Guanci Yang, Siyuan Yang, Kexin Luo, Shangen Lan, Ling He, Yang Li
Non-suicide self-injury (NSSI) can be dangerous and difficult for guardians or caregivers to detect in time. NSSI refers to when people hurt themselves even though they have no wish to cause critical or long-lasting hurt. To timely identify and effectively prevent NSSI in order to reduce the suicide rates of patients with a potential suicide risk, the detection of NSSI based on the spatiotemporal features of indoor activities is proposed. Firstly, an NSSI behaviour dataset is provided, and it includes four categories that can be used for scientific research on NSSI evaluation. Secondly, an NSSI detection algorithm based on the spatiotemporal features of indoor activities (NssiDetection) is proposed. NssiDetection calculates the human bounding box by using an object detection model and employs a behaviour detection model to extract the temporal and spatial features of NSSI behaviour. Thirdly, the optimal combination schemes of NssiDetection is investigated by checking its performance with different behaviour detection methods and training strategies. Lastly, a case study is performed by implementing an NSSI behaviour detection prototype system. The prototype system has a recognition accuracy of 84.18% for NSSI actions with new backgrounds, persons, or camera angles.
{"title":"Detection of non-suicidal self-injury based on spatiotemporal features of indoor activities","authors":"Guanci Yang, Siyuan Yang, Kexin Luo, Shangen Lan, Ling He, Yang Li","doi":"10.1049/bme2.12110","DOIUrl":"https://doi.org/10.1049/bme2.12110","url":null,"abstract":"<p>Non-suicide self-injury (NSSI) can be dangerous and difficult for guardians or caregivers to detect in time. NSSI refers to when people hurt themselves even though they have no wish to cause critical or long-lasting hurt. To timely identify and effectively prevent NSSI in order to reduce the suicide rates of patients with a potential suicide risk, the detection of NSSI based on the spatiotemporal features of indoor activities is proposed. Firstly, an NSSI behaviour dataset is provided, and it includes four categories that can be used for scientific research on NSSI evaluation. Secondly, an NSSI detection algorithm based on the spatiotemporal features of indoor activities (NssiDetection) is proposed. NssiDetection calculates the human bounding box by using an object detection model and employs a behaviour detection model to extract the temporal and spatial features of NSSI behaviour. Thirdly, the optimal combination schemes of NssiDetection is investigated by checking its performance with different behaviour detection methods and training strategies. Lastly, a case study is performed by implementing an NSSI behaviour detection prototype system. The prototype system has a recognition accuracy of 84.18% for NSSI actions with new backgrounds, persons, or camera angles.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"91-101"},"PeriodicalIF":2.0,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anja Hrovatič, Peter Peer, Vitomir Štruc, Žiga Emeršič
Ear images have been shown to be a reliable modality for biometric recognition with desirable characteristics, such as high universality, distinctiveness, measurability and permanence. While a considerable amount of research has been directed towards ear recognition techniques, the problem of ear alignment is still under-explored in the open literature. Nonetheless, accurate alignment of ear images, especially in unconstrained acquisition scenarios, where the ear appearance is expected to vary widely due to pose and view point variations, is critical for the performance of all downstream tasks, including ear recognition. Here, the authors address this problem and present a framework for ear alignment that relies on a two-step procedure: (i) automatic landmark detection and (ii) fiducial point alignment. For the first (landmark detection) step, the authors implement and train a Two-Stack Hourglass model (2-SHGNet) capable of accurately predicting 55 landmarks on diverse ear images captured in uncontrolled conditions. For the second (alignment) step, the authors use the Random Sample Consensus (RANSAC) algorithm to align the estimated landmark/fiducial points with a pre-defined ear shape (i.e. a collection of average ear landmark positions). The authors evaluate the proposed framework in comprehensive experiments on the AWEx and ITWE datasets and show that the 2-SHGNet model leads to more accurate landmark predictions than competing state-of-the-art models from the literature. Furthermore, the authors also demonstrate that the alignment step significantly improves recognition accuracy with ear images from unconstrained environments compared to unaligned imagery.
{"title":"Efficient ear alignment using a two-stack hourglass network","authors":"Anja Hrovatič, Peter Peer, Vitomir Štruc, Žiga Emeršič","doi":"10.1049/bme2.12109","DOIUrl":"https://doi.org/10.1049/bme2.12109","url":null,"abstract":"<p>Ear images have been shown to be a reliable modality for biometric recognition with desirable characteristics, such as high universality, distinctiveness, measurability and permanence. While a considerable amount of research has been directed towards ear recognition techniques, the problem of ear alignment is still under-explored in the open literature. Nonetheless, accurate alignment of ear images, especially in unconstrained acquisition scenarios, where the ear appearance is expected to vary widely due to pose and view point variations, is critical for the performance of all downstream tasks, including ear recognition. Here, the authors address this problem and present a framework for ear alignment that relies on a two-step procedure: (i) automatic landmark detection and (ii) fiducial point alignment. For the first (landmark detection) step, the authors implement and train a Two-Stack Hourglass model (2-SHGNet) capable of accurately predicting 55 landmarks on diverse ear images captured in uncontrolled conditions. For the second (alignment) step, the authors use the Random Sample Consensus (RANSAC) algorithm to align the estimated landmark/fiducial points with a pre-defined ear shape (i.e. a collection of average ear landmark positions). The authors evaluate the proposed framework in comprehensive experiments on the AWEx and ITWE datasets and show that the 2-SHGNet model leads to more accurate landmark predictions than competing state-of-the-art models from the literature. Furthermore, the authors also demonstrate that the alignment step significantly improves recognition accuracy with ear images from unconstrained environments compared to unaligned imagery.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"77-90"},"PeriodicalIF":2.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Galli, Michela Gravina, Stefano Marrone, Domenico Mattiello, Carlo Sansone
The widespread use of fingerprint authentication systems (FASs) in consumer electronics opens for the development of advanced presentation attacks, that is, procedures designed to bypass a FAS using a forged fingerprint. As a consequence, FAS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognise live fingerprints from fake replicas. In this work, a novel FPAD approach based on Convolutional Neural Networks (CNNs) and on an ad hoc adversarial data augmentation strategy designed to iteratively increase the considered detector robustness is proposed. In particular, the concept of adversarial fingerprint, that is, fake fingerprints disguised by using ad hoc fingerprint adversarial perturbation algorithms was leveraged to help the detector focus only on salient portions of the fingerprints. The procedure can be adapted to different CNNs, adversarial fingerprint algorithms and fingerprint scanners, making the proposed approach versatile and easily customisable todifferent working scenarios. To test the effectiveness of the proposed approach, the authors took part in the LivDet 2021 competition, an international challenge gathering experts to compete on fingerprint liveness detection under different scanners and fake replica generation approach, achieving first place out of 23 participants in the ‘Liveness Detection in Action track’.
{"title":"Adversarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection","authors":"Antonio Galli, Michela Gravina, Stefano Marrone, Domenico Mattiello, Carlo Sansone","doi":"10.1049/bme2.12106","DOIUrl":"https://doi.org/10.1049/bme2.12106","url":null,"abstract":"<p>The widespread use of fingerprint authentication systems (FASs) in consumer electronics opens for the development of advanced presentation attacks, that is, procedures designed to bypass a FAS using a forged fingerprint. As a consequence, FAS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognise live fingerprints from fake replicas. In this work, a novel FPAD approach based on Convolutional Neural Networks (CNNs) and on an ad hoc adversarial data augmentation strategy designed to iteratively increase the considered detector robustness is proposed. In particular, the concept of adversarial fingerprint, that is, fake fingerprints disguised by using ad hoc fingerprint adversarial perturbation algorithms was leveraged to help the detector focus only on salient portions of the fingerprints. The procedure can be adapted to different CNNs, adversarial fingerprint algorithms and fingerprint scanners, making the proposed approach versatile and easily customisable todifferent working scenarios. To test the effectiveness of the proposed approach, the authors took part in the LivDet 2021 competition, an international challenge gathering experts to compete on fingerprint liveness detection under different scanners and fake replica generation approach, achieving first place out of 23 participants in the ‘Liveness Detection in Action track’.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"102-111"},"PeriodicalIF":2.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50127461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing number of motor vehicles globally, the casualties and property losses caused by traffic accidents are substantial worldwide. Traffic accidents caused by fatigue driving are also increasing year by year. In this article, the authors propose a functional brain network-based driving fatigue detection method and seek to combine features and algorithms with optimal effect. First, a simulated driving experiment is established to obtain EEG signal data from multiple subjects in a long-term monotonic cognitive task. Second, the correlation between each EEG signal channel is calculated using Pearson correlation coefficient to construct a functional brain network. Then, five functional brain network features (clustering coefficient, node degree, eccentricity, local efficiency, and characteristic path length) are extracted and combined to obtain a total of 26 features and eight machine learning algorithms (SVM, LR, DT, RF, KNN, LDA, ADB, GBM) are used as classifiers for fatigue detection respectively. Finally, the optimal combination of features and algorithms are obtained. The results show that the feature combination of node degree, local efficiency, and characteristic path length achieves the best classification accuracy of 92.92% in the logistic regression algorithm.
{"title":"Optimal feature-algorithm combination research for EEG fatigue driving detection based on functional brain network","authors":"Yi Zhou, ChangQing Zeng, ZhenDong Mu","doi":"10.1049/bme2.12108","DOIUrl":"https://doi.org/10.1049/bme2.12108","url":null,"abstract":"<p>With the increasing number of motor vehicles globally, the casualties and property losses caused by traffic accidents are substantial worldwide. Traffic accidents caused by fatigue driving are also increasing year by year. In this article, the authors propose a functional brain network-based driving fatigue detection method and seek to combine features and algorithms with optimal effect. First, a simulated driving experiment is established to obtain EEG signal data from multiple subjects in a long-term monotonic cognitive task. Second, the correlation between each EEG signal channel is calculated using Pearson correlation coefficient to construct a functional brain network. Then, five functional brain network features (clustering coefficient, node degree, eccentricity, local efficiency, and characteristic path length) are extracted and combined to obtain a total of 26 features and eight machine learning algorithms (SVM, LR, DT, RF, KNN, LDA, ADB, GBM) are used as classifiers for fatigue detection respectively. Finally, the optimal combination of features and algorithms are obtained. The results show that the feature combination of node degree, local efficiency, and characteristic path length achieves the best classification accuracy of 92.92% in the logistic regression algorithm.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 2","pages":"65-76"},"PeriodicalIF":2.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hazal Su Bıçakcı, Marco Santopietro, Richard Guest
Activity classification and biometric authentication have become synonymous with wearable technologies such as smartwatches and trackers. Although great efforts have been made to develop electrocardiogram (ECG)-based biometric verification and identification modalities using data from these devices, in this paper, we explore the use of adaptive techniques based on prior activity classification in an attempt to enhance biometric performance. In doing so, we also compare two waveform similarity distances to provide features for classification. Two public datasets which were collected from medical and wearable devices provide a cross-device comparison. Our results show that our method is able to be used for both wearable and medical devices in activity classification and biometric verification cases. This study is the first study which uses only ECG signals for both activity classification and biometric verification purposes.
{"title":"Activity-based electrocardiogram biometric verification using wearable devices","authors":"Hazal Su Bıçakcı, Marco Santopietro, Richard Guest","doi":"10.1049/bme2.12105","DOIUrl":"https://doi.org/10.1049/bme2.12105","url":null,"abstract":"<p>Activity classification and biometric authentication have become synonymous with wearable technologies such as smartwatches and trackers. Although great efforts have been made to develop electrocardiogram (ECG)-based biometric verification and identification modalities using data from these devices, in this paper, we explore the use of adaptive techniques based on prior activity classification in an attempt to enhance biometric performance. In doing so, we also compare two waveform similarity distances to provide features for classification. Two public datasets which were collected from medical and wearable devices provide a cross-device comparison. Our results show that our method is able to be used for both wearable and medical devices in activity classification and biometric verification cases. This study is the first study which uses only ECG signals for both activity classification and biometric verification purposes.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 1","pages":"38-51"},"PeriodicalIF":2.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50143033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imad Rida, Gian Luca Marcialis, Lunke Fei, Dan Istrate, Julian Fierrez
<p>Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.</p><p>The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.</p><p>Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.</p><p>The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.</p><p>The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.</p><p>Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.</p><p>
在过去的几十年里,生物识别安全越来越成为增强安全的重要工具,并带来了更大的便利。如今,生物识别系统被政府机构和私营企业广泛使用。尽管为了开发能够在各种条件下运行的强大的生物识别系统已经投入了越来越多的努力,但许多问题仍然有待解决,包括处理不同照明源的技术设计,不受控制的采集条件导致的遮挡和低质量图像。任何生物特征识别系统的性能在很大程度上依赖于找到一个好的和合适的特征表示空间,满足平滑性、聚类、流形、稀疏性和时空相干性,其中来自不同类别的观察得到很好的分离。不幸的是,找到这种适当的表示是一个具有挑战性的问题,这在机器学习和计算机视觉社区引起了极大的兴趣。表征学习方法可以分为两大类:“类内”和“类间”。在第一组中,这些技术试图从原始数据本身中提取有用的信息。它们的范围很广,从基于人类对目标应用(SIFT,局部二值模式,HoG等)的知识的传统手工特征设计,到降维技术(PCA,线性判别分析,因子分析,等距映射,局部线性嵌入等)和特征选择(包装,滤波,嵌入),直到最近在许多应用中取得最先进性能的深度表示。“类间”技术试图找到不同数据观测之间的结构和关系。在这一组中,我们可以找到度量/核学习,研究不同示例之间的空间或时间关系,而子空间/流形学习技术寻求发现潜在的固有结构属性。本期特刊的目的是为世界各地的研究人员提供一个舞台,发表他们在鲁棒生物识别系统的表示学习方面的最新和原创成果。经过认真的同行评议和修改,本特刊共有八篇文章被接受发表。Li等人提出了一种基于加速kaze离散余弦变换(AKAZE-DCT)的水印算法,以解决图像水印算法对几何攻击鲁棒性差的问题。首先将AKAZE-DCT提取的特征与感知哈希相结合,然后对水印图像进行逻辑混沌位错加密,最后采用零水印技术对水印进行嵌入和提取。实验结果表明,该算法在常规攻击和几何攻击下均能有效提取水印,具有较好的鲁棒性和不可见性。Gong等人提出了一种新的基于深度学习的鲁棒零水印算法。事实上,他们设计了一个残差densenet,它采用了低频特征。该算法在水印生成阶段不修改原始图像,在水印提取阶段不需要原始图像。此外,该算法还适用于多个水印。实验结果表明,该算法在常规攻击和几何攻击下都具有良好的鲁棒性。Parashar和Shekhawat提出了一种可逆的步态匿名化管道,通过对图像进行变形来修改步态几何形状。修改后的数据可以防止黑客利用数据集进行对抗性攻击。研究结果为步态识别数据集的对抗性攻击和隐私保护开辟了新的研究方向。Li等人提出了一种基于线条特征局部三方向模式的掌纹识别方法。首先,提取掌纹图像的线特征,包括方向和幅度;然后,将方向特征编码为三方向模式。三向模式反映了局部区域的方向变化。最后,利用三方向特征、方向特征和幅度特征构造特征。在PolyU, PolyU多光谱,同济,CASIA和IITD掌纹数据库上的实验表明,该技术取得了良好的效果。Wu等人建立了一个握笔姿势(PHHP)图像数据集,这是迄今为止收集到的最大的基于视觉的PHHP数据集。介绍了一种由粗多特征学习网络和精细抓笔特征学习网络组成的粗到细PHHP识别网络。实验结果表明,与基线识别模型相比,该方法具有很好的PHHP识别性能。Aguiar de Lima等人。 研究了语言对说话人识别系统的影响,以及语音对系统性能的影响。实验使用了三种广泛使用的语言:葡萄牙语、英语和汉语。Sun等人提出了一种基于卷积神经网络的新型分类算法,以提高乳房x光检查对乳腺癌的诊断性能。实验结果表明,本文提出的算法大大提高了乳腺肿块的分类性能和诊断速度,对乳腺癌诊断具有重要意义。Parashar等人提出了一种基于姿态特征的方法,尝试对穿着大衣、携带物品或其他协变量的人进行步态识别。它旨在使用卷积神经网络来估计人类的运动。实验显示出很有希望的结果。
{"title":"Guest editorial: Recent advances in representation learning for robust biometric recognition systems","authors":"Imad Rida, Gian Luca Marcialis, Lunke Fei, Dan Istrate, Julian Fierrez","doi":"10.1049/bme2.12104","DOIUrl":"10.1049/bme2.12104","url":null,"abstract":"<p>Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.</p><p>The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.</p><p>Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.</p><p>The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.</p><p>The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.</p><p>Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.</p><p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"531-533"},"PeriodicalIF":2.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48958342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.
{"title":"A robust covariate-invariant gait recognition based on pose features","authors":"Anubha Parashar, Apoorva Parashar, Rajveer Singh Shekhawat","doi":"10.1049/bme2.12103","DOIUrl":"10.1049/bme2.12103","url":null,"abstract":"<p>Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"601-613"},"PeriodicalIF":2.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77215002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo
本期IET生物识别特刊“BIOSIG 2021高效、可靠和隐私友好型生物识别特刊”以2021年版生物识别特别兴趣小组(BIOSIG)会议为起点。本期特刊收集了有关生物识别的研究成果,从新的角度探讨了生物识别系统和方法的效率、可靠性和隐私性。“BIOSIG 2021高效、可靠和隐私友好型生物识别技术特刊”包含12篇论文,其中几篇是BIOSIG 2021会议上发表的论文的扩展版本,涉及生物识别技术的具体研究领域,如面部和虹膜的呈现攻击检测,生物识别模板保护方案和生物识别的深度学习技术。论文“人脸变形攻击与人脸图像质量:变形的影响和攻击的质量可检测性”由傅碧颖和Naser Damer撰写。本文讨论了与真实样本相比,变形过程对感知图像质量和图像在人脸识别(FR)中的效用的影响。这项工作提供了变形对人脸图像质量的影响的广泛分析,包括一般图像质量测量和人脸图像效用测量,分析了六种不同的变形技术和五种不同的数据源,使用10种不同的质量测量。变形攻击的质量分数与某些质量度量测量的真实样本之间具有一致的可分离性,这支持了基于质量分数进行无监督变形攻击检测(MAD)的提议。该研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。结果表明,MagFace和CNNNIQA等一组质量度量可以用于无监督的广义MAD,正确分类准确率超过70%。论文“基于像素的ID卡表示攻击检测监督”由Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra和Naser Damer撰写。本文解决了假身份证的检测问题,这些假身份证被打印出来,然后在无监督的环境中以数字方式呈现,用于生物识别认证目的。作者提出了一种基于像素监督的方法,使用DenseNet来利用各种人工制品上的微小线索,如波纹图案和打印机留下的人工制品。为了测试提议的系统,从一个操作系统中获得了一个新的数据库,该数据库由886个用户组成,其中有433次真实攻击,67次打印攻击和366次显示攻击(由于GPDR法规而未公开)。与手工特征和深度学习模型相比,该方法具有更好的性能,相等错误率(EER)为2.22%,真实表示分类错误率(BPCER)为1.83%和1.67%;攻击表示分类错误率(APCER)分别为5%和10%。论文“Deep Patch-Wise Supervision for Presentation Attack Detection”由Alperen kantarci, Hasan Dertli和Hazım Ekenel撰写。本文研究了人脸表示攻击检测(PAD)中的泛化问题。具体来说,基于卷积神经网络(CNN)的系统由于其在数据集内实验中的高性能,最近获得了显著的普及。然而,这些系统往往不能泛化到他们没有训练过的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种新的表示攻击检测(PAD)方法,该方法将逐像素二进制监督与基于补丁的CNN相结合。实验表明,基于补丁的方法使模型不需要记忆背景信息或特定于数据集的轨迹。该方法在广泛使用的PAD数据集(replay - mobile, OULU-NPU)和为真实PAD用例收集的真实数据集上进行了测试。结果表明,该方法在具有挑战性的实验设置中具有优越性。也就是说,它在OULU-NPU协议3,4和数据集间真实世界实验中取得了更高的性能。Zohra Rezgui, Amina Bassit和Raymond Veldhuis撰写的论文“性别分类对抗性攻击到人脸识别的可转移性分析:固定和可变攻击扰动”。本文主要研究对抗性攻击的可转移性问题。 这项工作的动机是,在文献中证明了这些针对特定模型的攻击在执行相同任务的模型之间是可转移的,然而,对于执行不同任务但共享相同输入空间和模型架构的模型,文献中没有考虑可转移性场景。在本文中,作者研究了基于vgg16和基于resnet50的生物识别分类器的上述挑战。研究了两种白盒攻击对性别分类器的影响,然后采用特征引导去噪方法评估了它们对防御方法的鲁棒性。一旦确定了这些攻击在欺骗性别分类器方面的有效性,我们就以黑盒方式测试了它们从性别分类任务到具有类似架构的面部识别任务的可转移性。采用了两种验证比较设置,其中作者比较了扰动大小相同和不同的图像。研究结果表明,在固定扰动条件下,快速梯度符号法(FGSM)攻击具有可转移性,在投影梯度下降法(PGD)攻击条件下具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。论文“结合二维纹理和三维几何特征进行可靠的虹膜呈现攻击检测,使用光场焦点堆栈”由罗正全,王云龙,刘年峰,王子磊撰写。在本文中,作者利用光场(LF)成像和深度学习(DL)的优点,将二维纹理和三维几何特征结合起来进行虹膜呈现攻击检测(PAD)。提出的研究探索了在渲染焦点堆栈上面向平面和面向序列的深度神经网络(dnn)的现成深度特征。该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在三维几何结构和二维空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。结果表明,所提出的框架的变体明显超过了以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至是最近在所采用的数据库上进行微调的最先进的方法。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。论文“混合生物识别模板保护:解决布隆过滤器和同态加密之间选择的痛苦”由Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis和Andreas Peter撰写。本文讨论了生物特征模板保护(BTP)方案的发展,研究了布隆过滤器(BFs)和同态加密(HE)的优缺点。本文指出,基于bf和he的BTPs的优缺点在文献中没有得到很好的研究,从理论角度来看,这两种方法似乎都很有希望。因此,本文从理论角度对现有的基于bf的BTPs和基于he的BTPs进行了比较研究,考察了它们的优缺点。将这种比较应用于虹膜识别作为研究案例,在相同的设置、数据集和实现语言上测试了BTP方法的生物特征和运行时性能。作为本研究的综合,作者提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不可链接性和较高的识别精度,同时比传统的基于HE的方法快7倍左右。对该方案的评估证实了其生物识别精度(IITD虹膜数据库的EER为0:17%)和运行效率(128、192和256位安全级别分别为104:35 ms、155:15 ms和171:70 ms)。论文“Locality Preserving Binary Face Representations Using Auto-encoders”由Mohamed Amine HMANI, Dijana petrovska - delacr<s:1> taz和
{"title":"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics","authors":"Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":"10.1049/bme2.12101","url":null,"abstract":"<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"355-358"},"PeriodicalIF":2.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87752844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"https://doi.org/10.1049/bme2.12102","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"31 1","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86037260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"10.1049/bme2.12102","url":null,"abstract":"<p>With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118745131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}