首页 > 最新文献

IET Biometrics最新文献

英文 中文
Locality preserving binary face representations using auto-encoders 使用自编码器保持局部性的二进制面表示
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-10-10 DOI: 10.1049/bme2.12096
Mohamed Amine Hmani, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi

Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.

密码生物识别方案,如模糊承诺,需要二进制源。介绍了一种将深度神经网络应用于面部生物特征数据二值化的新方法。在MOBIO和Wild数据库中的labeled Faces上评估二元表示,并测量其生物特征识别性能和熵。与基线相比,所提出的二进制嵌入在两个数据库上都提供了最先进的性能,几乎可以忽略不计。表示的长度可以被控制。使用预训练的卷积神经网络,并在ms - celebrity - 1m数据库的清洗版本上训练模型,得到了长度为4096位和熵为3300位的二进制表示。提取的表征具有高熵和足够长的时间,可以用于加密生物识别系统,如模糊承诺。此外,所提出的方法是数据驱动的,并构成了可用于数据聚类和相似性搜索的局部保留散列。作为二进制表示的一个用例,基于二进制嵌入使用随机化键作为第二个因素的洗牌变换来创建一个可取消的系统。
{"title":"Locality preserving binary face representations using auto-encoders","authors":"Mohamed Amine Hmani,&nbsp;Dijana Petrovska-Delacrétaz,&nbsp;Bernadette Dorizzi","doi":"10.1049/bme2.12096","DOIUrl":"10.1049/bme2.12096","url":null,"abstract":"<p>Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76420898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication 用于基于流的生物识别认证的柱状脉冲神经网络的判别训练
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-10-03 DOI: 10.1049/bme2.12099
Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen

Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.

提出了一种基于脉冲神经网络(snn)的基于流的生物特征认证方法。snn在能源消耗方面已经被证明具有优势,并且它们与一些提出的神经形态硬件芯片完美匹配,这可以导致更广泛地采用人工智能技术的用户设备应用。使用snn时面临的挑战之一是网络的判别训练,因为应用传统人工神经网络(ann)中大量使用的众所周知的误差反向传播(EBP)并不直接。提出了一种基于神经元柱的网络结构,类似于人类皮层的皮层柱,并提出了一种新的误差反向传播的推导方法,该方法集成了这些结构中的侧抑制。在惯性步态认证任务中测试了所提出方法的潜力,其中步态被量化为来自惯性测量单元(IMU)的信号,并比较了作者的最先进的人工神经网络方法。在实验中,snn提供了有竞争力的结果,在基于imu的步态认证背景下,与最先进的ann相比,snn在总错误率的一半中获得了约1%的差异。
{"title":"Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication","authors":"Enrique Argones Rúa,&nbsp;Tim Van hamme,&nbsp;Davy Preuveneers,&nbsp;Wouter Joosen","doi":"10.1049/bme2.12099","DOIUrl":"10.1049/bme2.12099","url":null,"abstract":"<p>Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75585054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust medical zero-watermarking algorithm based on Residual-DenseNet 基于残差密度网的鲁棒医学零水印算法
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-09-21 DOI: 10.1049/bme2.12100
Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma

To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.

针对现有传统基于dct的医学图像水印算法在几何攻击下鲁棒性差的问题,提出了一种基于深度学习的医学图像鲁棒零水印算法。设计残差densenet,以医学图像离散余弦变换后的低频特征为标签,采用跳过连接和新的目标函数对能有效区分不同医学图像的高级语义特征进行强化提取,并对其进行二值化,得到鲁棒哈希向量。然后将这些哈希向量与混沌加密的水印进行绑定,生成相应的密钥,完成水印的生成。该算法在水印生成阶段不修改原始医学图像,在水印提取阶段不需要原始医学图像。此外,该算法还适用于多个水印。实验结果表明,该算法对传统攻击和几何攻击都具有良好的鲁棒性。
{"title":"Robust medical zero-watermarking algorithm based on Residual-DenseNet","authors":"Cheng Gong,&nbsp;Jing Liu,&nbsp;Ming Gong,&nbsp;Jingbing Li,&nbsp;Uzair Aslam Bhatti,&nbsp;Jixin Ma","doi":"10.1049/bme2.12100","DOIUrl":"10.1049/bme2.12100","url":null,"abstract":"<p>To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74311418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards understanding the character of quality sampling in deep learning face recognition 探讨深度学习人脸识别中质量采样的特点
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-09-14 DOI: 10.1049/bme2.12095
Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves

Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.

近年来,人脸识别已成为生物识别技术的重要手段之一。它广泛使用深度学习计算机视觉工具,并采用大量无约束的名人面部图像进行训练。当现有的符合文档的人脸图像集合由于安全和隐私问题而难以访问时,这种数据的选择与它的公共可用性有关。训练数据和部署场景之间的这种不一致可能导致生物识别系统的性能泄漏,生物识别系统是专门为处理符合ID文档的图像而开发的。为了缓解这个问题,我们建议使用特定的样本挖掘策略来规范深度人脸识别网络的训练,该策略根据样本的估计质量对样本进行惩罚。除了在最近的工作中考虑的几个质量指标外,我们还将我们的深度学习策略扩展到其他复杂的质量估计方法,并进行实验以更好地理解质量抽样的本质。也就是说,我们寻求更好地满足将深度学习人脸识别应用于身份证和旅行证件图像的目的的惩罚方式(采样特征)。大量的实验证明了该方法对符合身份证件的人脸图像的有效性。
{"title":"Towards understanding the character of quality sampling in deep learning face recognition","authors":"Iurii Medvedev,&nbsp;João Tremoço,&nbsp;Beatriz Mano,&nbsp;Luís Espírito Santo,&nbsp;Nuno Gonçalves","doi":"10.1049/bme2.12095","DOIUrl":"10.1049/bme2.12095","url":null,"abstract":"<p>Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The following article for this Special Issue was published in a different Issue 本期特刊的以下文章发表在另一期
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-09-11 DOI: 10.1049/bme2.12098

Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.

IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072

Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch。基于深度人脸表征的doppelgängers可靠检测。IET生物识别2022年5月;11(3): 215 - 224。https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072
{"title":"The following article for this Special Issue was published in a different Issue","authors":"","doi":"10.1049/bme2.12098","DOIUrl":"10.1049/bme2.12098","url":null,"abstract":"<p>Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.</p><p>IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77611670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality 人脸变形攻击与人脸图像质量:人脸变形的影响及基于质量的无监督攻击检测
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-09-02 DOI: 10.1049/bme2.12094
Biying Fu, Naser Damer

Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.

变形攻击是近年来引起越来越多关注的一种表示攻击形式。变形后的图像可以成功地验证多个身份。因此,这一行动造成了严重的安全问题,涉及一份旅行或身份证件能否被核实为多人所有。然而,以往的研究涉及变形攻击图像的质量问题,其主要目标是定量证明所产生的变形攻击的真实外观。作者推测,与真实样本相比,变形过程可能对感知图像质量和人脸识别(FR)中的图像效用都有影响。为了研究这一理论,本研究对变形对人脸图像质量的影响进行了广泛的分析,包括一般图像质量度量和人脸图像效用度量。这一分析并不局限于单一的变形技术,而是着眼于六种不同的变形技术和使用十种不同质量度量的五种不同数据源。这一分析揭示了变形攻击的质量分数与某些质量度量所测量的真实样本之间具有一致的可分性。作者的研究进一步建立在这种影响的基础上,并研究了基于质量分数执行无监督变形攻击检测(MAD)的可能性。作者的研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。作者的最终结果指出,一组质量度量,如MagFace和CNNIQA,可以用来执行无监督和广义的MAD,正确的分类准确率超过70%。
{"title":"Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality","authors":"Biying Fu,&nbsp;Naser Damer","doi":"10.1049/bme2.12094","DOIUrl":"https://doi.org/10.1049/bme2.12094","url":null,"abstract":"<p>Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134878988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking human face similarity using identical twins 用同卵双胞胎测试人脸相似性
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-08-30 DOI: 10.1049/bme2.12090
Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, Jeremy Dawson

The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin data sets compiled to date to address two FR challenges: (1) determining a baseline measure of facial similarity between identical twins and (2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face data sets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face data sets to identify similar face pairs. An additional analysis that correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.

随着面部生物识别技术的广泛应用,在自动面部识别(FR)应用中区分同卵双胞胎和非双胞胎的问题变得越来越重要。由于同卵双胞胎和长得很像的人的面部高度相似,这些面部对代表了面部识别工具最难处理的情况。这项工作展示了迄今为止最大的双胞胎数据集之一的应用,以解决两个FR挑战:(1)确定同卵双胞胎之间面部相似性的基线测量;(2)应用该相似性测量来确定二重人格或长相相似者对大型面部数据集的FR性能的影响。面部相似性测量是通过深度卷积神经网络确定的。该网络在定制的验证任务上进行训练,旨在鼓励网络将嵌入空间中高度相似的人脸对组合在一起,并实现0.9799的测试AUC。该网络为任意两个给定的人脸提供了定量的相似性评分,并已应用于大规模的人脸数据集来识别相似的人脸对。还进行了另一项分析,将面部识别工具返回的比较分数与所提议的网络返回的相似性分数相关联。
{"title":"Benchmarking human face similarity using identical twins","authors":"Shoaib Meraj Sami,&nbsp;John McCauley,&nbsp;Sobhan Soleymani,&nbsp;Nasser Nasrabadi,&nbsp;Jeremy Dawson","doi":"10.1049/bme2.12090","DOIUrl":"https://doi.org/10.1049/bme2.12090","url":null,"abstract":"<p>The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin data sets compiled to date to address two FR challenges: (1) determining a baseline measure of facial similarity between identical twins and (2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face data sets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face data sets to identify similar face pairs. An additional analysis that correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134880489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack 结合二维纹理和三维几何特征的可靠虹膜呈现攻击检测使用光场焦点叠加
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-08-27 DOI: 10.1049/bme2.12092
Zhengquan Luo, Yunlong Wang, Nianfeng Liu, Zilei Wang

Iris presentation attack detection (PAD) is still an unsolved problem mainly due to the various spoof attack strategies and poor generalisation on unseen attackers. In this paper, the merits of both light field (LF) imaging and deep learning (DL) are leveraged to combine 2D texture and 3D geometry features for iris liveness detection. By exploring off-the-shelf deep features of planar-oriented and sequence-oriented deep neural networks (DNNs) on the rendered focal stack, the proposed framework excavates the differences in 3D geometric structure and 2D spatial texture between bona fide and spoofing irises captured by LF cameras. A group of pre-trained DL models are adopted as feature extractor and the parameters of SVM classifiers are optimised on a limited number of samples. Moreover, two-branch feature fusion further strengthens the framework's robustness and reliability against severe motion blur, noise, and other degradation factors. The results of comparative experiments indicate that variants of the proposed framework significantly surpass the PAD methods that take 2D planar images or LF focal stack as input, even recent state-of-the-art (SOTA) methods fined-tuned on the adopted database. Presentation attacks, including printed papers, printed photos, and electronic displays, can be accurately detected without fine-tuning a bulky CNN. In addition, ablation studies validate the effectiveness of fusing geometric structure and spatial texture features. The results of multi-class attack detection experiments also verify the good generalisation ability of the proposed framework on unseen presentation attacks.

虹膜表示攻击检测(PAD)仍然是一个未解决的问题,主要是由于各种欺骗攻击策略和对看不见的攻击者的泛化能力差。本文利用光场成像(LF)和深度学习(DL)的优点,结合二维纹理和三维几何特征进行虹膜活体检测。通过在渲染的焦点堆栈上探索面向平面和面向序列的深度神经网络(dnn)的现有深度特征,该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在3D几何结构和2D空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。对比实验结果表明,所提出的框架的变体明显优于以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至优于最近在所采用的数据库上进行微调的最先进(SOTA)方法。展示攻击,包括打印的纸张、打印的照片和电子显示器,可以准确地检测到,而不需要对庞大的CNN进行微调。此外,烧蚀研究验证了融合几何结构和空间纹理特征的有效性。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。
{"title":"Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack","authors":"Zhengquan Luo,&nbsp;Yunlong Wang,&nbsp;Nianfeng Liu,&nbsp;Zilei Wang","doi":"10.1049/bme2.12092","DOIUrl":"10.1049/bme2.12092","url":null,"abstract":"<p>Iris presentation attack detection (PAD) is still an unsolved problem mainly due to the various spoof attack strategies and poor generalisation on unseen attackers. In this paper, the merits of both light field (LF) imaging and deep learning (DL) are leveraged to combine 2D texture and 3D geometry features for iris liveness detection. By exploring off-the-shelf deep features of planar-oriented and sequence-oriented deep neural networks (DNNs) on the rendered focal stack, the proposed framework excavates the differences in 3D geometric structure and 2D spatial texture between bona fide and spoofing irises captured by LF cameras. A group of pre-trained DL models are adopted as feature extractor and the parameters of SVM classifiers are optimised on a limited number of samples. Moreover, two-branch feature fusion further strengthens the framework's robustness and reliability against severe motion blur, noise, and other degradation factors. The results of comparative experiments indicate that variants of the proposed framework significantly surpass the PAD methods that take 2D planar images or LF focal stack as input, even recent state-of-the-art (SOTA) methods fined-tuned on the adopted database. Presentation attacks, including printed papers, printed photos, and electronic displays, can be accurately detected without fine-tuning a bulky CNN. In addition, ablation studies validate the effectiveness of fusing geometric structure and spatial texture features. The results of multi-class attack detection experiments also verify the good generalisation ability of the proposed framework on unseen presentation attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84433463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking Human Face Similarity Using Identical Twins 用同卵双胞胎测试人脸相似性
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-08-25 DOI: 10.48550/arXiv.2208.11822
S. Sami, John McCauley, Sobhan Soleymani, N. Nasrabadi, J. Dawson
The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face datasets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs. An additional analysis which correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.
随着面部生物识别技术的广泛应用,在自动面部识别(FR)应用中区分同卵双胞胎和非双胞胎的问题变得越来越重要。由于同卵双胞胎和长得很像的人的面部高度相似,这些面部对代表了面部识别工具最难处理的情况。本工作介绍了迄今为止最大的双胞胎数据集之一的应用,以解决两个FR挑战:1)确定同卵双胞胎之间面部相似性的基线测量,2)应用该相似性测量来确定二重人格或长相相似者对大型面部数据集的FR性能的影响。面部相似性测量是通过深度卷积神经网络确定的。该网络在定制的验证任务上进行训练,旨在鼓励网络将嵌入空间中高度相似的人脸对组合在一起,并实现0.9799的测试AUC。该网络为任意两个给定的人脸提供了定量的相似性评分,并已应用于大规模的人脸数据集来识别相似的人脸对。还进行了另一项分析,该分析将面部识别工具返回的比较分数与所提出的网络返回的相似性分数相关联。
{"title":"Benchmarking Human Face Similarity Using Identical Twins","authors":"S. Sami, John McCauley, Sobhan Soleymani, N. Nasrabadi, J. Dawson","doi":"10.48550/arXiv.2208.11822","DOIUrl":"https://doi.org/10.48550/arXiv.2208.11822","url":null,"abstract":"The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face datasets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs. An additional analysis which correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82137888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of gait data set for preserving its privacy in deep learning pipeline 深度学习管道中步态数据集的隐私保护
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-08-22 DOI: 10.1049/bme2.12093
Anubha Parashar, Rajveer Singh Shekhawat

Human gait is a biometric that is being used in security systems because it is unique for each individual and helps recognise one from a distance without any intervention. To develop such a system, one needs a comprehensive data set specific to the application. If this data set somehow falls in the hands of rogue elements, they can easily access the secured system developed based on the data set. Thus, the protection of the gait data set becomes essential. It has been learnt that systems using deep learning are easily prone to hacking. Hence, maintaining the privacy of gait data sets in the deep learning pipeline becomes more difficult due to adversarial attacks or unauthorised access to the data set. One of the popular techniques for stopping access to the data set is using anonymisation. A reversible gait anonymisation pipeline that modifies gait geometry by morphing the images, that is, texture modifications, is proposed. Such modified data prevent hackers from making use of the data set for adversarial attacks. Nine layers were proposedto effect geometrical modifications, and a fixed gait texture template is used for morphing. Both these modify the gait data set so that any authentic person cannot be identified while maintaining the naturalness of the gait. The proposed method is evaluated using the similarity index as well as the recognition rate. The impact of various geometrical and texture modifications on silhouettes have been investigated to identify the modifications. The crowdsourcing and machine learning experiments were performed on the silhouette for this purpose. The obtained results in both types of experiments showed that texture modification has a stronger impact on the level of privacy protection than geometry shape modifications. In these experiments, the similarity index achieved is above 99%. These findings open new research directions regarding the adversarial attacks and privacy protection related to gait recognition data sets.

人类的步态是一种生物特征,被用于安全系统,因为它对每个人都是独一无二的,可以在没有任何干预的情况下从远处识别一个人。要开发这样的系统,需要针对应用程序的全面数据集。如果该数据集以某种方式落入不法分子手中,他们可以轻松访问基于该数据集开发的安全系统。因此,步态数据集的保护变得至关重要。据了解,使用深度学习的系统很容易被黑客攻击。因此,由于对抗性攻击或对数据集的未经授权访问,在深度学习管道中维护步态数据集的隐私变得更加困难。阻止对数据集的访问的流行技术之一是使用匿名。提出了一种可逆的步态匿名化管道,通过对图像进行纹理修改来修改步态几何形状。这些修改后的数据可以防止黑客利用这些数据集进行对抗性攻击。提出了9层进行几何修改,并使用固定的步态纹理模板进行变形。这两种方法都对步态数据集进行了修改,使得在保持步态的自然性的同时无法识别任何真实的人。利用相似度指标和识别率对所提方法进行评价。研究了各种几何和纹理修饰对轮廓的影响。为此,在剪影上进行了众包和机器学习实验。两种类型的实验结果表明,纹理修饰对隐私保护水平的影响强于几何形状修饰。在这些实验中,获得的相似度指数都在99%以上。这些发现为步态识别数据集的对抗性攻击和隐私保护开辟了新的研究方向。
{"title":"Protection of gait data set for preserving its privacy in deep learning pipeline","authors":"Anubha Parashar,&nbsp;Rajveer Singh Shekhawat","doi":"10.1049/bme2.12093","DOIUrl":"10.1049/bme2.12093","url":null,"abstract":"<p>Human gait is a biometric that is being used in security systems because it is unique for each individual and helps recognise one from a distance without any intervention. To develop such a system, one needs a comprehensive data set specific to the application. If this data set somehow falls in the hands of rogue elements, they can easily access the secured system developed based on the data set. Thus, the protection of the gait data set becomes essential. It has been learnt that systems using deep learning are easily prone to hacking. Hence, maintaining the privacy of gait data sets in the deep learning pipeline becomes more difficult due to adversarial attacks or unauthorised access to the data set. One of the popular techniques for stopping access to the data set is using anonymisation. A reversible gait anonymisation pipeline that modifies gait geometry by morphing the images, that is, texture modifications, is proposed. Such modified data prevent hackers from making use of the data set for adversarial attacks. Nine layers were proposedto effect geometrical modifications, and a fixed gait texture template is used for morphing. Both these modify the gait data set so that any authentic person cannot be identified while maintaining the naturalness of the gait. The proposed method is evaluated using the similarity index as well as the recognition rate. The impact of various geometrical and texture modifications on silhouettes have been investigated to identify the modifications. The crowdsourcing and machine learning experiments were performed on the silhouette for this purpose. The obtained results in both types of experiments showed that texture modification has a stronger impact on the level of privacy protection than geometry shape modifications. In these experiments, the similarity index achieved is above 99%. These findings open new research directions regarding the adversarial attacks and privacy protection related to gait recognition data sets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87559499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1