首页 > 最新文献

IET Biometrics最新文献

英文 中文
A biometric-based verification system for handwritten image-based signatures using audio to image matching 一种基于生物特征的验证系统,用于使用音频到图像匹配的手写图像签名
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-11-16 DOI: 10.1049/bme2.12059
Abdulaziz Almehmadi

Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.

手写或使用存储的基于图像的签名在文档或支票上签名是签名者进行身份验证和授权的有效方法。然而,签名伪造已经发展到完全复制签名的样子,这可以通过熟练地、不熟练地或随机地伪造签名来实现。这种困境对使用签名进行准确身份验证和授权提出了挑战。本研究提出了一种手写图像签名的验证系统,用于验证图像签名是否真实而非伪造。系统将基于音频的签名流与所调查的基于图像的签名进行映射,并返回匹配结果。匹配是通过分类和/或两个签名之间的相关性来完成的。如果匹配显示类似的类别或分数高于预定义的阈值,则验证基于图像的签名是真实的,否则将其标记为伪造。共有20人参加了这项实验,每个参与者都提供了一个合法的签名,并在不同的环境中伪造了另外四个签名。在双盲设置中,系统使用一类支持向量机报告准确率为95%,使用相关系数报告准确率为100%,用于检测伪造签名和合法签名。
{"title":"A biometric-based verification system for handwritten image-based signatures using audio to image matching","authors":"Abdulaziz Almehmadi","doi":"10.1049/bme2.12059","DOIUrl":"10.1049/bme2.12059","url":null,"abstract":"<p>Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90829446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics 欧洲生物识别协会对欧洲数据保护监管机构“生物识别技术中的误解”的回应
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-11-11 DOI: 10.1049/bme2.12057
Christoph Busch, Adam Czajka, Farzin Deravi, Pawel Drozdowski, Marta Gomez-Barrero, Georg Hasse, Olaf Henniger, Els Kindt, Jascha Kolberg, Alexander Nouak, Kiran Raja, Raghavendra Ramachandra, Christian Rathgeb, Jean Salomon, Raymond Veldhuis

The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.

本立场文件的目的是对2020年6月发布的欧洲数据保护监管机构(EDPS)-机构Española de Protección de Datos (aepd)联合出版物“关于生物识别和认证的14个误解”发表评论,并提供额外的投入,以帮助更好地理解该出版物中提出的问题。特别地,它旨在强调上述出版物中一些重要的缺失信息。我们希望这篇论文能对EDPS-aepd出版物的未来修订有所帮助,使其全面介绍生物识别技术的现状、标准的可用性和增强隐私的技术。
{"title":"A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics","authors":"Christoph Busch,&nbsp;Adam Czajka,&nbsp;Farzin Deravi,&nbsp;Pawel Drozdowski,&nbsp;Marta Gomez-Barrero,&nbsp;Georg Hasse,&nbsp;Olaf Henniger,&nbsp;Els Kindt,&nbsp;Jascha Kolberg,&nbsp;Alexander Nouak,&nbsp;Kiran Raja,&nbsp;Raghavendra Ramachandra,&nbsp;Christian Rathgeb,&nbsp;Jean Salomon,&nbsp;Raymond Veldhuis","doi":"10.1049/bme2.12057","DOIUrl":"10.1049/bme2.12057","url":null,"abstract":"<p>The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73818655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securable networked scheme with face authentication 具有人脸认证的安全网络方案
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-09-09 DOI: 10.1049/bme2.12056
Da-You Huang, Chun-Liang Lin, Yang-Yi Chen

Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.

近年来,人脸识别技术已广泛应用于各个领域。广泛的应用与大量的数据传输相关联,从而激发了边缘计算。在本研究任务中,边缘计算的主要目标是将部分计算工作移交给终端设备;服务器只需要处理最终返回的结果。提出的物联网配置包括感知层、传输层和应用层,以实现一个完整的物联网系统。在感知层,采用了人脸认证机制。该系统配备了高度强大的防欺骗功能,可以避免犯罪分子通过照片或电子屏幕进入。最后,实现物联网传输系统作为传输层。结合这种传输机制,可以将用户的面部特征分发到用户的电子设备中,而不是存储在服务器中。这不仅节省了存储资源和传输成本,而且使用户可以轻松完成数据传输和面对认证。
{"title":"Securable networked scheme with face authentication","authors":"Da-You Huang,&nbsp;Chun-Liang Lin,&nbsp;Yang-Yi Chen","doi":"10.1049/bme2.12056","DOIUrl":"10.1049/bme2.12056","url":null,"abstract":"<p>Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 客座编辑:BIOSIG 2020个人认证可信度特刊
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-09-02 DOI: 10.1049/bme2.12055
Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia

Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.

This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.

The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.

The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.

The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi

最近的“值得信赖的人工智能”指南指出,它不仅与人工智能系统本身的可信度有关,还包括系统生命周期中所有过程和参与者的可信度。个人认证是人工智能的一种特殊应用,其中(i)遵守法律法规;(ii)尊重伦理原则和价值观;(iii)以及从技术和社会角度来看的稳健性至关重要。这是IET生物识别技术的第一期“个人认证的可信度”特刊,以2020年版生物识别特别利益小组(BIOSIG)会议为起点。本期特刊汇集了关注生物识别主题的作品,这些作品被置于培养相关过程可信度的新视角下。“BIOSIG 2020关于人的可信度的特刊”包含七篇论文,其中大多数是在2020年BIOSIG会议上发表的论文的扩展版本,涉及生物特征学的具体研究领域,如呈现攻击检测(PAD)、传统和新兴生物特征,以及在有口罩的情况下进行生物识别和软生物识别。Ali Khodabakhsh和Zahid Akhtar的论文《针对理性攻击者的未知呈现攻击检测》调查了PAD系统在现实环境中对攻击的脆弱性,解决了未知攻击的检测、对抗性环境中的性能、少量射击学习和可解释性。在这项研究中,这些限制是通过一种依赖于博弈论观点来建模攻击者和检测器之间的交互的方法来解决的。这些挑战得到了成功解决,所提出的方法在已知和未知攻击中提供了更平衡的性能,同时在针对理性攻击者的已知和未知袭击检测情况下实现了最先进的性能。最后,研究了该方法的少镜头学习潜力及其提供像素级可解释性的能力。Lazaro Gonzalez Soler、Marta Gomez-Barrero和Christoph Busch的论文《论基于Fisher矢量的人脸呈现攻击检测的泛化能力》重点研究了更具挑战性的场景中的人脸PAD,其中未知攻击包含在测试集中。考虑到现有算法在检测未知呈现攻击工具(PAI)方面面临困难的更现实的场景,作者提出了一种基于Fisher向量的新特征空间,该特征空间由紧凑的二进制统计图像特征(BSIF)直方图计算,其允许从已知样本中发现语义特征子集,以便增强对未知攻击的检测。这种新的表示方式,针对从免费提供的面部数据库中获取的具有挑战性的未知攻击进行了评估,在存在未知攻击的情况下显示出了有希望的结果。此外,所提出的方法在跨数据集场景中实现了最先进的性能。Mahshid Sadeghpour、Arathi Arakala、Stephen Davis和Kathy Horadam的论文《基于仿射的重建攻击在再生血管特征点中的失败》重点研究了基于视网膜和手部血管数据的生物识别系统对反向生物识别攻击的脆弱性。特别地,考虑了基于仿射的重建攻击方法,通过仿射近似对生物特征识别算法进行建模。这种类型的攻击使用建模的生物特征识别算法和系统发布的比较分数来重建目标生物特征参考。尽管这种重建方法只成功地应用于重建人脸图像,但普遍的共识是,任何发布比较分数的生物特征系统都可能容易受到这种攻击,因为该方法足够通用,可以应用于其他生物特征模板。在这项工作中,作者表明,在测试从视网膜和手部血管图像中提取的特征点模式的重建攻击的实验中,该攻击无法再生稀疏血管特征点模板。实验结果表明,重建攻击不像人们普遍认为的那样具有威胁性,并且将稀疏模板存储为参考并显示比较分数的血管生物特征模板保护方案不易受到基于仿射的重建攻击。Ehsaneddin Jalilian、Mahmut Karakaya和Andreas Uhl的论文“基于CNN的斜角虹膜分割和识别”深入研究了不同凝视角度对眼睛生物特征的一般影响,然后将研究结果与基于CNN的斜角虹膜分割结果和随后的识别性能相关联。而深度学习技术(即。 ,基于分割的CNNs)越来越多地用于解决这个问题,但仍然缺乏关于影响这些网络性能的相关失真的机制的信息。具体而言,需要一个全面的识别框架,专门用于使用此类模块的特定斜角虹膜识别。作者介绍了一种改进方案来补偿由偏离角度失真引起的一些分割退化,并进一步提出了一种新的凝视角度估计和参数化模块来估计和校正偏离角度的虹膜图像回到正视图。利用这些优势,作者制定了几种方法来配置基于CNN的离角虹膜分割和识别的端到端框架。Hoang Nguyen、Ajita Rattani和Reza Derakhshani的论文《眉毛作为一种独立的生物识别技术的受试者独立评估》探讨了新兴的眼部模式,以应对因面部覆盖物引起的闭塞等挑战。作者提出了使用从眼睛区域及其周围提取的特征(如眉毛区域)的眼部生物识别技术,作为应对这些挑战的潜在方法。这项工作评估了五个深度学习模型(lightCNN、ResNet、DenseNet、MobileNetV2和SqueezeNet),用于在不同数据集、光照条件、分辨率和面部表情的独立于主体的环境中进行基于眉毛的用户身份验证。作者还在训练和测试数据集中展示了一个具有挑战性的模拟同卵双胞胎场景,以及使用两个著名数据库(FACES和VISOB)获得的结果。Naser Damer、Fadi Boutros、Marius Süßmilch,Florian Kirchbuchner和Arjan Kuijper以及Fernando Alonso-Fernandez、Kevin Hernandez-Diaz、Silvia Ramis、Francisco J.Perales和Josef Bigun的《口罩和软生物测量:利用人脸识别CNNs对移动眼睛图像的年龄和性别预测》都解决了新冠肺炎口罩在生物识别方面带来的挑战。在第一篇论文中,作者提出了一个专门收集的数据库,其中包含在不同捕获条件下的三个会话,以模拟真实的用例,并额外执行数据扩充,以包括合成掩模遮挡。本文研究了蒙面探针对四种人脸识别系统(学术和商业)行为的影响,并进行了评估,包括蒙面与非蒙面以及蒙面与蒙面的比较。此外,该工作还比较了真实口罩和模拟口罩对人脸识别性能的影响。第二篇论文讨论了在强制使用口罩导致面部部分闭塞的情况下,使用智能手机拍摄的自拍眼部图像来估计年龄和性别。这项工作探讨了疫情导致移动设备使用激增和向数字服务迁移增加所带来的挑战。特别是,由于移动设备的硬件限制和可下载应用程序的大小限制,在身份或表情识别等任务中使用大型细胞神经网络是不可行的。因此,作者改编了在ImageNet挑战的背景下提出的两个现有的轻量级CNNs和为移动人脸识别提出的两种附加架构。通过使用在ImageNet上预先训练的网络和一些针对人脸识别进行进一步微调的网络来解决过拟合问题,这些网络可以使用非常大的训练数据库。由于两项任务都使用了相似的输入数据,作者假设所提出的策略有利于软生物特征估计。对不同预训练对所用架构的影响进行了全面研究,表明在大多数情况下,对网络进行人脸识别微调后,可以获得更好的精度。
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"<p>Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.</p><p>This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.</p><p>The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.</p><p>The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.</p><p>The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72126370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 嘉宾评论:2020年BIOSIG关于个人认证可信度的特刊
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-09-01 DOI: 10.1049/bme2.12055
Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76649373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG personal recognition based on ‘qualified majority’ over signal patches 基于“限定多数”的脑电信号个人识别
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-08-19 DOI: 10.1049/bme2.12050
Andrea Panzino, Giulia Orrù, Gian Luca Marcialis, Fabio Roli

Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.

基于脑电图(EEG)的现实背景下的个人识别仍然是一个研究问题,需要澄清以下问题:(1)信号长度的持续时间,称为“epoch”,为了实际目的,它必须非常短;(2)脑电图子带的贡献。这两个方面是相互联系的,因为历元持续时间越短,低频子带的贡献越低,而高频子带的贡献越高。然而,众所周知,前者是在休息或无意识状态下大脑内部活动的特征。这些子波段在野外是没有用处的,因为在野外,受试者是有意识的,而不是处于一种类似休息状态的状态。此外,后者可能在这个过程中表现得更好,表现出受试者清醒时的正常活动。本研究旨在通过提出一种基于极短信号片段(称为“patch”)的新型个人识别架构来澄清上述问题,并细分每个epoch。补丁被单独分类。分类补丁的“合格多数”允许做出最终决定。实验表明,这种方法(1)可以用于实际目的,(2)阐明了子带在体外环境中的作用,但与在野外可以想象的情况非常相似。
{"title":"EEG personal recognition based on ‘qualified majority’ over signal patches","authors":"Andrea Panzino,&nbsp;Giulia Orrù,&nbsp;Gian Luca Marcialis,&nbsp;Fabio Roli","doi":"10.1049/bme2.12050","DOIUrl":"10.1049/bme2.12050","url":null,"abstract":"<p>Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84293337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unknown presentation attack detection against rational attackers 针对理性攻击者的未知演示攻击检测
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-08-06 DOI: 10.1049/bme2.12053
Ali Khodabakhsh, Zahid Akhtar

Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.

尽管在过去十年中,呈现攻击检测和多媒体取证领域取得了令人印象深刻的进展,但这些系统在现实生活中仍然容易受到攻击。现有解决方案的一些挑战是检测未知攻击、在对抗性环境中执行的能力、少量射击学习和可解释性。在这项研究中,这些局限性是通过依赖博弈论观点来模拟攻击者和检测器之间的交互来解决的。因此,提出了一种新的优化标准,并定义了一组要求,以提高这些系统在现实生活中的性能。此外,还提出了一种新的检测技术,该技术使用不偏向任何特定攻击物种的基于生成器的特征集。为了进一步优化对已知攻击的性能,提出了一种新的损失函数——分类边际最大化损失(C-marmax),该函数逐渐提高了对最强大攻击的性能。所提出的方法在已知和未知攻击之间提供了更平衡的性能,并在针对理性攻击者的已知和未知袭击检测情况下实现了最先进的性能。最后,研究了该方法的少镜头学习潜力及其提供像素级可解释性的能力。
{"title":"Unknown presentation attack detection against rational attackers","authors":"Ali Khodabakhsh,&nbsp;Zahid Akhtar","doi":"10.1049/bme2.12053","DOIUrl":"https://doi.org/10.1049/bme2.12053","url":null,"abstract":"<p>Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72141048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Failure of affine-based reconstruction attack in regenerating vascular feature points 基于仿射的重建攻击在血管特征点重建中的失败
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-07-28 DOI: 10.1049/bme2.12048
Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam

Inverse biometrics methods are a major privacy concern for users of biometric recognition systems. Affine-based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Although this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack since this method is sufficiently general to be applied to other biometric templates. Here it is shown that the attack fails to regenerate sparse vascular feature point templates. The reconstruction attack on feature point patterns extracted from retina and hand vascular images is tested. The inverse attack match rate for reconstructed reference templates was 0.3% in one experiment using retinal vasculature and 0% for all others. These results show that the reconstruction attack is not as catastrophic as it is widely accepted to be, and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.

反向生物识别方法是生物识别系统用户关注的主要隐私问题。基于仿射的重建攻击是一种通过仿射近似对生物特征识别算法进行建模的逆生物特征方法。这种类型的攻击使用建模的生物特征识别算法和系统发布的比较分数来重建目标生物特征参考。尽管这种重建方法只成功地应用于重建人脸图像,但普遍的共识是,任何发布比较分数的生物特征系统都可能容易受到这种攻击,因为这种方法足够通用,可以应用于其他生物特征模板。结果表明,该攻击无法重新生成稀疏的血管特征点模板。测试了对从视网膜和手部血管图像中提取的特征点模式的重建攻击。在一个使用视网膜血管系统的实验中,重建的参考模板的反向攻击匹配率为0.3%,而在所有其他实验中为0%。这些结果表明,重建攻击并不像人们普遍接受的那样具有灾难性,并且将稀疏模板存储为参考并显示比较分数的血管生物特征模板保护方案不易受到基于仿射的重建攻击。
{"title":"Failure of affine-based reconstruction attack in regenerating vascular feature points","authors":"Mahshid Sadeghpour,&nbsp;Arathi Arakala,&nbsp;Stephen A. Davis,&nbsp;Kathy J. Horadam","doi":"10.1049/bme2.12048","DOIUrl":"https://doi.org/10.1049/bme2.12048","url":null,"abstract":"<p>Inverse biometrics methods are a major privacy concern for users of biometric recognition systems. Affine-based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Although this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack since this method is sufficiently general to be applied to other biometric templates. Here it is shown that the attack fails to regenerate sparse vascular feature point templates. The reconstruction attack on feature point patterns extracted from retina and hand vascular images is tested. The inverse attack match rate for reconstructed reference templates was 0.3% in one experiment using retinal vasculature and 0% for all others. These results show that the reconstruction attack is not as catastrophic as it is widely accepted to be, and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72167372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The following article for this Special Issue was published in a different issue 本期特刊的以下文章发表在另一期
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-07-27 DOI: 10.1049/bme2.12054
{"title":"The following article for this Special Issue was published in a different issue","authors":"","doi":"10.1049/bme2.12054","DOIUrl":"https://doi.org/10.1049/bme2.12054","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72192157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN-based off-angle iris segmentation and recognition 基于cnn的非角度虹膜分割与识别
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-07-13 DOI: 10.1049/BME2.12052
Ehsaneddin Jalilian, M. Karakaya, A. Uhl
{"title":"CNN-based off-angle iris segmentation and recognition","authors":"Ehsaneddin Jalilian, M. Karakaya, A. Uhl","doi":"10.1049/BME2.12052","DOIUrl":"https://doi.org/10.1049/BME2.12052","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74051118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1