首页 > 最新文献

IET Biometrics最新文献

英文 中文
BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics BIOSIG 2021高效、可靠、隐私友好型生物识别技术特刊
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-14 DOI: 10.1049/bme2.12101
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo
本期IET生物识别特刊“BIOSIG 2021高效、可靠和隐私友好型生物识别特刊”以2021年版生物识别特别兴趣小组(BIOSIG)会议为起点。本期特刊收集了有关生物识别的研究成果,从新的角度探讨了生物识别系统和方法的效率、可靠性和隐私性。“BIOSIG 2021高效、可靠和隐私友好型生物识别技术特刊”包含12篇论文,其中几篇是BIOSIG 2021会议上发表的论文的扩展版本,涉及生物识别技术的具体研究领域,如面部和虹膜的呈现攻击检测,生物识别模板保护方案和生物识别的深度学习技术。论文“人脸变形攻击与人脸图像质量:变形的影响和攻击的质量可检测性”由傅碧颖和Naser Damer撰写。本文讨论了与真实样本相比,变形过程对感知图像质量和图像在人脸识别(FR)中的效用的影响。这项工作提供了变形对人脸图像质量的影响的广泛分析,包括一般图像质量测量和人脸图像效用测量,分析了六种不同的变形技术和五种不同的数据源,使用10种不同的质量测量。变形攻击的质量分数与某些质量度量测量的真实样本之间具有一致的可分离性,这支持了基于质量分数进行无监督变形攻击检测(MAD)的提议。该研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。结果表明,MagFace和CNNNIQA等一组质量度量可以用于无监督的广义MAD,正确分类准确率超过70%。论文“基于像素的ID卡表示攻击检测监督”由Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra和Naser Damer撰写。本文解决了假身份证的检测问题,这些假身份证被打印出来,然后在无监督的环境中以数字方式呈现,用于生物识别认证目的。作者提出了一种基于像素监督的方法,使用DenseNet来利用各种人工制品上的微小线索,如波纹图案和打印机留下的人工制品。为了测试提议的系统,从一个操作系统中获得了一个新的数据库,该数据库由886个用户组成,其中有433次真实攻击,67次打印攻击和366次显示攻击(由于GPDR法规而未公开)。与手工特征和深度学习模型相比,该方法具有更好的性能,相等错误率(EER)为2.22%,真实表示分类错误率(BPCER)为1.83%和1.67%;攻击表示分类错误率(APCER)分别为5%和10%。论文“Deep Patch-Wise Supervision for Presentation Attack Detection”由Alperen kantarci, Hasan Dertli和Hazım Ekenel撰写。本文研究了人脸表示攻击检测(PAD)中的泛化问题。具体来说,基于卷积神经网络(CNN)的系统由于其在数据集内实验中的高性能,最近获得了显著的普及。然而,这些系统往往不能泛化到他们没有训练过的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种新的表示攻击检测(PAD)方法,该方法将逐像素二进制监督与基于补丁的CNN相结合。实验表明,基于补丁的方法使模型不需要记忆背景信息或特定于数据集的轨迹。该方法在广泛使用的PAD数据集(replay - mobile, OULU-NPU)和为真实PAD用例收集的真实数据集上进行了测试。结果表明,该方法在具有挑战性的实验设置中具有优越性。也就是说,它在OULU-NPU协议3,4和数据集间真实世界实验中取得了更高的性能。Zohra Rezgui, Amina Bassit和Raymond Veldhuis撰写的论文“性别分类对抗性攻击到人脸识别的可转移性分析:固定和可变攻击扰动”。本文主要研究对抗性攻击的可转移性问题。 这项工作的动机是,在文献中证明了这些针对特定模型的攻击在执行相同任务的模型之间是可转移的,然而,对于执行不同任务但共享相同输入空间和模型架构的模型,文献中没有考虑可转移性场景。在本文中,作者研究了基于vgg16和基于resnet50的生物识别分类器的上述挑战。研究了两种白盒攻击对性别分类器的影响,然后采用特征引导去噪方法评估了它们对防御方法的鲁棒性。一旦确定了这些攻击在欺骗性别分类器方面的有效性,我们就以黑盒方式测试了它们从性别分类任务到具有类似架构的面部识别任务的可转移性。采用了两种验证比较设置,其中作者比较了扰动大小相同和不同的图像。研究结果表明,在固定扰动条件下,快速梯度符号法(FGSM)攻击具有可转移性,在投影梯度下降法(PGD)攻击条件下具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。论文“结合二维纹理和三维几何特征进行可靠的虹膜呈现攻击检测,使用光场焦点堆栈”由罗正全,王云龙,刘年峰,王子磊撰写。在本文中,作者利用光场(LF)成像和深度学习(DL)的优点,将二维纹理和三维几何特征结合起来进行虹膜呈现攻击检测(PAD)。提出的研究探索了在渲染焦点堆栈上面向平面和面向序列的深度神经网络(dnn)的现成深度特征。该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在三维几何结构和二维空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。结果表明,所提出的框架的变体明显超过了以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至是最近在所采用的数据库上进行微调的最先进的方法。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。论文“混合生物识别模板保护:解决布隆过滤器和同态加密之间选择的痛苦”由Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis和Andreas Peter撰写。本文讨论了生物特征模板保护(BTP)方案的发展,研究了布隆过滤器(BFs)和同态加密(HE)的优缺点。本文指出,基于bf和he的BTPs的优缺点在文献中没有得到很好的研究,从理论角度来看,这两种方法似乎都很有希望。因此,本文从理论角度对现有的基于bf的BTPs和基于he的BTPs进行了比较研究,考察了它们的优缺点。将这种比较应用于虹膜识别作为研究案例,在相同的设置、数据集和实现语言上测试了BTP方法的生物特征和运行时性能。作为本研究的综合,作者提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不可链接性和较高的识别精度,同时比传统的基于HE的方法快7倍左右。对该方案的评估证实了其生物识别精度(IITD虹膜数据库的EER为0:17%)和运行效率(128、192和256位安全级别分别为104:35 ms、155:15 ms和171:70 ms)。论文“Locality Preserving Binary Face Representations Using Auto-encoders”由Mohamed Amine HMANI, Dijana petrovska - delacr<s:1> taz和
{"title":"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Naser Damer,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":"10.1049/bme2.12101","url":null,"abstract":"&lt;p&gt;This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.&lt;/p&gt;&lt;p&gt;The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as &lt;b&gt;Presentation Attack Detection for Face and Iris&lt;/b&gt;, &lt;b&gt;Biometric Template Protection Schemes&lt;/b&gt; and &lt;b&gt;Deep Learning techniques for Biometrics&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.&lt;/p&gt;&lt;p&gt;Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"355-358"},"PeriodicalIF":2.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87752844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"https://doi.org/10.1049/bme2.12102","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"31 1","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86037260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.

随着互联网技术领域的不断进步和发展,医学图像处理领域也随之发展起来。特别是数字水印技术在医学图像处理领域发挥着至关重要的作用,极大地提高了医学图像信息的安全性。针对医学图像水印算法对几何攻击鲁棒性差导致医学图像信息安全性低的问题,提出了一种基于加速kaze离散余弦变换(AKAZE-DCT)的医学图像水印算法。首先利用AKAZE-DCT算法提取医学图像的特征向量,然后结合感知哈希技术得到医学图像的特征序列;然后对水印图像进行逻辑混沌错位加密,得到加密后的水印图像,保证了水印信息的安全性;最后,采用零水印技术对水印进行嵌入和提取。实验结果表明,该算法在常规攻击和几何攻击下均能有效提取水印,具有较好的鲁棒性和不可见性,与其他算法相比,在医学领域具有一定的实用性。
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li,&nbsp;Yen-wei Chen,&nbsp;Jingbing Li,&nbsp;Lei Cao,&nbsp;Uzair Aslam Bhatti,&nbsp;Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"10.1049/bme2.12102","url":null,"abstract":"<p>With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118745131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Locality preserving binary face representations using auto-encoders 使用自编码器保持局部性的二进制面表示
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-10 DOI: 10.1049/bme2.12096
Mohamed Amine Hmani, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi

Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.

密码生物识别方案,如模糊承诺,需要二进制源。介绍了一种将深度神经网络应用于面部生物特征数据二值化的新方法。在MOBIO和Wild数据库中的labeled Faces上评估二元表示,并测量其生物特征识别性能和熵。与基线相比,所提出的二进制嵌入在两个数据库上都提供了最先进的性能,几乎可以忽略不计。表示的长度可以被控制。使用预训练的卷积神经网络,并在ms - celebrity - 1m数据库的清洗版本上训练模型,得到了长度为4096位和熵为3300位的二进制表示。提取的表征具有高熵和足够长的时间,可以用于加密生物识别系统,如模糊承诺。此外,所提出的方法是数据驱动的,并构成了可用于数据聚类和相似性搜索的局部保留散列。作为二进制表示的一个用例,基于二进制嵌入使用随机化键作为第二个因素的洗牌变换来创建一个可取消的系统。
{"title":"Locality preserving binary face representations using auto-encoders","authors":"Mohamed Amine Hmani,&nbsp;Dijana Petrovska-Delacrétaz,&nbsp;Bernadette Dorizzi","doi":"10.1049/bme2.12096","DOIUrl":"10.1049/bme2.12096","url":null,"abstract":"<p>Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"445-458"},"PeriodicalIF":2.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76420898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication 用于基于流的生物识别认证的柱状脉冲神经网络的判别训练
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-10-03 DOI: 10.1049/bme2.12099
Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen

Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.

提出了一种基于脉冲神经网络(snn)的基于流的生物特征认证方法。snn在能源消耗方面已经被证明具有优势,并且它们与一些提出的神经形态硬件芯片完美匹配,这可以导致更广泛地采用人工智能技术的用户设备应用。使用snn时面临的挑战之一是网络的判别训练,因为应用传统人工神经网络(ann)中大量使用的众所周知的误差反向传播(EBP)并不直接。提出了一种基于神经元柱的网络结构,类似于人类皮层的皮层柱,并提出了一种新的误差反向传播的推导方法,该方法集成了这些结构中的侧抑制。在惯性步态认证任务中测试了所提出方法的潜力,其中步态被量化为来自惯性测量单元(IMU)的信号,并比较了作者的最先进的人工神经网络方法。在实验中,snn提供了有竞争力的结果,在基于imu的步态认证背景下,与最先进的ann相比,snn在总错误率的一半中获得了约1%的差异。
{"title":"Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication","authors":"Enrique Argones Rúa,&nbsp;Tim Van hamme,&nbsp;Davy Preuveneers,&nbsp;Wouter Joosen","doi":"10.1049/bme2.12099","DOIUrl":"10.1049/bme2.12099","url":null,"abstract":"<p>Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"485-497"},"PeriodicalIF":2.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75585054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust medical zero-watermarking algorithm based on Residual-DenseNet 基于残差密度网的鲁棒医学零水印算法
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-09-21 DOI: 10.1049/bme2.12100
Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma

To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.

针对现有传统基于dct的医学图像水印算法在几何攻击下鲁棒性差的问题,提出了一种基于深度学习的医学图像鲁棒零水印算法。设计残差densenet,以医学图像离散余弦变换后的低频特征为标签,采用跳过连接和新的目标函数对能有效区分不同医学图像的高级语义特征进行强化提取,并对其进行二值化,得到鲁棒哈希向量。然后将这些哈希向量与混沌加密的水印进行绑定,生成相应的密钥,完成水印的生成。该算法在水印生成阶段不修改原始医学图像,在水印提取阶段不需要原始医学图像。此外,该算法还适用于多个水印。实验结果表明,该算法对传统攻击和几何攻击都具有良好的鲁棒性。
{"title":"Robust medical zero-watermarking algorithm based on Residual-DenseNet","authors":"Cheng Gong,&nbsp;Jing Liu,&nbsp;Ming Gong,&nbsp;Jingbing Li,&nbsp;Uzair Aslam Bhatti,&nbsp;Jixin Ma","doi":"10.1049/bme2.12100","DOIUrl":"10.1049/bme2.12100","url":null,"abstract":"<p>To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"547-556"},"PeriodicalIF":2.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74311418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards understanding the character of quality sampling in deep learning face recognition 探讨深度学习人脸识别中质量采样的特点
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-09-14 DOI: 10.1049/bme2.12095
Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves

Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.

近年来,人脸识别已成为生物识别技术的重要手段之一。它广泛使用深度学习计算机视觉工具,并采用大量无约束的名人面部图像进行训练。当现有的符合文档的人脸图像集合由于安全和隐私问题而难以访问时,这种数据的选择与它的公共可用性有关。训练数据和部署场景之间的这种不一致可能导致生物识别系统的性能泄漏,生物识别系统是专门为处理符合ID文档的图像而开发的。为了缓解这个问题,我们建议使用特定的样本挖掘策略来规范深度人脸识别网络的训练,该策略根据样本的估计质量对样本进行惩罚。除了在最近的工作中考虑的几个质量指标外,我们还将我们的深度学习策略扩展到其他复杂的质量估计方法,并进行实验以更好地理解质量抽样的本质。也就是说,我们寻求更好地满足将深度学习人脸识别应用于身份证和旅行证件图像的目的的惩罚方式(采样特征)。大量的实验证明了该方法对符合身份证件的人脸图像的有效性。
{"title":"Towards understanding the character of quality sampling in deep learning face recognition","authors":"Iurii Medvedev,&nbsp;João Tremoço,&nbsp;Beatriz Mano,&nbsp;Luís Espírito Santo,&nbsp;Nuno Gonçalves","doi":"10.1049/bme2.12095","DOIUrl":"10.1049/bme2.12095","url":null,"abstract":"<p>Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"498-511"},"PeriodicalIF":2.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The following article for this Special Issue was published in a different Issue 本期特刊的以下文章发表在另一期
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-09-11 DOI: 10.1049/bme2.12098

Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.

IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072

Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch。基于深度人脸表征的doppelgängers可靠检测。IET生物识别2022年5月;11(3): 215 - 224。https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072
{"title":"The following article for this Special Issue was published in a different Issue","authors":"","doi":"10.1049/bme2.12098","DOIUrl":"10.1049/bme2.12098","url":null,"abstract":"<p>Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.</p><p>IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"529"},"PeriodicalIF":2.0,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77611670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality 人脸变形攻击与人脸图像质量:人脸变形的影响及基于质量的无监督攻击检测
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-09-02 DOI: 10.1049/bme2.12094
Biying Fu, Naser Damer

Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.

变形攻击是近年来引起越来越多关注的一种表示攻击形式。变形后的图像可以成功地验证多个身份。因此,这一行动造成了严重的安全问题,涉及一份旅行或身份证件能否被核实为多人所有。然而,以往的研究涉及变形攻击图像的质量问题,其主要目标是定量证明所产生的变形攻击的真实外观。作者推测,与真实样本相比,变形过程可能对感知图像质量和人脸识别(FR)中的图像效用都有影响。为了研究这一理论,本研究对变形对人脸图像质量的影响进行了广泛的分析,包括一般图像质量度量和人脸图像效用度量。这一分析并不局限于单一的变形技术,而是着眼于六种不同的变形技术和使用十种不同质量度量的五种不同数据源。这一分析揭示了变形攻击的质量分数与某些质量度量所测量的真实样本之间具有一致的可分性。作者的研究进一步建立在这种影响的基础上,并研究了基于质量分数执行无监督变形攻击检测(MAD)的可能性。作者的研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。作者的最终结果指出,一组质量度量,如MagFace和CNNIQA,可以用来执行无监督和广义的MAD,正确的分类准确率超过70%。
{"title":"Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality","authors":"Biying Fu,&nbsp;Naser Damer","doi":"10.1049/bme2.12094","DOIUrl":"https://doi.org/10.1049/bme2.12094","url":null,"abstract":"<p>Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"359-382"},"PeriodicalIF":2.0,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134878988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking human face similarity using identical twins 用同卵双胞胎测试人脸相似性
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-08-30 DOI: 10.1049/bme2.12090
Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, Jeremy Dawson

The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin data sets compiled to date to address two FR challenges: (1) determining a baseline measure of facial similarity between identical twins and (2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face data sets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face data sets to identify similar face pairs. An additional analysis that correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.

随着面部生物识别技术的广泛应用,在自动面部识别(FR)应用中区分同卵双胞胎和非双胞胎的问题变得越来越重要。由于同卵双胞胎和长得很像的人的面部高度相似,这些面部对代表了面部识别工具最难处理的情况。这项工作展示了迄今为止最大的双胞胎数据集之一的应用,以解决两个FR挑战:(1)确定同卵双胞胎之间面部相似性的基线测量;(2)应用该相似性测量来确定二重人格或长相相似者对大型面部数据集的FR性能的影响。面部相似性测量是通过深度卷积神经网络确定的。该网络在定制的验证任务上进行训练,旨在鼓励网络将嵌入空间中高度相似的人脸对组合在一起,并实现0.9799的测试AUC。该网络为任意两个给定的人脸提供了定量的相似性评分,并已应用于大规模的人脸数据集来识别相似的人脸对。还进行了另一项分析,将面部识别工具返回的比较分数与所提议的网络返回的相似性分数相关联。
{"title":"Benchmarking human face similarity using identical twins","authors":"Shoaib Meraj Sami,&nbsp;John McCauley,&nbsp;Sobhan Soleymani,&nbsp;Nasser Nasrabadi,&nbsp;Jeremy Dawson","doi":"10.1049/bme2.12090","DOIUrl":"https://doi.org/10.1049/bme2.12090","url":null,"abstract":"<p>The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin data sets compiled to date to address two FR challenges: (1) determining a baseline measure of facial similarity between identical twins and (2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face data sets. The facial similarity measure is determined via a deep convolutional neural network. This network is trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face data sets to identify similar face pairs. An additional analysis that correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"459-484"},"PeriodicalIF":2.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134880489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1