Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.
{"title":"A biometric-based verification system for handwritten image-based signatures using audio to image matching","authors":"Abdulaziz Almehmadi","doi":"10.1049/bme2.12059","DOIUrl":"10.1049/bme2.12059","url":null,"abstract":"<p>Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"124-140"},"PeriodicalIF":2.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90829446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Busch, Adam Czajka, Farzin Deravi, Pawel Drozdowski, Marta Gomez-Barrero, Georg Hasse, Olaf Henniger, Els Kindt, Jascha Kolberg, Alexander Nouak, Kiran Raja, Raghavendra Ramachandra, Christian Rathgeb, Jean Salomon, Raymond Veldhuis
The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.
本立场文件的目的是对2020年6月发布的欧洲数据保护监管机构(EDPS)-机构Española de Protección de Datos (aepd)联合出版物“关于生物识别和认证的14个误解”发表评论,并提供额外的投入,以帮助更好地理解该出版物中提出的问题。特别地,它旨在强调上述出版物中一些重要的缺失信息。我们希望这篇论文能对EDPS-aepd出版物的未来修订有所帮助,使其全面介绍生物识别技术的现状、标准的可用性和增强隐私的技术。
{"title":"A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics","authors":"Christoph Busch, Adam Czajka, Farzin Deravi, Pawel Drozdowski, Marta Gomez-Barrero, Georg Hasse, Olaf Henniger, Els Kindt, Jascha Kolberg, Alexander Nouak, Kiran Raja, Raghavendra Ramachandra, Christian Rathgeb, Jean Salomon, Raymond Veldhuis","doi":"10.1049/bme2.12057","DOIUrl":"10.1049/bme2.12057","url":null,"abstract":"<p>The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"79-86"},"PeriodicalIF":2.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73818655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.
{"title":"Securable networked scheme with face authentication","authors":"Da-You Huang, Chun-Liang Lin, Yang-Yi Chen","doi":"10.1049/bme2.12056","DOIUrl":"10.1049/bme2.12056","url":null,"abstract":"<p>Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"97-108"},"PeriodicalIF":2.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia
<p>Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.</p><p>This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.</p><p>The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.</p><p>The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.</p><p>The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"<p>Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.</p><p>This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.</p><p>The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.</p><p>The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.</p><p>The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72126370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"41 1","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76649373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Panzino, Giulia Orrù, Gian Luca Marcialis, Fabio Roli
Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.
{"title":"EEG personal recognition based on ‘qualified majority’ over signal patches","authors":"Andrea Panzino, Giulia Orrù, Gian Luca Marcialis, Fabio Roli","doi":"10.1049/bme2.12050","DOIUrl":"10.1049/bme2.12050","url":null,"abstract":"<p>Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"63-78"},"PeriodicalIF":2.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84293337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.
{"title":"Unknown presentation attack detection against rational attackers","authors":"Ali Khodabakhsh, Zahid Akhtar","doi":"10.1049/bme2.12053","DOIUrl":"https://doi.org/10.1049/bme2.12053","url":null,"abstract":"<p>Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"460-479"},"PeriodicalIF":2.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72141048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam
Inverse biometrics methods are a major privacy concern for users of biometric recognition systems. Affine-based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Although this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack since this method is sufficiently general to be applied to other biometric templates. Here it is shown that the attack fails to regenerate sparse vascular feature point templates. The reconstruction attack on feature point patterns extracted from retina and hand vascular images is tested. The inverse attack match rate for reconstructed reference templates was 0.3% in one experiment using retinal vasculature and 0% for all others. These results show that the reconstruction attack is not as catastrophic as it is widely accepted to be, and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.
{"title":"Failure of affine-based reconstruction attack in regenerating vascular feature points","authors":"Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam","doi":"10.1049/bme2.12048","DOIUrl":"https://doi.org/10.1049/bme2.12048","url":null,"abstract":"<p>Inverse biometrics methods are a major privacy concern for users of biometric recognition systems. Affine-based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Although this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack since this method is sufficiently general to be applied to other biometric templates. Here it is shown that the attack fails to regenerate sparse vascular feature point templates. The reconstruction attack on feature point patterns extracted from retina and hand vascular images is tested. The inverse attack match rate for reconstructed reference templates was 0.3% in one experiment using retinal vasculature and 0% for all others. These results show that the reconstruction attack is not as catastrophic as it is widely accepted to be, and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"497-517"},"PeriodicalIF":2.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72167372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The following article for this Special Issue was published in a different issue","authors":"","doi":"10.1049/bme2.12054","DOIUrl":"https://doi.org/10.1049/bme2.12054","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 4","pages":"456"},"PeriodicalIF":2.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72192157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Accurate segmentation and parameterisation of the iris in eye images still remain a significant challenge for achieving robust iris recognition, especially in off-angle images captured in less constrained environments. While deep learning techniques (i.e. segmentation-based convolutional neural networks (CNNs)) are increasingly being used to address this problem, there is a significant lack of information about the mechanism of the related distortions affecting the performance of these networks and no comprehensive recognition framework is dedicated, in particular, to off-angle iris recognition using such modules. In this work, the general effect of different gaze angles on ocular biometrics is discussed, and the findings are then related to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. An improvement scheme is also introduced to compensate for some segmentation degradations caused by the off-angle distortions, and a new gaze-angle estimation and parameterisation module is further proposed to estimate and re-project (correct) the off-angle iris images back to frontal view. Taking benefit of these, several approaches (pipelines) are formulated to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition. Within the framework of these approaches, a series of experiments is carried out to determine whether (i) improving the segmentation outputs and/or correcting the output iris images before or after the segmentation can compensate for some off-angle distortions, (ii) a CNN trained on frontal eye images is capable of detecting and extracting the learnt features on the corrected images, or (iii) the generalisation capability of the network can be improved by training it on iris images of different gaze angles. Finally, the recognition performance of the selected approach is compared against some state-of-the-art off-angle iris recognition algorithms.
{"title":"CNN-based off-angle iris segmentation and recognition","authors":"Ehsaneddin Jalilian, Mahmut Karakaya, Andreas Uhl","doi":"10.1049/bme2.12052","DOIUrl":"https://doi.org/10.1049/bme2.12052","url":null,"abstract":"<p>Accurate segmentation and parameterisation of the iris in eye images still remain a significant challenge for achieving robust iris recognition, especially in off-angle images captured in less constrained environments. While deep learning techniques (i.e. segmentation-based convolutional neural networks (CNNs)) are increasingly being used to address this problem, there is a significant lack of information about the mechanism of the related distortions affecting the performance of these networks and no comprehensive recognition framework is dedicated, in particular, to off-angle iris recognition using such modules. In this work, the general effect of different gaze angles on ocular biometrics is discussed, and the findings are then related to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. An improvement scheme is also introduced to compensate for some segmentation degradations caused by the off-angle distortions, and a new gaze-angle estimation and parameterisation module is further proposed to estimate and re-project (correct) the off-angle iris images back to frontal view. Taking benefit of these, several approaches (pipelines) are formulated to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition. Within the framework of these approaches, a series of experiments is carried out to determine whether (i) improving the segmentation outputs and/or correcting the output iris images before or after the segmentation can compensate for some off-angle distortions, (ii) a CNN trained on frontal eye images is capable of detecting and extracting the learnt features on the corrected images, or (iii) the generalisation capability of the network can be improved by training it on iris images of different gaze angles. Finally, the recognition performance of the selected approach is compared against some state-of-the-art off-angle iris recognition algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"518-535"},"PeriodicalIF":2.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72151038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}