-class spoofing detection approaches have been an effective alternative to the two-class learners in the face presentation attack detection particularly in unseen attack scenarios. We propose an ensemble based anomaly detection approach applicable to one-class classifiers. A new score normalisation method is proposed to normalise the output of individual outlier detectors before fusion. To comply with the accuracy and diversity objectives for the component classifiers, three different strategies are utilised to build a pool of anomaly experts. To boost the performance, we also make use of the client-specific information both in the design of individual experts as well as in setting a distinct threshold for each client. We carry out extensive experiments on three face anti-spoofing datasets and show that the proposed ensemble approaches are comparable superior to the techniques based on the two-class formulation or class-independent settings. *","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Cross Spectral Periocular Matching using ResNet Features 基于ResNet特征的交叉光谱眼周匹配
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987303
Kevin Hernandez-Diaz, F. Alonso-Fernandez, J. Bigün
Periocular recognition has gained attention in the last years thanks to its high discrimination capabilities in less constraint scenarios than other ocular modalities. In this paper we propose a method for periocular verification under different light spectra using CNN features with the particularity that the network has not been trained for this purpose. We use a ResNet-101 pretrained model for the ImageNet Large Scale Visual Recognition Challenge to extract features from the IIITD Multispectral Periocular Database. At each layer the features are compared using χ2 distance and cosine similitude to carry on verification between images, achieving an improvement in the EER and accuracy at 1% FAR of up to 63.13% and 24.79% in comparison to previous works that employ the same database. In addition to this, we train a neural network to match the best CNN feature layer vector from each spectrum. With this procedure, we achieve improvements of up to 65% (EER) and 87% (accuracy at 1% FAR) in cross-spectral verification with respect to previous studies.
在过去的几年里,由于其在较少约束的情况下比其他眼部模式具有较高的识别能力,眼周识别已经引起了人们的关注。在本文中,我们提出了一种利用CNN特征在不同光谱下进行眼周验证的方法,其特点是该网络尚未为此进行训练。在ImageNet大规模视觉识别挑战中,我们使用ResNet-101预训练模型从IIITD多光谱眼周数据库中提取特征。在每一层,使用χ2距离和余弦相似度对特征进行比较,在图像之间进行验证,与使用相同数据库的先前工作相比,在1% FAR下的EER和准确率分别提高了63.13%和24.79%。除此之外,我们训练了一个神经网络来匹配来自每个频谱的最佳CNN特征层向量。与之前的研究相比,我们在交叉光谱验证中实现了高达65% (EER)和87% (1% FAR下的精度)的改进。
{"title":"Cross Spectral Periocular Matching using ResNet Features","authors":"Kevin Hernandez-Diaz, F. Alonso-Fernandez, J. Bigün","doi":"10.1109/ICB45273.2019.8987303","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987303","url":null,"abstract":"Periocular recognition has gained attention in the last years thanks to its high discrimination capabilities in less constraint scenarios than other ocular modalities. In this paper we propose a method for periocular verification under different light spectra using CNN features with the particularity that the network has not been trained for this purpose. We use a ResNet-101 pretrained model for the ImageNet Large Scale Visual Recognition Challenge to extract features from the IIITD Multispectral Periocular Database. At each layer the features are compared using χ2 distance and cosine similitude to carry on verification between images, achieving an improvement in the EER and accuracy at 1% FAR of up to 63.13% and 24.79% in comparison to previous works that employ the same database. In addition to this, we train a neural network to match the best CNN feature layer vector from each spectrum. With this procedure, we achieve improvements of up to 65% (EER) and 87% (accuracy at 1% FAR) in cross-spectral verification with respect to previous studies.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cooperative Orientation Generative Adversarial Network for Latent Fingerprint Enhancement 潜在指纹增强的合作取向生成对抗网络
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987356
Yuhang Liu, Yao Tang, Ruilin Li, Jufu Feng
Robust fingerprint enhancement algorithm is crucial to latent fingerprint recognition. In this paper, a latent fingerprint enhancement model named cooperative orientation generative adversarial network (COOGAN) is proposed. We formulate fingerprint enhancement as an image-to-image translation problem with deep generative adversarial network (GAN) and introduce orientation constraints to it. The deep architecture provides a powerful representation for the translation between latent fingerprint space and enhanced fingerprint space. While the orientation supervision can guide the deep feature learning to focus more on the ridge flows. To further boost the performance, a quality estimation module is proposed to remove the unrecoverable regions while enhancement. Experimental results show that COOGAN achieves state-of-the-art performance on NIST SD27 latent fingerprint database.
鲁棒指纹增强算法是潜在指纹识别的关键。提出了一种基于协同定向生成对抗网络(COOGAN)的潜在指纹增强模型。我们将指纹增强描述为一个基于深度生成对抗网络(GAN)的图像到图像的转换问题,并引入方向约束。深层体系结构为潜在指纹空间和增强指纹空间之间的转换提供了强大的表示。而方向监督可以引导深度特征学习更多地关注脊流。为了进一步提高性能,提出了一个质量估计模块,在增强的同时去除不可恢复的区域。实验结果表明,COOGAN在NIST SD27潜在指纹数据库上达到了最先进的性能。
{"title":"Cooperative Orientation Generative Adversarial Network for Latent Fingerprint Enhancement","authors":"Yuhang Liu, Yao Tang, Ruilin Li, Jufu Feng","doi":"10.1109/ICB45273.2019.8987356","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987356","url":null,"abstract":"Robust fingerprint enhancement algorithm is crucial to latent fingerprint recognition. In this paper, a latent fingerprint enhancement model named cooperative orientation generative adversarial network (COOGAN) is proposed. We formulate fingerprint enhancement as an image-to-image translation problem with deep generative adversarial network (GAN) and introduce orientation constraints to it. The deep architecture provides a powerful representation for the translation between latent fingerprint space and enhanced fingerprint space. While the orientation supervision can guide the deep feature learning to focus more on the ridge flows. To further boost the performance, a quality estimation module is proposed to remove the unrecoverable regions while enhancement. Experimental results show that COOGAN achieves state-of-the-art performance on NIST SD27 latent fingerprint database.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deceiving the Protector: Fooling Face Presentation Attack Detection Algorithms 欺骗保护者:欺骗面部呈现攻击检测算法
Pub Date : 2019-06-01 DOI: 10.1109/ICB45273.2019.8987293
Akshay Agarwal, Akarsha Sehwag, Mayank Vatsa, Richa Singh
Face recognition systems are vulnerable to presentation attacks such as replay and 3D masks. In the literature, several presentation attack detection (PAD) algorithms are developed to address this problem. However, for the first time in the literature, this paper showcases that it is possible to "fool" the PAD algorithms using adversarial perturbations. The proposed perturbation approach attacks the presentation attack detection algorithms at the PAD feature level via transformation of features from one class (attack class) to another (real class). The PAD feature tampering network utilizes convolutional autoencoder to learn the perturbations. The proposed algorithm is evaluated with respect to CNN and local binary pattern (LBP) based PAD algorithms. Experiments on three databases, Replay, SMAD, and Face Morph, showcase that the proposed approach increases the equal error rate of PAD algorithms by at least two times. For instance, on the SMAD database, PAD equal error rate (EER) of 20.1% is increased to 55.7% after attacking the PAD algorithm.
人脸识别系统容易受到再现和3D面具等演示攻击的攻击。在文献中,开发了几种表示攻击检测(PAD)算法来解决这个问题。然而,在文献中,本文首次展示了使用对抗性扰动“欺骗”PAD算法的可能性。提出的扰动方法通过将特征从一类(攻击类)转换为另一类(实类)来攻击PAD特征级别的表示攻击检测算法。PAD特征篡改网络利用卷积自编码器学习扰动。对比CNN和基于局部二值模式(LBP)的PAD算法,对该算法进行了评价。在Replay、SMAD和Face Morph三个数据库上的实验表明,该方法将PAD算法的平均错误率提高了至少两倍。例如,在SMAD数据库上,攻击PAD算法后,将20.1%的PAD等错误率(EER)提高到55.7%。
{"title":"Deceiving the Protector: Fooling Face Presentation Attack Detection Algorithms","authors":"Akshay Agarwal, Akarsha Sehwag, Mayank Vatsa, Richa Singh","doi":"10.1109/ICB45273.2019.8987293","DOIUrl":"https://doi.org/10.1109/ICB45273.2019.8987293","url":null,"abstract":"Face recognition systems are vulnerable to presentation attacks such as replay and 3D masks. In the literature, several presentation attack detection (PAD) algorithms are developed to address this problem. However, for the first time in the literature, this paper showcases that it is possible to \"fool\" the PAD algorithms using adversarial perturbations. The proposed perturbation approach attacks the presentation attack detection algorithms at the PAD feature level via transformation of features from one class (attack class) to another (real class). The PAD feature tampering network utilizes convolutional autoencoder to learn the perturbations. The proposed algorithm is evaluated with respect to CNN and local binary pattern (LBP) based PAD algorithms. Experiments on three databases, Replay, SMAD, and Face Morph, showcase that the proposed approach increases the equal error rate of PAD algorithms by at least two times. For instance, on the SMAD database, PAD equal error rate (EER) of 20.1% is increased to 55.7% after attacking the PAD algorithm.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2019 International Conference on Biometrics (ICB)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1