首页 > 最新文献

IET Biometrics最新文献

英文 中文
Detection of non-suicidal self-injury based on spatiotemporal features of indoor activities 基于室内活动时空特征的非自杀性自伤检测
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-13 DOI: 10.1049/bme2.12110
Guanci Yang, Siyuan Yang, Kexin Luo, Shangen Lan, Ling He, Yang Li

Non-suicide self-injury (NSSI) can be dangerous and difficult for guardians or caregivers to detect in time. NSSI refers to when people hurt themselves even though they have no wish to cause critical or long-lasting hurt. To timely identify and effectively prevent NSSI in order to reduce the suicide rates of patients with a potential suicide risk, the detection of NSSI based on the spatiotemporal features of indoor activities is proposed. Firstly, an NSSI behaviour dataset is provided, and it includes four categories that can be used for scientific research on NSSI evaluation. Secondly, an NSSI detection algorithm based on the spatiotemporal features of indoor activities (NssiDetection) is proposed. NssiDetection calculates the human bounding box by using an object detection model and employs a behaviour detection model to extract the temporal and spatial features of NSSI behaviour. Thirdly, the optimal combination schemes of NssiDetection is investigated by checking its performance with different behaviour detection methods and training strategies. Lastly, a case study is performed by implementing an NSSI behaviour detection prototype system. The prototype system has a recognition accuracy of 84.18% for NSSI actions with new backgrounds, persons, or camera angles.

非自杀性自伤(NSSI)可能很危险,监护人或看护人很难及时发现。NSSI指的是人们伤害自己,尽管他们不想造成严重或长期的伤害。为了及时识别并有效预防NSSI,以降低有潜在自杀风险的患者的自杀率,提出了基于室内活动时空特征的NSSI检测方法。首先,提供了一个NSSI行为数据集,它包括四个类别,可用于NSSI评估的科学研究。其次,提出了一种基于室内活动时空特征的NSSI检测算法(NsiDetection)。NssiDetection通过使用对象检测模型来计算人体边界框,并使用行为检测模型来提取NSSI行为的时间和空间特征。第三,通过使用不同的行为检测方法和训练策略检查NsiDetection的性能,研究了NsiDetect的最优组合方案。最后,通过实现NSSI行为检测原型系统进行了案例研究。原型系统对具有新背景、人物或相机角度的NSSI动作的识别准确率为84.18%。
{"title":"Detection of non-suicidal self-injury based on spatiotemporal features of indoor activities","authors":"Guanci Yang,&nbsp;Siyuan Yang,&nbsp;Kexin Luo,&nbsp;Shangen Lan,&nbsp;Ling He,&nbsp;Yang Li","doi":"10.1049/bme2.12110","DOIUrl":"https://doi.org/10.1049/bme2.12110","url":null,"abstract":"<p>Non-suicide self-injury (NSSI) can be dangerous and difficult for guardians or caregivers to detect in time. NSSI refers to when people hurt themselves even though they have no wish to cause critical or long-lasting hurt. To timely identify and effectively prevent NSSI in order to reduce the suicide rates of patients with a potential suicide risk, the detection of NSSI based on the spatiotemporal features of indoor activities is proposed. Firstly, an NSSI behaviour dataset is provided, and it includes four categories that can be used for scientific research on NSSI evaluation. Secondly, an NSSI detection algorithm based on the spatiotemporal features of indoor activities (NssiDetection) is proposed. NssiDetection calculates the human bounding box by using an object detection model and employs a behaviour detection model to extract the temporal and spatial features of NSSI behaviour. Thirdly, the optimal combination schemes of NssiDetection is investigated by checking its performance with different behaviour detection methods and training strategies. Lastly, a case study is performed by implementing an NSSI behaviour detection prototype system. The prototype system has a recognition accuracy of 84.18% for NSSI actions with new backgrounds, persons, or camera angles.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"91-101"},"PeriodicalIF":2.0,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient ear alignment using a two-stack hourglass network 使用两层沙漏网络实现高效的耳朵对齐
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-03-13 DOI: 10.1049/bme2.12109
Anja Hrovatič, Peter Peer, Vitomir Štruc, Žiga Emeršič

Ear images have been shown to be a reliable modality for biometric recognition with desirable characteristics, such as high universality, distinctiveness, measurability and permanence. While a considerable amount of research has been directed towards ear recognition techniques, the problem of ear alignment is still under-explored in the open literature. Nonetheless, accurate alignment of ear images, especially in unconstrained acquisition scenarios, where the ear appearance is expected to vary widely due to pose and view point variations, is critical for the performance of all downstream tasks, including ear recognition. Here, the authors address this problem and present a framework for ear alignment that relies on a two-step procedure: (i) automatic landmark detection and (ii) fiducial point alignment. For the first (landmark detection) step, the authors implement and train a Two-Stack Hourglass model (2-SHGNet) capable of accurately predicting 55 landmarks on diverse ear images captured in uncontrolled conditions. For the second (alignment) step, the authors use the Random Sample Consensus (RANSAC) algorithm to align the estimated landmark/fiducial points with a pre-defined ear shape (i.e. a collection of average ear landmark positions). The authors evaluate the proposed framework in comprehensive experiments on the AWEx and ITWE datasets and show that the 2-SHGNet model leads to more accurate landmark predictions than competing state-of-the-art models from the literature. Furthermore, the authors also demonstrate that the alignment step significantly improves recognition accuracy with ear images from unconstrained environments compared to unaligned imagery.

耳朵图像已被证明是一种可靠的生物识别模式,具有良好的通用性、独特性、可测量性和持久性等特点。虽然大量的研究都是针对耳朵识别技术的,但在公开文献中,耳朵对齐的问题仍然没有得到充分的探索。尽管如此,耳朵图像的准确对齐,特别是在不受约束的采集场景中,由于姿势和视点的变化,耳朵的外观预计会有很大的变化,这对包括耳朵识别在内的所有下游任务的性能至关重要。在这里,作者解决了这个问题,并提出了一个耳朵对齐的框架,该框架依赖于两步程序:(i)自动地标检测和(ii)基准点对齐。对于第一步(界标检测),作者实现并训练了两层沙漏模型(2-SHGNet),该模型能够准确预测在非受控条件下拍摄的不同耳朵图像上的55个界标。对于第二步(对准),作者使用随机样本一致性(RANSAC)算法将估计的界标/基准点与预定义的耳朵形状(即平均耳朵界标位置的集合)对准。作者在AWEx和ITWE数据集上的综合实验中评估了所提出的框架,并表明2-SHGNet模型比文献中最先进的竞争模型更准确地进行了里程碑式预测。此外,作者还证明,与未对准的图像相比,对准步骤显著提高了来自无约束环境的耳朵图像的识别精度。
{"title":"Efficient ear alignment using a two-stack hourglass network","authors":"Anja Hrovatič,&nbsp;Peter Peer,&nbsp;Vitomir Štruc,&nbsp;Žiga Emeršič","doi":"10.1049/bme2.12109","DOIUrl":"https://doi.org/10.1049/bme2.12109","url":null,"abstract":"<p>Ear images have been shown to be a reliable modality for biometric recognition with desirable characteristics, such as high universality, distinctiveness, measurability and permanence. While a considerable amount of research has been directed towards ear recognition techniques, the problem of ear alignment is still under-explored in the open literature. Nonetheless, accurate alignment of ear images, especially in unconstrained acquisition scenarios, where the ear appearance is expected to vary widely due to pose and view point variations, is critical for the performance of all downstream tasks, including ear recognition. Here, the authors address this problem and present a framework for ear alignment that relies on a two-step procedure: (i) automatic landmark detection and (ii) fiducial point alignment. For the first (landmark detection) step, the authors implement and train a Two-Stack Hourglass model (2-SHGNet) capable of accurately predicting 55 landmarks on diverse ear images captured in uncontrolled conditions. For the second (alignment) step, the authors use the Random Sample Consensus (RANSAC) algorithm to align the estimated landmark/fiducial points with a pre-defined ear shape (i.e. a collection of average ear landmark positions). The authors evaluate the proposed framework in comprehensive experiments on the AWEx and ITWE datasets and show that the 2-SHGNet model leads to more accurate landmark predictions than competing state-of-the-art models from the literature. Furthermore, the authors also demonstrate that the alignment step significantly improves recognition accuracy with ear images from unconstrained environments compared to unaligned imagery.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"77-90"},"PeriodicalIF":2.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adversarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection 对抗性活体检测器:在指纹活体检测中利用对抗性扰动
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-03-10 DOI: 10.1049/bme2.12106
Antonio Galli, Michela Gravina, Stefano Marrone, Domenico Mattiello, Carlo Sansone

The widespread use of fingerprint authentication systems (FASs) in consumer electronics opens for the development of advanced presentation attacks, that is, procedures designed to bypass a FAS using a forged fingerprint. As a consequence, FAS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognise live fingerprints from fake replicas. In this work, a novel FPAD approach based on Convolutional Neural Networks (CNNs) and on an ad hoc adversarial data augmentation strategy designed to iteratively increase the considered detector robustness is proposed. In particular, the concept of adversarial fingerprint, that is, fake fingerprints disguised by using ad hoc fingerprint adversarial perturbation algorithms was leveraged to help the detector focus only on salient portions of the fingerprints. The procedure can be adapted to different CNNs, adversarial fingerprint algorithms and fingerprint scanners, making the proposed approach versatile and easily customisable todifferent working scenarios. To test the effectiveness of the proposed approach, the authors took part in the LivDet 2021 competition, an international challenge gathering experts to compete on fingerprint liveness detection under different scanners and fake replica generation approach, achieving first place out of 23 participants in the ‘Liveness Detection in Action track’.

指纹认证系统(FASs)在消费电子产品中的广泛使用为高级呈现攻击的发展打开了大门,即设计用于使用伪造指纹绕过指纹认证系统的程序。因此,FAS通常配备指纹呈现攻击检测(FPAD)模块,以从假复制品中识别活指纹。在这项工作中,提出了一种新的基于卷积神经网络(CNNs)和特设对抗性数据增强策略的FPAD方法,该策略旨在迭代地提高所考虑的检测器鲁棒性。特别是,对抗性指纹的概念,即通过使用特设指纹对抗性扰动算法伪装的假指纹,被用来帮助检测器只关注指纹的显著部分。该程序可适用于不同的细胞神经网络、对抗性指纹算法和指纹扫描仪,使所提出的方法具有通用性,并可轻松定制不同的工作场景。为了测试所提出方法的有效性,作者参加了LivDet 2021比赛,这是一项国际挑战赛,汇集了专家,在不同扫描仪和伪副本生成方法下进行指纹活体检测,在“活体检测行动轨迹”的23名参与者中获得第一名。
{"title":"Adversarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection","authors":"Antonio Galli,&nbsp;Michela Gravina,&nbsp;Stefano Marrone,&nbsp;Domenico Mattiello,&nbsp;Carlo Sansone","doi":"10.1049/bme2.12106","DOIUrl":"https://doi.org/10.1049/bme2.12106","url":null,"abstract":"<p>The widespread use of fingerprint authentication systems (FASs) in consumer electronics opens for the development of advanced presentation attacks, that is, procedures designed to bypass a FAS using a forged fingerprint. As a consequence, FAS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognise live fingerprints from fake replicas. In this work, a novel FPAD approach based on Convolutional Neural Networks (CNNs) and on an ad hoc adversarial data augmentation strategy designed to iteratively increase the considered detector robustness is proposed. In particular, the concept of adversarial fingerprint, that is, fake fingerprints disguised by using ad hoc fingerprint adversarial perturbation algorithms was leveraged to help the detector focus only on salient portions of the fingerprints. The procedure can be adapted to different CNNs, adversarial fingerprint algorithms and fingerprint scanners, making the proposed approach versatile and easily customisable todifferent working scenarios. To test the effectiveness of the proposed approach, the authors took part in the LivDet 2021 competition, an international challenge gathering experts to compete on fingerprint liveness detection under different scanners and fake replica generation approach, achieving first place out of 23 participants in the ‘Liveness Detection in Action track’.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"102-111"},"PeriodicalIF":2.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50127461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal feature-algorithm combination research for EEG fatigue driving detection based on functional brain network 基于功能脑网络的脑电疲劳驾驶检测优化特征算法组合研究
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-02-20 DOI: 10.1049/bme2.12108
Yi Zhou, ChangQing Zeng, ZhenDong Mu

With the increasing number of motor vehicles globally, the casualties and property losses caused by traffic accidents are substantial worldwide. Traffic accidents caused by fatigue driving are also increasing year by year. In this article, the authors propose a functional brain network-based driving fatigue detection method and seek to combine features and algorithms with optimal effect. First, a simulated driving experiment is established to obtain EEG signal data from multiple subjects in a long-term monotonic cognitive task. Second, the correlation between each EEG signal channel is calculated using Pearson correlation coefficient to construct a functional brain network. Then, five functional brain network features (clustering coefficient, node degree, eccentricity, local efficiency, and characteristic path length) are extracted and combined to obtain a total of 26 features and eight machine learning algorithms (SVM, LR, DT, RF, KNN, LDA, ADB, GBM) are used as classifiers for fatigue detection respectively. Finally, the optimal combination of features and algorithms are obtained. The results show that the feature combination of node degree, local efficiency, and characteristic path length achieves the best classification accuracy of 92.92% in the logistic regression algorithm.

随着全球机动车数量的不断增加,交通事故造成的人员伤亡和财产损失在全球范围内都是巨大的。疲劳驾驶引起的交通事故也在逐年增加。在这篇文章中,作者提出了一种基于功能大脑的驾驶疲劳检测方法,并寻求将特征和算法相结合,以达到最佳效果。首先,建立了一个模拟驾驶实验,在长期单调认知任务中获取多个受试者的脑电图信号数据。其次,利用Pearson相关系数计算每个脑电信号通道之间的相关性,构建功能性脑网络。然后,提取并组合5个功能性脑网络特征(聚类系数、节点度、偏心率、局部效率和特征路径长度),共获得26个特征,并分别使用8种机器学习算法(SVM、LR、DT、RF、KNN、LDA、ADB、GBM)作为疲劳检测的分类器。最后,得到了特征和算法的最优组合。结果表明,在逻辑回归算法中,节点度、局部效率和特征路径长度的特征组合达到了92.92%的最佳分类准确率。
{"title":"Optimal feature-algorithm combination research for EEG fatigue driving detection based on functional brain network","authors":"Yi Zhou,&nbsp;ChangQing Zeng,&nbsp;ZhenDong Mu","doi":"10.1049/bme2.12108","DOIUrl":"https://doi.org/10.1049/bme2.12108","url":null,"abstract":"<p>With the increasing number of motor vehicles globally, the casualties and property losses caused by traffic accidents are substantial worldwide. Traffic accidents caused by fatigue driving are also increasing year by year. In this article, the authors propose a functional brain network-based driving fatigue detection method and seek to combine features and algorithms with optimal effect. First, a simulated driving experiment is established to obtain EEG signal data from multiple subjects in a long-term monotonic cognitive task. Second, the correlation between each EEG signal channel is calculated using Pearson correlation coefficient to construct a functional brain network. Then, five functional brain network features (clustering coefficient, node degree, eccentricity, local efficiency, and characteristic path length) are extracted and combined to obtain a total of 26 features and eight machine learning algorithms (SVM, LR, DT, RF, KNN, LDA, ADB, GBM) are used as classifiers for fatigue detection respectively. Finally, the optimal combination of features and algorithms are obtained. The results show that the feature combination of node degree, local efficiency, and characteristic path length achieves the best classification accuracy of 92.92% in the logistic regression algorithm.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"65-76"},"PeriodicalIF":2.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Activity-based electrocardiogram biometric verification using wearable devices 使用可穿戴设备进行基于活动的心电图生物特征验证
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-12-16 DOI: 10.1049/bme2.12105
Hazal Su Bıçakcı, Marco Santopietro, Richard Guest

Activity classification and biometric authentication have become synonymous with wearable technologies such as smartwatches and trackers. Although great efforts have been made to develop electrocardiogram (ECG)-based biometric verification and identification modalities using data from these devices, in this paper, we explore the use of adaptive techniques based on prior activity classification in an attempt to enhance biometric performance. In doing so, we also compare two waveform similarity distances to provide features for classification. Two public datasets which were collected from medical and wearable devices provide a cross-device comparison. Our results show that our method is able to be used for both wearable and medical devices in activity classification and biometric verification cases. This study is the first study which uses only ECG signals for both activity classification and biometric verification purposes.

活动分类和生物识别认证已成为智能手表和追踪器等可穿戴技术的代名词。尽管已经做出了巨大的努力来开发基于心电图(ECG)的生物特征验证和识别模式,使用来自这些设备的数据,但在本文中,我们探索了使用基于先验活动分类的自适应技术,试图提高生物特征性能。在这样做的过程中,我们还比较了两个波形相似性距离,以提供用于分类的特征。从医疗和可穿戴设备收集的两个公共数据集提供了跨设备比较。我们的结果表明,我们的方法能够用于活动分类和生物特征验证案例中的可穿戴设备和医疗设备。这项研究是第一项仅使用心电图信号进行活动分类和生物特征验证的研究。
{"title":"Activity-based electrocardiogram biometric verification using wearable devices","authors":"Hazal Su Bıçakcı,&nbsp;Marco Santopietro,&nbsp;Richard Guest","doi":"10.1049/bme2.12105","DOIUrl":"https://doi.org/10.1049/bme2.12105","url":null,"abstract":"<p>Activity classification and biometric authentication have become synonymous with wearable technologies such as smartwatches and trackers. Although great efforts have been made to develop electrocardiogram (ECG)-based biometric verification and identification modalities using data from these devices, in this paper, we explore the use of adaptive techniques based on prior activity classification in an attempt to enhance biometric performance. In doing so, we also compare two waveform similarity distances to provide features for classification. Two public datasets which were collected from medical and wearable devices provide a cross-device comparison. Our results show that our method is able to be used for both wearable and medical devices in activity classification and biometric verification cases. This study is the first study which uses only ECG signals for both activity classification and biometric verification purposes.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 1","pages":"38-51"},"PeriodicalIF":2.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50143033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest editorial: Recent advances in representation learning for robust biometric recognition systems 鲁棒生物识别系统的表示学习研究进展
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-31 DOI: 10.1049/bme2.12104
Imad Rida, Gian Luca Marcialis, Lunke Fei, Dan Istrate, Julian Fierrez
<p>Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.</p><p>The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.</p><p>Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.</p><p>The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.</p><p>The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.</p><p>Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.</p><p>
在过去的几十年里,生物识别安全越来越成为增强安全的重要工具,并带来了更大的便利。如今,生物识别系统被政府机构和私营企业广泛使用。尽管为了开发能够在各种条件下运行的强大的生物识别系统已经投入了越来越多的努力,但许多问题仍然有待解决,包括处理不同照明源的技术设计,不受控制的采集条件导致的遮挡和低质量图像。任何生物特征识别系统的性能在很大程度上依赖于找到一个好的和合适的特征表示空间,满足平滑性、聚类、流形、稀疏性和时空相干性,其中来自不同类别的观察得到很好的分离。不幸的是,找到这种适当的表示是一个具有挑战性的问题,这在机器学习和计算机视觉社区引起了极大的兴趣。表征学习方法可以分为两大类:“类内”和“类间”。在第一组中,这些技术试图从原始数据本身中提取有用的信息。它们的范围很广,从基于人类对目标应用(SIFT,局部二值模式,HoG等)的知识的传统手工特征设计,到降维技术(PCA,线性判别分析,因子分析,等距映射,局部线性嵌入等)和特征选择(包装,滤波,嵌入),直到最近在许多应用中取得最先进性能的深度表示。“类间”技术试图找到不同数据观测之间的结构和关系。在这一组中,我们可以找到度量/核学习,研究不同示例之间的空间或时间关系,而子空间/流形学习技术寻求发现潜在的固有结构属性。本期特刊的目的是为世界各地的研究人员提供一个舞台,发表他们在鲁棒生物识别系统的表示学习方面的最新和原创成果。经过认真的同行评议和修改,本特刊共有八篇文章被接受发表。Li等人提出了一种基于加速kaze离散余弦变换(AKAZE-DCT)的水印算法,以解决图像水印算法对几何攻击鲁棒性差的问题。首先将AKAZE-DCT提取的特征与感知哈希相结合,然后对水印图像进行逻辑混沌位错加密,最后采用零水印技术对水印进行嵌入和提取。实验结果表明,该算法在常规攻击和几何攻击下均能有效提取水印,具有较好的鲁棒性和不可见性。Gong等人提出了一种新的基于深度学习的鲁棒零水印算法。事实上,他们设计了一个残差densenet,它采用了低频特征。该算法在水印生成阶段不修改原始图像,在水印提取阶段不需要原始图像。此外,该算法还适用于多个水印。实验结果表明,该算法在常规攻击和几何攻击下都具有良好的鲁棒性。Parashar和Shekhawat提出了一种可逆的步态匿名化管道,通过对图像进行变形来修改步态几何形状。修改后的数据可以防止黑客利用数据集进行对抗性攻击。研究结果为步态识别数据集的对抗性攻击和隐私保护开辟了新的研究方向。Li等人提出了一种基于线条特征局部三方向模式的掌纹识别方法。首先,提取掌纹图像的线特征,包括方向和幅度;然后,将方向特征编码为三方向模式。三向模式反映了局部区域的方向变化。最后,利用三方向特征、方向特征和幅度特征构造特征。在PolyU, PolyU多光谱,同济,CASIA和IITD掌纹数据库上的实验表明,该技术取得了良好的效果。Wu等人建立了一个握笔姿势(PHHP)图像数据集,这是迄今为止收集到的最大的基于视觉的PHHP数据集。介绍了一种由粗多特征学习网络和精细抓笔特征学习网络组成的粗到细PHHP识别网络。实验结果表明,与基线识别模型相比,该方法具有很好的PHHP识别性能。Aguiar de Lima等人。 研究了语言对说话人识别系统的影响,以及语音对系统性能的影响。实验使用了三种广泛使用的语言:葡萄牙语、英语和汉语。Sun等人提出了一种基于卷积神经网络的新型分类算法,以提高乳房x光检查对乳腺癌的诊断性能。实验结果表明,本文提出的算法大大提高了乳腺肿块的分类性能和诊断速度,对乳腺癌诊断具有重要意义。Parashar等人提出了一种基于姿态特征的方法,尝试对穿着大衣、携带物品或其他协变量的人进行步态识别。它旨在使用卷积神经网络来估计人类的运动。实验显示出很有希望的结果。
{"title":"Guest editorial: Recent advances in representation learning for robust biometric recognition systems","authors":"Imad Rida,&nbsp;Gian Luca Marcialis,&nbsp;Lunke Fei,&nbsp;Dan Istrate,&nbsp;Julian Fierrez","doi":"10.1049/bme2.12104","DOIUrl":"10.1049/bme2.12104","url":null,"abstract":"&lt;p&gt;Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.&lt;/p&gt;&lt;p&gt;The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.&lt;/p&gt;&lt;p&gt;Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.&lt;/p&gt;&lt;p&gt;The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.&lt;/p&gt;&lt;p&gt;The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.&lt;/p&gt;&lt;p&gt;Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.&lt;/p&gt;&lt;p&gt;","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"531-533"},"PeriodicalIF":2.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48958342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust covariate-invariant gait recognition based on pose features 基于姿态特征的鲁棒协变量不变步态识别
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-20 DOI: 10.1049/bme2.12103
Anubha Parashar, Apoorva Parashar, Rajveer Singh Shekhawat

Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.

步态识别是利用计算机视觉方法对人体步态视频进行处理,根据行走方式对人进行识别。协变量带来的复杂性使得以前的方法效率较低且不准确。本研究提出了一种基于姿态特征的方法来尝试对穿着大衣、携带物品或其他协变量的人进行步态识别。它旨在使用卷积神经网络来估计人类的运动。采集视频数据,按特定顺序提取视频帧,对每帧进行姿态估计,利用多层RNN从姿态进行步态识别,获得一维目标向量,这些都是关键步骤。此外,这些一维识别向量与视频中行走的人的名字一起存储在数据集中。利用该数据集训练分类模型预测新视频中的人物,首先对其进行处理,得到识别向量,然后将其作为分类模型中的测试用例。还开发了图形用户界面,以便任何没有编程或技术经验的人都可以轻松使用该工具。开发的应用程序通过获取识别向量并将其保存到数据集中来完成mp4视频的步态检测。使用这个应用程序,人们可以快速识别视频中行走的人。所得结果的准确度在60.88% ~ 95.23%之间。
{"title":"A robust covariate-invariant gait recognition based on pose features","authors":"Anubha Parashar,&nbsp;Apoorva Parashar,&nbsp;Rajveer Singh Shekhawat","doi":"10.1049/bme2.12103","DOIUrl":"10.1049/bme2.12103","url":null,"abstract":"<p>Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"601-613"},"PeriodicalIF":2.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77215002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics BIOSIG 2021高效、可靠、隐私友好型生物识别技术特刊
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-14 DOI: 10.1049/bme2.12101
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo
本期IET生物识别特刊“BIOSIG 2021高效、可靠和隐私友好型生物识别特刊”以2021年版生物识别特别兴趣小组(BIOSIG)会议为起点。本期特刊收集了有关生物识别的研究成果,从新的角度探讨了生物识别系统和方法的效率、可靠性和隐私性。“BIOSIG 2021高效、可靠和隐私友好型生物识别技术特刊”包含12篇论文,其中几篇是BIOSIG 2021会议上发表的论文的扩展版本,涉及生物识别技术的具体研究领域,如面部和虹膜的呈现攻击检测,生物识别模板保护方案和生物识别的深度学习技术。论文“人脸变形攻击与人脸图像质量:变形的影响和攻击的质量可检测性”由傅碧颖和Naser Damer撰写。本文讨论了与真实样本相比,变形过程对感知图像质量和图像在人脸识别(FR)中的效用的影响。这项工作提供了变形对人脸图像质量的影响的广泛分析,包括一般图像质量测量和人脸图像效用测量,分析了六种不同的变形技术和五种不同的数据源,使用10种不同的质量测量。变形攻击的质量分数与某些质量度量测量的真实样本之间具有一致的可分离性,这支持了基于质量分数进行无监督变形攻击检测(MAD)的提议。该研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。结果表明,MagFace和CNNNIQA等一组质量度量可以用于无监督的广义MAD,正确分类准确率超过70%。论文“基于像素的ID卡表示攻击检测监督”由Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra和Naser Damer撰写。本文解决了假身份证的检测问题,这些假身份证被打印出来,然后在无监督的环境中以数字方式呈现,用于生物识别认证目的。作者提出了一种基于像素监督的方法,使用DenseNet来利用各种人工制品上的微小线索,如波纹图案和打印机留下的人工制品。为了测试提议的系统,从一个操作系统中获得了一个新的数据库,该数据库由886个用户组成,其中有433次真实攻击,67次打印攻击和366次显示攻击(由于GPDR法规而未公开)。与手工特征和深度学习模型相比,该方法具有更好的性能,相等错误率(EER)为2.22%,真实表示分类错误率(BPCER)为1.83%和1.67%;攻击表示分类错误率(APCER)分别为5%和10%。论文“Deep Patch-Wise Supervision for Presentation Attack Detection”由Alperen kantarci, Hasan Dertli和Hazım Ekenel撰写。本文研究了人脸表示攻击检测(PAD)中的泛化问题。具体来说,基于卷积神经网络(CNN)的系统由于其在数据集内实验中的高性能,最近获得了显著的普及。然而,这些系统往往不能泛化到他们没有训练过的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种新的表示攻击检测(PAD)方法,该方法将逐像素二进制监督与基于补丁的CNN相结合。实验表明,基于补丁的方法使模型不需要记忆背景信息或特定于数据集的轨迹。该方法在广泛使用的PAD数据集(replay - mobile, OULU-NPU)和为真实PAD用例收集的真实数据集上进行了测试。结果表明,该方法在具有挑战性的实验设置中具有优越性。也就是说,它在OULU-NPU协议3,4和数据集间真实世界实验中取得了更高的性能。Zohra Rezgui, Amina Bassit和Raymond Veldhuis撰写的论文“性别分类对抗性攻击到人脸识别的可转移性分析:固定和可变攻击扰动”。本文主要研究对抗性攻击的可转移性问题。 这项工作的动机是,在文献中证明了这些针对特定模型的攻击在执行相同任务的模型之间是可转移的,然而,对于执行不同任务但共享相同输入空间和模型架构的模型,文献中没有考虑可转移性场景。在本文中,作者研究了基于vgg16和基于resnet50的生物识别分类器的上述挑战。研究了两种白盒攻击对性别分类器的影响,然后采用特征引导去噪方法评估了它们对防御方法的鲁棒性。一旦确定了这些攻击在欺骗性别分类器方面的有效性,我们就以黑盒方式测试了它们从性别分类任务到具有类似架构的面部识别任务的可转移性。采用了两种验证比较设置,其中作者比较了扰动大小相同和不同的图像。研究结果表明,在固定扰动条件下,快速梯度符号法(FGSM)攻击具有可转移性,在投影梯度下降法(PGD)攻击条件下具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。论文“结合二维纹理和三维几何特征进行可靠的虹膜呈现攻击检测,使用光场焦点堆栈”由罗正全,王云龙,刘年峰,王子磊撰写。在本文中,作者利用光场(LF)成像和深度学习(DL)的优点,将二维纹理和三维几何特征结合起来进行虹膜呈现攻击检测(PAD)。提出的研究探索了在渲染焦点堆栈上面向平面和面向序列的深度神经网络(dnn)的现成深度特征。该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在三维几何结构和二维空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。结果表明,所提出的框架的变体明显超过了以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至是最近在所采用的数据库上进行微调的最先进的方法。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。论文“混合生物识别模板保护:解决布隆过滤器和同态加密之间选择的痛苦”由Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis和Andreas Peter撰写。本文讨论了生物特征模板保护(BTP)方案的发展,研究了布隆过滤器(BFs)和同态加密(HE)的优缺点。本文指出,基于bf和he的BTPs的优缺点在文献中没有得到很好的研究,从理论角度来看,这两种方法似乎都很有希望。因此,本文从理论角度对现有的基于bf的BTPs和基于he的BTPs进行了比较研究,考察了它们的优缺点。将这种比较应用于虹膜识别作为研究案例,在相同的设置、数据集和实现语言上测试了BTP方法的生物特征和运行时性能。作为本研究的综合,作者提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不可链接性和较高的识别精度,同时比传统的基于HE的方法快7倍左右。对该方案的评估证实了其生物识别精度(IITD虹膜数据库的EER为0:17%)和运行效率(128、192和256位安全级别分别为104:35 ms、155:15 ms和171:70 ms)。论文“Locality Preserving Binary Face Representations Using Auto-encoders”由Mohamed Amine HMANI, Dijana petrovska - delacr<s:1> taz和
{"title":"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Naser Damer,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":"10.1049/bme2.12101","url":null,"abstract":"&lt;p&gt;This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.&lt;/p&gt;&lt;p&gt;The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as &lt;b&gt;Presentation Attack Detection for Face and Iris&lt;/b&gt;, &lt;b&gt;Biometric Template Protection Schemes&lt;/b&gt; and &lt;b&gt;Deep Learning techniques for Biometrics&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.&lt;/p&gt;&lt;p&gt;Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"355-358"},"PeriodicalIF":2.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87752844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"https://doi.org/10.1049/bme2.12102","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"31 1","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86037260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.

随着互联网技术领域的不断进步和发展,医学图像处理领域也随之发展起来。特别是数字水印技术在医学图像处理领域发挥着至关重要的作用,极大地提高了医学图像信息的安全性。针对医学图像水印算法对几何攻击鲁棒性差导致医学图像信息安全性低的问题,提出了一种基于加速kaze离散余弦变换(AKAZE-DCT)的医学图像水印算法。首先利用AKAZE-DCT算法提取医学图像的特征向量,然后结合感知哈希技术得到医学图像的特征序列;然后对水印图像进行逻辑混沌错位加密,得到加密后的水印图像,保证了水印信息的安全性;最后,采用零水印技术对水印进行嵌入和提取。实验结果表明,该算法在常规攻击和几何攻击下均能有效提取水印,具有较好的鲁棒性和不可见性,与其他算法相比,在医学领域具有一定的实用性。
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li,&nbsp;Yen-wei Chen,&nbsp;Jingbing Li,&nbsp;Lei Cao,&nbsp;Uzair Aslam Bhatti,&nbsp;Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"10.1049/bme2.12102","url":null,"abstract":"<p>With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118745131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1