首页 > 最新文献

2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)最新文献

英文 中文
Biometric template update under facial aging 面部老化下的生物识别模板更新
Z. Akhtar, Amr Ahmed, Ç. Erdem, G. Foresti
Being biological tissues in nature, all biometric traits undergo aging. Aging has profound effects on facial biometrics as it causes change in shape and texture. However aging remain an under-studied problem in comparison to facial variations due to pose, illumination and expression changes. A commonly adopted solution in the state-of-the-art is the virtual template synthesis for aging and de-aging transformations involving complex 3D modelling techniques. These methods are also prone to estimation errors in the synthesis. Another viable solution is to continuously adapt the template to the temporal variation (aging) of the query data. Though efficacy of template update procedures has been proven for expression, lightning and pose variations, the use of template update for facial aging has not received much attention so far. This paper investigates the use of template update procedures for temporal variance due to the facial aging process. Experimental evaluations on FGNET and MORPH aging database using commercial VeriLook face recognition engine demonstrate that continuous template updating is an effective and simple way to adapt to variations due to the aging process.
作为自然界的生物组织,所有的生物特征都会经历衰老过程。衰老对面部生物识别有深远的影响,因为它会导致形状和质地的变化。然而,与姿势、光照和表情变化引起的面部变化相比,衰老仍然是一个研究不足的问题。最常用的解决方案是虚拟模板合成,用于老化和去老化转换,涉及复杂的3D建模技术。这些方法在综合中也容易出现估计误差。另一个可行的解决方案是不断调整模板以适应查询数据的时间变化(老化)。虽然模板更新程序对表情、闪电和姿势变化的有效性已被证明,但模板更新在面部衰老方面的应用迄今尚未受到太多关注。本文研究了使用模板更新程序来处理面部老化过程引起的时间方差。使用商用VeriLook人脸识别引擎对FGNET和MORPH老化数据库进行实验评估,结果表明,连续模板更新是一种有效而简单的方法,可以适应老化过程带来的变化。
{"title":"Biometric template update under facial aging","authors":"Z. Akhtar, Amr Ahmed, Ç. Erdem, G. Foresti","doi":"10.1109/CIBIM.2014.7015437","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015437","url":null,"abstract":"Being biological tissues in nature, all biometric traits undergo aging. Aging has profound effects on facial biometrics as it causes change in shape and texture. However aging remain an under-studied problem in comparison to facial variations due to pose, illumination and expression changes. A commonly adopted solution in the state-of-the-art is the virtual template synthesis for aging and de-aging transformations involving complex 3D modelling techniques. These methods are also prone to estimation errors in the synthesis. Another viable solution is to continuously adapt the template to the temporal variation (aging) of the query data. Though efficacy of template update procedures has been proven for expression, lightning and pose variations, the use of template update for facial aging has not received much attention so far. This paper investigates the use of template update procedures for temporal variance due to the facial aging process. Experimental evaluations on FGNET and MORPH aging database using commercial VeriLook face recognition engine demonstrate that continuous template updating is an effective and simple way to adapt to variations due to the aging process.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133554907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study 对对称匹配器的攻击敏感防篡改生物特征识别:指纹案例研究
N. Poh, Rita Wong, G. Marcialis
In order to render a biometric system robust against malicious tampering, it is important to understand the different types of attack and their impact as observed by the liveness and matching scores. In this study, we consider zero-effort impostor attack (referred to as the Z-attack), nonzero-effort impostor attack such as presentation attack or spoofing (S-attack), and other categories of attack involving tampering at the template level (U- and T-attacks). In order to elucidate the impact of all possible attacks, we (1) introduce the concepts of source of origin and symmetric biometric matchers, and (2) subsequently group the attacks into four categories. These views not only improve the understanding of the nature of different attacks but also turn out to ease the design of the classification problem. Following this analysis, we design a novel classification scheme that can take full advantage of the attack-specific data characteristics. Two realisations of the scheme, namely, a mixture of linear classifiers, and a Gaussian Copula-based Bayesian classifier, turn out to outperform a strong baseline classifier based on SVM, as supported by fingerprint spoofing experiments.
为了使生物识别系统对恶意篡改具有鲁棒性,了解不同类型的攻击及其通过活跃度和匹配分数观察到的影响非常重要。在本研究中,我们考虑了零努力冒名顶替攻击(称为z攻击),非零努力冒名顶替攻击,如表示攻击或欺骗(s攻击),以及其他涉及模板级别篡改的攻击类别(U和t攻击)。为了阐明所有可能的攻击的影响,我们(1)引入了起源源和对称生物特征匹配器的概念,(2)随后将攻击分为四类。这些视图不仅提高了对不同攻击性质的理解,而且简化了分类问题的设计。根据这一分析,我们设计了一种新的分类方案,可以充分利用攻击特定的数据特征。该方案的两种实现,即混合线性分类器和基于高斯copuls的贝叶斯分类器,结果优于基于SVM的强基线分类器,并得到指纹欺骗实验的支持。
{"title":"Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study","authors":"N. Poh, Rita Wong, G. Marcialis","doi":"10.1109/CIBIM.2014.7015460","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015460","url":null,"abstract":"In order to render a biometric system robust against malicious tampering, it is important to understand the different types of attack and their impact as observed by the liveness and matching scores. In this study, we consider zero-effort impostor attack (referred to as the Z-attack), nonzero-effort impostor attack such as presentation attack or spoofing (S-attack), and other categories of attack involving tampering at the template level (U- and T-attacks). In order to elucidate the impact of all possible attacks, we (1) introduce the concepts of source of origin and symmetric biometric matchers, and (2) subsequently group the attacks into four categories. These views not only improve the understanding of the nature of different attacks but also turn out to ease the design of the classification problem. Following this analysis, we design a novel classification scheme that can take full advantage of the attack-specific data characteristics. Two realisations of the scheme, namely, a mixture of linear classifiers, and a Gaussian Copula-based Bayesian classifier, turn out to outperform a strong baseline classifier based on SVM, as supported by fingerprint spoofing experiments.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Target-based evaluation of face recognition technology for video surveillance applications 基于目标的人脸识别技术在视频监控中的应用
D. Gorodnichy, Eric Granger
This paper concerns the problem of real-time watch-list screening (WLS) using face recognition (FR) technology. The risk of flagging innocent travellers can be very high when deploying a FR system for WLS since: (i) faces captured in surveillance video vary considerably due to pose, expression, illumination, and camera inter-operability; (ii) reference images of targets in a watch-list are typically of limited quality or quantity; (iii) the performance of FR systems may vary significantly from one individual to another (according to socalled “biometric menagerie” phenomenon); (iv) the number of travellers drastically exceeds the number of target people in a watch-list; and finally and most critically, (v) due to the nature of optics, images of faces captured by video-surveillance cameras are focused and sharp only over a very short period of time if ever at all. Existing evaluation frameworks were originally developed for spatial face identification from still images, and do not allow one to properly examine the suitability of the FR technology for WLS with respect to the above listed risk factors intrinsically present in any video surveillance application. This paper introduces the target-based multi-level FR performance evaluation framework that is suitable for WLS. According to the framework, Level 0 (face detection analysis) deals with the system's ability to process low resolution faces. Level 1 (transaction-based analysis) deals with the ability to match faces in open-set problems, where target vs. non-target distributions are unbalanced. Level 2 (subject-based analysis) deals with robustness of the system to different types of target individuals. Finally, Level 3 (spatio-temporal analysis) allows one to examine the overall FR system discrimination by means of accumulating the recognition decision confidence over a face track, which can be used for developing more robust intelligent decision-making schemes including face triaging.The results from testing a commercial state-of-art COTS FR product on a public video data-set are shown to illustrate the benefits of this framework.
研究了基于人脸识别技术的实时监视名单筛选问题。在为WLS部署FR系统时,标记无辜旅客的风险可能非常高,因为:(i)由于姿势、表情、照明和摄像头的互操作性,监控视频中捕获的人脸差异很大;(ii)观察名单上目标的参考图像通常质量或数量有限;(iii)人脸识别系统的性能可能因人而异(根据所谓的“生物识别动物园”现象);(iv)旅行者人数大大超过观察名单上的目标人数;最后也是最关键的一点是,(5)由于光学的特性,视频监控摄像机捕捉到的人脸图像只能在很短的时间内聚焦和清晰,如果有的话。现有的评估框架最初是为从静止图像中进行空间人脸识别而开发的,并且不允许人们根据任何视频监控应用中固有的上述风险因素,正确检查FR技术对WLS的适用性。本文介绍了一种适用于WLS的基于目标的多级FR性能评价框架。根据该框架,Level 0(人脸检测分析)处理系统处理低分辨率人脸的能力。第1级(基于事务的分析)处理在开放集问题中匹配面孔的能力,其中目标与非目标分布是不平衡的。层次2(基于主体的分析)处理系统对不同类型目标个体的鲁棒性。最后,第3级(时空分析)允许人们通过积累人脸轨迹上的识别决策置信度来检查整个人脸识别系统的歧视,这可以用于开发更强大的智能决策方案,包括人脸分类。在公共视频数据集上测试商业最先进的COTS FR产品的结果显示了该框架的好处。
{"title":"Target-based evaluation of face recognition technology for video surveillance applications","authors":"D. Gorodnichy, Eric Granger","doi":"10.1109/CIBIM.2014.7015451","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015451","url":null,"abstract":"This paper concerns the problem of real-time watch-list screening (WLS) using face recognition (FR) technology. The risk of flagging innocent travellers can be very high when deploying a FR system for WLS since: (i) faces captured in surveillance video vary considerably due to pose, expression, illumination, and camera inter-operability; (ii) reference images of targets in a watch-list are typically of limited quality or quantity; (iii) the performance of FR systems may vary significantly from one individual to another (according to socalled “biometric menagerie” phenomenon); (iv) the number of travellers drastically exceeds the number of target people in a watch-list; and finally and most critically, (v) due to the nature of optics, images of faces captured by video-surveillance cameras are focused and sharp only over a very short period of time if ever at all. Existing evaluation frameworks were originally developed for spatial face identification from still images, and do not allow one to properly examine the suitability of the FR technology for WLS with respect to the above listed risk factors intrinsically present in any video surveillance application. This paper introduces the target-based multi-level FR performance evaluation framework that is suitable for WLS. According to the framework, Level 0 (face detection analysis) deals with the system's ability to process low resolution faces. Level 1 (transaction-based analysis) deals with the ability to match faces in open-set problems, where target vs. non-target distributions are unbalanced. Level 2 (subject-based analysis) deals with robustness of the system to different types of target individuals. Finally, Level 3 (spatio-temporal analysis) allows one to examine the overall FR system discrimination by means of accumulating the recognition decision confidence over a face track, which can be used for developing more robust intelligent decision-making schemes including face triaging.The results from testing a commercial state-of-art COTS FR product on a public video data-set are shown to illustrate the benefits of this framework.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Speeding up the knowledge-based deblocking method for efficient forensic analysis 加速基于知识的块化方法,实现高效的法医分析
Yanzhu Liu, X. Li, A. Kong
Identifying individuals in evidence images (e.g. child sexual abuse and masked gunmen), where their faces are covered or obstructed, is a challenging task. Skin mark patterns and blood vessel patterns have been proposed as biometrics to overcome this challenge, but their clarity depends on the quality of evidence images. However, evidence images are very likely compressed by the JPEG method, which is widely installed in digital cameras. To remove blocking artifacts in skin images and restore the original clarity for forensic analysis, a knowledge-based deblocking method, which replaces compressed blocks in evidence images with uncompressed blocks from a large skin image database, was proposed. Experimental results demonstrated that this method is effective and performs better than other deblocking methods that were designed for generic images. The search for optimal uncompressed blocks in a large skin image database is computationally demanding. Ideally, this computational burden should be reduced since even in one single case, the number of evidence images can be numerous. This paper first studies statistical characteristics of skin images. Making use of this information, hash functions, bitwise ℓ1-minimization, and a parallel scheme were developed to speed up the knowledge-based deblocking method. Experimental results demonstrate that the proposed computational techniques speed up the knowledge-based deblocking method more than 150% on average.
在证据图像(例如儿童性虐待和蒙面枪手)中识别面部被遮挡或遮挡的个人是一项具有挑战性的任务。皮肤标记模式和血管模式已被提出作为生物识别技术来克服这一挑战,但它们的清晰度取决于证据图像的质量。然而,证据图像很可能被广泛安装在数码相机中的JPEG方法压缩。为了去除皮肤图像中的块化伪像,恢复原始图像的清晰度,提出了一种基于知识的块化方法,该方法将证据图像中的压缩块替换为来自大型皮肤图像数据库的未压缩块。实验结果表明,该方法是有效的,并且优于其他针对一般图像设计的去块方法。在大型皮肤图像数据库中搜索最优的未压缩块是计算要求很高的。理想情况下,这种计算负担应该减少,因为即使在一个单一的情况下,证据图像的数量也可以很多。本文首先研究了皮肤图像的统计特征。利用这些信息,开发了哈希函数、按位最小化和并行方案来加快基于知识的块化方法。实验结果表明,所提出的算法使基于知识的块化算法的平均速度提高了150%以上。
{"title":"Speeding up the knowledge-based deblocking method for efficient forensic analysis","authors":"Yanzhu Liu, X. Li, A. Kong","doi":"10.1109/CIBIM.2014.7015462","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015462","url":null,"abstract":"Identifying individuals in evidence images (e.g. child sexual abuse and masked gunmen), where their faces are covered or obstructed, is a challenging task. Skin mark patterns and blood vessel patterns have been proposed as biometrics to overcome this challenge, but their clarity depends on the quality of evidence images. However, evidence images are very likely compressed by the JPEG method, which is widely installed in digital cameras. To remove blocking artifacts in skin images and restore the original clarity for forensic analysis, a knowledge-based deblocking method, which replaces compressed blocks in evidence images with uncompressed blocks from a large skin image database, was proposed. Experimental results demonstrated that this method is effective and performs better than other deblocking methods that were designed for generic images. The search for optimal uncompressed blocks in a large skin image database is computationally demanding. Ideally, this computational burden should be reduced since even in one single case, the number of evidence images can be numerous. This paper first studies statistical characteristics of skin images. Making use of this information, hash functions, bitwise ℓ1-minimization, and a parallel scheme were developed to speed up the knowledge-based deblocking method. Experimental results demonstrate that the proposed computational techniques speed up the knowledge-based deblocking method more than 150% on average.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fingerprint indexing through sparse decomposition of ridge flow patches 脊状流斑块稀疏分解指纹索引
Antoine Deblonde
In this paper, we propose a novel method for fingerprint indexing based on local patterns of ridge flow centered on minutiae. These local descriptors are projected on a learned dictionary of ridge flow patches, with a sparsity-inducing algorithm. We show that this sparse decomposition allows to replace the ridge flow patches by a compressed signature with a reduced loss of accuracy. We experimented the combination of these descriptors with the formerly known Minutiae Cylinder Code (MCC) descriptor, that provides another kind of local information. Then, we show that the combination of these descriptors performs well for fast nearest neighbor search algorithms based on Locality-Sensitive Hashing (LSH), and allows to either to improve the accuracy of the state-of-the-art algorithm, or to improve its computational efficiency.
本文提出了一种基于以细节为中心的脊流局部模式的指纹索引方法。利用稀疏性诱导算法,将这些局部描述符投影到脊流斑块的学习字典上。我们表明,这种稀疏分解允许用压缩签名替换脊流补丁,减少了精度损失。我们尝试将这些描述符与先前已知的MCC描述符组合在一起,MCC描述符提供了另一种局部信息。然后,我们证明了这些描述符的组合在基于位置敏感散列(LSH)的快速最近邻搜索算法中表现良好,并且允许提高最先进算法的准确性或提高其计算效率。
{"title":"Fingerprint indexing through sparse decomposition of ridge flow patches","authors":"Antoine Deblonde","doi":"10.1109/CIBIM.2014.7015464","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015464","url":null,"abstract":"In this paper, we propose a novel method for fingerprint indexing based on local patterns of ridge flow centered on minutiae. These local descriptors are projected on a learned dictionary of ridge flow patches, with a sparsity-inducing algorithm. We show that this sparse decomposition allows to replace the ridge flow patches by a compressed signature with a reduced loss of accuracy. We experimented the combination of these descriptors with the formerly known Minutiae Cylinder Code (MCC) descriptor, that provides another kind of local information. Then, we show that the combination of these descriptors performs well for fast nearest neighbor search algorithms based on Locality-Sensitive Hashing (LSH), and allows to either to improve the accuracy of the state-of-the-art algorithm, or to improve its computational efficiency.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals 自适应心电生物特征识别:QRS信号再登记方法研究
R. D. Labati, V. Piuri, R. Sassi, F. Scotti, Gianluca Sforza
The diffusion of wearable and mobile devices for the acquisition and analysis of cardiac signals drastically increased the possible applicative scenarios of biometric systems based on electrocardiography (ECG). Moreover, such devices allow for comfortable and unconstrained acquisitions of ECG signals for relevant time spans of tens of hours, thus making these physiological signals particularly attractive biometric traits for continuous authentication applications. In this context, recent studies showed that the QRS complex is the most stable component of the ECG signal, but the accuracy of the authentication degrades over time, due to significant variations in the patterns for each individual. Adaptive techniques for automatic template update can therefore become enabling technologies for continuous authentication systems based on ECG characteristics.
用于采集和分析心脏信号的可穿戴和移动设备的普及大大增加了基于心电图(ECG)的生物识别系统的可能应用场景。此外,这种设备允许在数十小时的相关时间跨度内舒适且不受限制地获取ECG信号,从而使这些生理信号成为连续认证应用中特别有吸引力的生物特征。在这种情况下,最近的研究表明,QRS复合体是心电信号中最稳定的成分,但由于每个人的模式存在显著差异,身份验证的准确性会随着时间的推移而降低。因此,自动模板更新的自适应技术可以成为基于心电特征的连续认证系统的使能技术。
{"title":"Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals","authors":"R. D. Labati, V. Piuri, R. Sassi, F. Scotti, Gianluca Sforza","doi":"10.1109/CIBIM.2014.7015440","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015440","url":null,"abstract":"The diffusion of wearable and mobile devices for the acquisition and analysis of cardiac signals drastically increased the possible applicative scenarios of biometric systems based on electrocardiography (ECG). Moreover, such devices allow for comfortable and unconstrained acquisitions of ECG signals for relevant time spans of tens of hours, thus making these physiological signals particularly attractive biometric traits for continuous authentication applications. In this context, recent studies showed that the QRS complex is the most stable component of the ECG signal, but the accuracy of the authentication degrades over time, due to significant variations in the patterns for each individual. Adaptive techniques for automatic template update can therefore become enabling technologies for continuous authentication systems based on ECG characteristics.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Ontology development and evaluation for urinal tract infection 尿路感染本体开发与评价
Bureera Sabir, Usman Qamar, Abdul Wahab Muzzafar
This research is aimed to develop an ontology based on UMLS to the domain of urinal tract infection that contains information regarding definitions, synonyms, relations and semantic types from various biomedical vocabularies and to display them in a live portal (http://115.167.72.12/knowledgebase/index.php ) the resulting ontology was then formally evaluated and domain expert reviews are applied to measure ontology correctness in terms of structure and content.
本研究旨在开发一个基于UMLS的尿路感染领域本体,该本体包含来自各种生物医学词汇的定义、同义词、关系和语义类型的信息,并将其显示在实时门户(http://115.167.72.12/knowledgebase/index.php)中,然后对生成的本体进行正式评估,并应用领域专家评审来衡量本体在结构和内容方面的正确性。
{"title":"Ontology development and evaluation for urinal tract infection","authors":"Bureera Sabir, Usman Qamar, Abdul Wahab Muzzafar","doi":"10.1109/CIBIM.2014.7015463","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015463","url":null,"abstract":"This research is aimed to develop an ontology based on UMLS to the domain of urinal tract infection that contains information regarding definitions, synonyms, relations and semantic types from various biomedical vocabularies and to display them in a live portal (http://115.167.72.12/knowledgebase/index.php ) the resulting ontology was then formally evaluated and domain expert reviews are applied to measure ontology correctness in terms of structure and content.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gender inference within Turkish population by using only fingerprint feature vectors 仅使用指纹特征向量的土耳其人口性别推断
Eyüp Burak Ceyhan, Ş. Sağiroğlu
In the literature, there are some studies which investigate if there is a relationship between fingerprint and gender or not. In these studies, this relationship is examined based on some vectorial parts of fingerprints. The main problem in these studies is the lack of data, depending on ethnical background and country, and there is not an exact finding of true classification results. It is known that fingerprints show difference in males and females, and it is explained that women's line details are thin whereas men's line details are thick. However, the statistical studies, which have been made to prove the relationship between fingerprint and gender, have not investigated if the hypothesis is true for all ethnical backgrounds. In this study, we have examined if gender inference can be made only through fingerprint feature vectors, which belong to Turkish subjects, by using our database consisting of Naive Bayes, kNN, Decision Tree and Support Vector Machine learning algorithms. By using Naive Bayes algorithm, the success of the gender classification is found as 95.3%. This ratio has not been obtained before for “gender inference from fingerprint” in the literature. Therefore, this study can be useful for criminal cases.
在文献中,有一些研究调查了指纹和性别之间是否存在关系。在这些研究中,这种关系是基于指纹的一些矢量部分来检验的。这些研究的主要问题是缺乏数据,取决于种族背景和国家,没有一个准确的发现真实的分类结果。据了解,男性和女性的指纹存在差异,这可以解释为女性的指纹纹细而男性的指纹纹粗。然而,为了证明指纹和性别之间的关系而进行的统计研究,并没有调查这一假设是否适用于所有种族背景。在这项研究中,我们通过使用我们的由朴素贝叶斯、kNN、决策树和支持向量机器学习算法组成的数据库,研究了是否只能通过属于土耳其受试者的指纹特征向量进行性别推断。使用朴素贝叶斯算法,性别分类成功率为95.3%。“指纹性别推断”这一比例在文献中尚未得到。因此,本研究对刑事案件具有一定的借鉴意义。
{"title":"Gender inference within Turkish population by using only fingerprint feature vectors","authors":"Eyüp Burak Ceyhan, Ş. Sağiroğlu","doi":"10.1109/CIBIM.2014.7015456","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015456","url":null,"abstract":"In the literature, there are some studies which investigate if there is a relationship between fingerprint and gender or not. In these studies, this relationship is examined based on some vectorial parts of fingerprints. The main problem in these studies is the lack of data, depending on ethnical background and country, and there is not an exact finding of true classification results. It is known that fingerprints show difference in males and females, and it is explained that women's line details are thin whereas men's line details are thick. However, the statistical studies, which have been made to prove the relationship between fingerprint and gender, have not investigated if the hypothesis is true for all ethnical backgrounds. In this study, we have examined if gender inference can be made only through fingerprint feature vectors, which belong to Turkish subjects, by using our database consisting of Naive Bayes, kNN, Decision Tree and Support Vector Machine learning algorithms. By using Naive Bayes algorithm, the success of the gender classification is found as 95.3%. This ratio has not been obtained before for “gender inference from fingerprint” in the literature. Therefore, this study can be useful for criminal cases.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Disguised face detection and recognition under the complex background 复杂背景下伪装人脸的检测与识别
Jing Li, Bin Li, Yong Xu, Kaixuan Lu, Ke Yan, Lunke Fei
In this paper, we propose an effective method for disguised face detection and recognition under the complex background. This method consists of two stages. The first stage determines whether the object is a person. In this stage, we propose the first-dynamic-then-static foreground object detection strategy. This strategy exploits the updated learning-based codebook model for moving object detection and uses the Local Binary Patterns (LBP) + Histogram of Oriented Gradients (HOG) feature-based head-shoulder detection for static target detection. The second stage determines whether the face is disguised and the classes of disguises. Experiments show that our method can detect disguised faces in real time under the complex background and achieve acceptable disguised face recognition rate.
本文提出了一种有效的复杂背景下伪装人脸检测与识别方法。这个方法包括两个阶段。第一阶段确定对象是否是人。在此阶段,我们提出了先动态后静态的前景目标检测策略。该策略利用更新的基于学习的码本模型进行运动目标检测,并使用基于局部二值模式(LBP) +定向梯度直方图(HOG)特征的头肩检测进行静态目标检测。第二阶段确定面部是否伪装,以及伪装的类别。实验表明,该方法能够在复杂背景下实时检测出被伪装的人脸,并取得了可接受的伪装人脸识别率。
{"title":"Disguised face detection and recognition under the complex background","authors":"Jing Li, Bin Li, Yong Xu, Kaixuan Lu, Ke Yan, Lunke Fei","doi":"10.1109/CIBIM.2014.7015448","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015448","url":null,"abstract":"In this paper, we propose an effective method for disguised face detection and recognition under the complex background. This method consists of two stages. The first stage determines whether the object is a person. In this stage, we propose the first-dynamic-then-static foreground object detection strategy. This strategy exploits the updated learning-based codebook model for moving object detection and uses the Local Binary Patterns (LBP) + Histogram of Oriented Gradients (HOG) feature-based head-shoulder detection for static target detection. The second stage determines whether the face is disguised and the classes of disguises. Experiments show that our method can detect disguised faces in real time under the complex background and achieve acceptable disguised face recognition rate.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131466322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient adaptive face recognition systems based on capture conditions 基于捕获条件的高效自适应人脸识别系统
C. Pagano, Eric Granger, R. Sabourin, A. Rattani, G. Marcialis, F. Roli
In many face recognition (FR) applications, changing capture conditions lead to divergence between facial models stored during enrollment and faces captured during operations. Moreover, it is often costly or infeasible to capture several high quality reference samples a priori to design representative facial models. Although self-updating models using high-confidence face captures appear promising, they raise several challenges when capture conditions change. In particular, face models of individuals may be corrupted by misclassified input captures, and their growth may require pruning to bound system complexity over time. This paper presents a system for self-update of facial models that exploits changes in capture conditions to assure the relevance of templates and to limit the growth of template galleries. The set of reference templates (facial model) of an individual is only updated to include new faces that are captured under significantly different conditions. In a particular implementation of this system, illumination changes are detected in order to select face captures from bio-login to be stored in a gallery. Face captures from a built-in still or video camera are taken at periodic intervals to authenticate the user having accessed a secured computer or network. Experimental results produced with the DIEE dataset show that the proposed system provides a comparable level of performance to the FR system that self-updates the gallery on all high-confidence face captures, but with significantly lower complexity, i.e., number of templates per individual.
在许多人脸识别应用中,不断变化的捕获条件会导致注册期间存储的人脸模型与操作期间捕获的人脸模型之间的差异。此外,先验地获取几个高质量的参考样本来设计具有代表性的面部模型往往是昂贵的或不可行的。尽管使用高置信度面部捕捉的自我更新模型看起来很有希望,但当捕捉条件发生变化时,它们会带来一些挑战。特别是,个体的面部模型可能会被错误分类的输入捕获所破坏,并且随着时间的推移,它们的增长可能需要修剪以约束系统复杂性。本文提出了一个面部模型的自我更新系统,该系统利用捕获条件的变化来确保模板的相关性并限制模板库的增长。个体的参考模板集(面部模型)仅更新为包含在显著不同条件下捕获的新面孔。在该系统的一个特定实现中,检测光照变化,以便从生物登录中选择面部捕获以存储在图库中。每隔一段时间,内置的静止或视频摄像头就会捕捉到人脸,以验证用户是否访问了安全的计算机或网络。使用DIEE数据集产生的实验结果表明,所提出的系统提供了与FR系统相当的性能水平,FR系统在所有高置信度的人脸捕获上自我更新图库,但复杂性显着降低,即每个人的模板数量。
{"title":"Efficient adaptive face recognition systems based on capture conditions","authors":"C. Pagano, Eric Granger, R. Sabourin, A. Rattani, G. Marcialis, F. Roli","doi":"10.1109/CIBIM.2014.7015444","DOIUrl":"https://doi.org/10.1109/CIBIM.2014.7015444","url":null,"abstract":"In many face recognition (FR) applications, changing capture conditions lead to divergence between facial models stored during enrollment and faces captured during operations. Moreover, it is often costly or infeasible to capture several high quality reference samples a priori to design representative facial models. Although self-updating models using high-confidence face captures appear promising, they raise several challenges when capture conditions change. In particular, face models of individuals may be corrupted by misclassified input captures, and their growth may require pruning to bound system complexity over time. This paper presents a system for self-update of facial models that exploits changes in capture conditions to assure the relevance of templates and to limit the growth of template galleries. The set of reference templates (facial model) of an individual is only updated to include new faces that are captured under significantly different conditions. In a particular implementation of this system, illumination changes are detected in order to select face captures from bio-login to be stored in a gallery. Face captures from a built-in still or video camera are taken at periodic intervals to authenticate the user having accessed a secured computer or network. Experimental results produced with the DIEE dataset show that the proposed system provides a comparable level of performance to the FR system that self-updates the gallery on all high-confidence face captures, but with significantly lower complexity, i.e., number of templates per individual.","PeriodicalId":432938,"journal":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1