首页 > 最新文献

IET Biometrics最新文献

英文 中文
Deep patch-wise supervision for presentation attack detection 用于表示攻击检测的深度补丁监督
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-08-18 DOI: 10.1049/bme2.12091
Alperen Kantarcı, Hasan Dertli, Hazım Kemal Ekenel

Face recognition systems have been widely deployed in various applications, such as online banking and mobile payment. However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)-based systems have gained significant popularity recently. CNN-based systems perform very well on intra-data set experiments, yet they fail to generalise to the data sets that they have not been trained on. This indicates that they tend to memorise data set-specific spoof traces. To mitigate this problem, the authors propose a Deep Patch-wise Supervision Presentation Attack Detection (DPS-PAD) model approach that combines pixel-wise binary supervision with patch-based CNN. The authors’ experiments show that the proposed patch-based method forces the model not to memorise the background information or data set-specific traces. The authors extensively tested the proposed method on widely used PAD data sets—Replay-Mobile and OULU-NPU—and on a real-world data set that has been collected for real-world PAD use cases. The proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU-NPU protocol 3, 4 and on inter-data set real-world experiments.

人脸识别系统已广泛应用于各种应用,如网上银行和移动支付。然而,这些系统很容易受到面部呈现攻击的攻击,这些攻击是由那些从个人或通过黑客系统秘密获取生物特征数据的人创建的。为了检测这些攻击,基于卷积神经网络(CNN)的系统最近得到了很大的普及。基于cnn的系统在内部数据集实验中表现非常好,但它们无法推广到它们没有接受过训练的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种深度补丁监督表示攻击检测(DPS-PAD)模型方法,该方法将像素化二进制监督与基于补丁的CNN相结合。作者的实验表明,提出的基于补丁的方法迫使模型不记住背景信息或数据集特定的痕迹。作者在广泛使用的PAD数据集(replay - mobile和oulu - npu)以及为真实PAD用例收集的真实数据集上广泛测试了所提出的方法。所提出的方法被发现是优越的具有挑战性的实验设置。即在OULU-NPU协议3、4和数据集间的真实实验中实现了更高的性能。
{"title":"Deep patch-wise supervision for presentation attack detection","authors":"Alperen Kantarcı,&nbsp;Hasan Dertli,&nbsp;Hazım Kemal Ekenel","doi":"10.1049/bme2.12091","DOIUrl":"10.1049/bme2.12091","url":null,"abstract":"<p>Face recognition systems have been widely deployed in various applications, such as online banking and mobile payment. However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)-based systems have gained significant popularity recently. CNN-based systems perform very well on intra-data set experiments, yet they fail to generalise to the data sets that they have not been trained on. This indicates that they tend to memorise data set-specific spoof traces. To mitigate this problem, the authors propose a Deep Patch-wise Supervision Presentation Attack Detection (DPS-PAD) model approach that combines pixel-wise binary supervision with patch-based CNN. The authors’ experiments show that the proposed patch-based method forces the model not to memorise the background information or data set-specific traces. The authors extensively tested the proposed method on widely used PAD data sets—Replay-Mobile and OULU-NPU—and on a real-world data set that has been collected for real-world PAD use cases. The proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU-NPU protocol 3, 4 and on inter-data set real-world experiments.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"396-406"},"PeriodicalIF":2.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73411209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Unsupervised Attack Detection by Quality 人脸变形攻击与人脸图像质量:变形的影响及基于质量的无监督攻击检测
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-08-11 DOI: 10.48550/arXiv.2208.05864
Biying Fu, N. Damer
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous works touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. We theorize that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique, but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. Our study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. Our study looks intointra and inter-dataset detectability to evaluate the generalizability of such a detection concept on different morphing techniques and bona fide sources. Our final results point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalized MAD with a correct classification accuracy of over 70%.
变形攻击是近年来引起越来越多关注的一种表示攻击形式。变形后的图像可以成功地验证多个身份。因此,这一行动造成了严重的安全问题,涉及一份旅行或身份证件能否被核实为多人所有。先前的作品触及了变形攻击图像的质量问题,然而,其主要目标是定量证明所产生的变形攻击的现实外观。我们推测,与真实样本相比,变形过程可能对感知图像质量和人脸识别(FR)中的图像效用都有影响。为了研究这一理论,本研究对变形对人脸图像质量的影响进行了广泛的分析,包括一般图像质量度量和人脸图像效用度量。这个分析并不局限于单一的变形技术,而是着眼于六种不同的变形技术和使用十种不同质量度量的五种不同数据源。这一分析揭示了变形攻击的质量分数与某些质量度量所测量的真实样本之间具有一致的可分性。我们的研究进一步建立在这种影响的基础上,并研究基于质量分数执行无监督变形攻击检测(MAD)的可能性。我们的研究着眼于数据集内部和数据集间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的泛化性。我们的最终结果指出,一组质量度量,如MagFace和CNNNIQA,可以用来执行无监督和广义的MAD,正确的分类准确率超过70%。
{"title":"Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Unsupervised Attack Detection by Quality","authors":"Biying Fu, N. Damer","doi":"10.48550/arXiv.2208.05864","DOIUrl":"https://doi.org/10.48550/arXiv.2208.05864","url":null,"abstract":"Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous works touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. We theorize that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique, but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. Our study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. Our study looks intointra and inter-dataset detectability to evaluate the generalizability of such a detection concept on different morphing techniques and bona fide sources. Our final results point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalized MAD with a correct classification accuracy of over 70%.","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"180 1","pages":"359-382"},"PeriodicalIF":2.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83595431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phoneme analysis for multiple languages with fuzzy-based speaker identification 基于模糊说话人识别的多语言音素分析
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-07-26 DOI: 10.1049/bme2.12078
Thales Aguiar de Lima, Márjory Cristiany Da-Costa Abreu

Most voice biometric systems are dependent on the language of the user. However, if the idea is to create an all-inclusive and reliable system that uses speech as its input, then they should be able to recognise people regardless of language or accent. Thus, this paper investigates the effects of languages on speaker identification systems and the phonetic impact on their performance. The experiments are performed using three widely spoken languages which are Portuguese, English, and Chinese. The Mel-Frequency Cepstrum Coefficients and its Deltas are extracted from those languages. Also, this paper expands the research study of fuzzy models in the speaker recognition field, using a Fuzzy C-Means and Fuzzy k-Nearest Neighbours and comparing them with k-Nearest Neighbours and Support Vector Machines. Results with more languages decreases the accuracy from 92% to 85.59%, but further investigation suggests it is caused by the number of classes. A phonetic investigation finds no relation between the phonemes and the results. Finally, fuzzy methods offer more flexibility and in some cases, even better results compared to their crisp version. Therefore, the biometric system presented here is not affected by multilingual environments.

大多数语音生物识别系统都依赖于用户的语言。然而,如果我们的想法是创建一个全面可靠的系统,使用语音作为输入,那么他们应该能够识别出任何语言或口音的人。因此,本文研究了语言对说话人识别系统的影响,以及语音对系统性能的影响。实验使用三种广泛使用的语言进行,即葡萄牙语、英语和汉语。从这些语言中提取了Mel-Frequency倒频谱系数及其δ。同时,本文扩展了模糊模型在说话人识别领域的研究,使用了模糊c均值和模糊k近邻,并将它们与k近邻和支持向量机进行了比较。结果表明,语言数越多,准确率从92%下降到85.59%,但进一步研究表明,这是由类别数量造成的。语音调查发现音素和结果之间没有关系。最后,模糊方法提供了更多的灵活性,在某些情况下,甚至比他们的清晰版本更好的结果。因此,这里介绍的生物识别系统不受多语言环境的影响。
{"title":"Phoneme analysis for multiple languages with fuzzy-based speaker identification","authors":"Thales Aguiar de Lima,&nbsp;Márjory Cristiany Da-Costa Abreu","doi":"10.1049/bme2.12078","DOIUrl":"10.1049/bme2.12078","url":null,"abstract":"<p>Most voice biometric systems are dependent on the language of the user. However, if the idea is to create an all-inclusive and reliable system that uses speech as its input, then they should be able to recognise people regardless of language or accent. Thus, this paper investigates the effects of languages on speaker identification systems and the phonetic impact on their performance. The experiments are performed using three widely spoken languages which are Portuguese, English, and Chinese. The Mel-Frequency Cepstrum Coefficients and its Deltas are extracted from those languages. Also, this paper expands the research study of fuzzy models in the speaker recognition field, using a Fuzzy C-Means and Fuzzy k-Nearest Neighbours and comparing them with k-Nearest Neighbours and Support Vector Machines. Results with more languages decreases the accuracy from 92% to 85.59%, but further investigation suggests it is caused by the number of classes. A phonetic investigation finds no relation between the phonemes and the results. Finally, fuzzy methods offer more flexibility and in some cases, even better results compared to their crisp version. Therefore, the biometric system presented here is not affected by multilingual environments.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"614-624"},"PeriodicalIF":2.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57691654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Palmprint recognition based on the line feature local tri-directional patterns 掌纹识别基于线条特征的局部三方向模式
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-07-19 DOI: 10.1049/bme2.12085
Mengwen Li, Huabin Wang, Huaiyu Liu, Qianqian Meng

Recent researches have shown that the texture descriptor local tri-directional patterns (LTriDP) performs well in many recognition tasks. However, LTriDP cannot effectively describe the structure of palm lines, which results in poor palmprint recognition. To overcome this issue, this work proposes a modified version of LTriDP, called line feature local tri-directional patterns (LFLTriDP), which takes into account the texture features of the palmprint. First, since palmprints contain rich lines, the line features of palmprint images, including orientation and magnitude, are extracted. The line features are more robust to variations compared to the original grayscale values. Then, the directional features are encoded as tri-directional patterns. The tri-directional patterns reflect the direction changes in the local area. Finally, the LFLTriDP features are constructed by the tri-directional patterns, orientation and magnitude features. The LFLTriDP features effectively describe the structure of palm lines. Considering that most palm lines are curved, we use the concavity as supplementary information. The concavity of each pixel is obtained using the Banana filter and all pixels are grouped into two categories. The LFLTriDP features are refined to generate two feature vectors by the concavity to enhance the discriminability. The matching scores of the two feature vectors are weighted differently in the matching stage to reduce intra-class distance and increase inter-class distance. Experiments on PolyU, PolyU Multi-spectral, Tongji, CASIA and IITD palmprint databases show that LFLTriDP achieves promising recognition performance.

近年来的研究表明,纹理描述子局部三向模式(LTriDP)在许多识别任务中都有很好的表现。然而,LTriDP不能有效地描述掌纹结构,导致掌纹识别效果不佳。为了克服这个问题,本研究提出了一种LTriDP的改进版本,称为线特征局部三向模式(LFLTriDP),它考虑了掌纹的纹理特征。首先,由于掌纹包含丰富的线条,提取掌纹图像的线条特征,包括方向和大小;与原始灰度值相比,线特征对变化具有更强的鲁棒性。然后,将方向特征编码为三方向模式。三向模式反映了局部区域的方向变化。最后,利用三方向特征、方向特征和幅度特征构建了LFLTriDP特征。LFLTriDP特征有效地描述了手掌线条的结构。考虑到大多数手掌线条是弯曲的,我们使用凹凸度作为补充信息。使用Banana滤波器获得每个像素的凹凸度,并将所有像素分为两类。通过对LFLTriDP特征的凹度进行细化,生成两个特征向量,提高了识别能力。在匹配阶段对两个特征向量的匹配分数进行不同的加权,以减小类内距离,增大类间距离。在PolyU、PolyU多光谱、同济、CASIA和IITD掌纹数据库上的实验表明,LFLTriDP具有良好的识别性能。
{"title":"Palmprint recognition based on the line feature local tri-directional patterns","authors":"Mengwen Li,&nbsp;Huabin Wang,&nbsp;Huaiyu Liu,&nbsp;Qianqian Meng","doi":"10.1049/bme2.12085","DOIUrl":"10.1049/bme2.12085","url":null,"abstract":"<p>Recent researches have shown that the texture descriptor local tri-directional patterns (LTriDP) performs well in many recognition tasks. However, LTriDP cannot effectively describe the structure of palm lines, which results in poor palmprint recognition. To overcome this issue, this work proposes a modified version of LTriDP, called line feature local tri-directional patterns (LFLTriDP), which takes into account the texture features of the palmprint. First, since palmprints contain rich lines, the line features of palmprint images, including orientation and magnitude, are extracted. The line features are more robust to variations compared to the original grayscale values. Then, the directional features are encoded as tri-directional patterns. The tri-directional patterns reflect the direction changes in the local area. Finally, the LFLTriDP features are constructed by the tri-directional patterns, orientation and magnitude features. The LFLTriDP features effectively describe the structure of palm lines. Considering that most palm lines are curved, we use the concavity as supplementary information. The concavity of each pixel is obtained using the Banana filter and all pixels are grouped into two categories. The LFLTriDP features are refined to generate two feature vectors by the concavity to enhance the discriminability. The matching scores of the two feature vectors are weighted differently in the matching stage to reduce intra-class distance and increase inter-class distance. Experiments on PolyU, PolyU Multi-spectral, Tongji, CASIA and IITD palmprint databases show that LFLTriDP achieves promising recognition performance.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"570-580"},"PeriodicalIF":2.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82182446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust graph fusion and recognition framework for fingerprint and finger-vein 指纹和手指静脉的鲁棒图融合与识别框架
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-07-12 DOI: 10.1049/bme2.12086
Zhitao Wu, Hongxu Qu, Haigang Zhang, Jinfeng Yang

The human finger is the essential carrier of biometric features. The finger itself contains multi-modal traits, including fingerprint and finger-vein, which provides convenience and practicality for finger bi-modal fusion recognition. The scale inconsistency and feature space mismatch of finger bi-modal images are important reasons for the fusion effect. The feature extraction method based on graph structure can well solve the problem of feature space mismatch for the finger bi-modalities, and the end-to-end fusion recognition can be realised based on graph convolutional neural networks (GCNs). However, this fusion recognition strategy based on GCNs still has two urgent problems: first, lack of stable and efficient graph fusion method; second, over-smoothing problem of GCNs will lead to the degradation of recognition performance. A novel fusion method is proposed to integrate the graph features of fingerprint (FP) and finger-vein (FV). Furthermore, we analyse the inner relationship between the information transmission process and the over-smoothing problem in GCNs from an optimisation perspective, and point out that the differentiated information between neighbouring nodes decreases as the number of layers increases, which is the direct reason for the over-smoothing problem. A modified deep graph convolution neural network is proposed, aiming to alleviate the over-smoothing problem. The intuition is that the differentiated features of the nodes should be properly preserved to ensure the uniqueness of the nodes themselves. Thus, a constraint term to the objective function of the GCN is added to emphasise the differentiation features of the nodes themselves. The experimental results show that the proposed fusion method can achieve more satisfied performance in finger bi-modal biometric recognition, and the proposed constrained GCN can well alleviate the problem of over-smoothing.

人类手指是生物特征的重要载体。手指本身包含指纹和手指静脉等多模态特征,为手指双模态融合识别提供了便利和实用性。手指双模态图像的尺度不一致性和特征空间不匹配是导致融合效果的重要原因。基于图结构的特征提取方法可以很好地解决手指双模态的特征空间失配问题,并且可以基于图卷积神经网络实现端到端的融合识别。然而,这种基于GCNs的融合识别策略仍然存在两个亟待解决的问题:一是缺乏稳定高效的图融合方法;其次,GCN的过平滑问题会导致识别性能的下降。提出了一种融合指纹(FP)和指静脉(FV)图形特征的新方法。此外,我们从优化的角度分析了GCN中信息传输过程与过平滑问题之间的内在关系,并指出相邻节点之间的差分信息随着层数的增加而减少,这是导致过平滑问题的直接原因。提出了一种改进的深度图卷积神经网络,旨在缓解过度平滑问题。直觉是,应该适当地保留节点的差异特征,以确保节点本身的唯一性。因此,为GCN的目标函数添加了一个约束项,以强调节点本身的微分特征。实验结果表明,所提出的融合方法在手指双模态生物特征识别中可以获得更令人满意的性能,并且所提出的约束GCN可以很好地缓解过度平滑的问题。
{"title":"Robust graph fusion and recognition framework for fingerprint and finger-vein","authors":"Zhitao Wu,&nbsp;Hongxu Qu,&nbsp;Haigang Zhang,&nbsp;Jinfeng Yang","doi":"10.1049/bme2.12086","DOIUrl":"https://doi.org/10.1049/bme2.12086","url":null,"abstract":"<p>The human finger is the essential carrier of biometric features. The finger itself contains multi-modal traits, including fingerprint and finger-vein, which provides convenience and practicality for finger bi-modal fusion recognition. The scale inconsistency and feature space mismatch of finger bi-modal images are important reasons for the fusion effect. The feature extraction method based on graph structure can well solve the problem of feature space mismatch for the finger bi-modalities, and the end-to-end fusion recognition can be realised based on graph convolutional neural networks (GCNs). However, this fusion recognition strategy based on GCNs still has two urgent problems: first, lack of stable and efficient graph fusion method; second, over-smoothing problem of GCNs will lead to the degradation of recognition performance. A novel fusion method is proposed to integrate the graph features of fingerprint (FP) and finger-vein (FV). Furthermore, we analyse the inner relationship between the information transmission process and the over-smoothing problem in GCNs from an optimisation perspective, and point out that the differentiated information between neighbouring nodes decreases as the number of layers increases, which is the direct reason for the over-smoothing problem. A modified deep graph convolution neural network is proposed, aiming to alleviate the over-smoothing problem. The intuition is that the differentiated features of the nodes should be properly preserved to ensure the uniqueness of the nodes themselves. Thus, a constraint term to the objective function of the GCN is added to emphasise the differentiation features of the nodes themselves. The experimental results show that the proposed fusion method can achieve more satisfied performance in finger bi-modal biometric recognition, and the proposed constrained GCN can well alleviate the problem of over-smoothing.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 1","pages":"13-24"},"PeriodicalIF":2.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50129907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
25th ICPR—Real-time Visual Surveillance as-a-Service (VSaaS) for smart security solutions 第25届icpr -实时视觉监控即服务(VSaaS)智能安全解决方案
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-07-07 DOI: 10.1049/bme2.12089
Michele Nappi, Hugo Proença, Guodong Guo, Sambit Bakshi

With the advent of ever-fast computing, real-time processing of visual data has been gaining importance in the field of surveillance. Also, automated decision-making by visual surveillance systems has been contributing to a huge leap in the capability of such systems, and of course their relevance in social security.

This special issue aimed to discuss cloud-based architectures of surveillance frameworks as a service. Such systems, especially when deployed to work in real-time, are required to be fast, efficient, and sustainable with a varying load of visual data.

Four papers were selected for inclusion in this special issue.

Wyzykowski et al. present an approach to synthesize realistic, multiresolution and multisensor fingerprints. Based in Anguli, a handcrafted fingerprint generator, they were able to obtain dynamic ridge maps with sweat pores and scratches. Then, a CycleGAN network was trained to transform these maps into realistic fingerprints. Unlike other CNN-based works, this framework is able to generate images with different resolutions and styles for the same identity. Finally, authors conducted a human perception analysis where 60 volunteers could hardly differentiate between real and high-resolution synthesized fingerprints.

Pawar and Attar address the problem of detection and localization of anomalies in surveillance videos, using pipelined deep autoencoders and one-class learning. Specifically, they used a convolutional autoencoder and sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. In this setting, the principle of one-class classification for training the model on normal data and testing it on anomalous testing data was followed.

Tawfik Mohammed et al. describe a framework, implemented in a RAD (Rapid Application Development) paradigm, for performing iris recognition tests, based in the well-known Daugman's processing chain. They start by segmenting the iris ring using the Integro-differential operator, along with an edge-based Hough transform to isolate eyelids and eyelashes. After the normalization of the data (pseudo-polar domain), the features are encoded using 1D log Gabor kernel. Finally, the matching step is carried out using the Hamming distance.

Barra et al. describe an approach for automated head pose estimation that stems from a previous Partitioned Iterated Function Systems (PIFS)-based approach providing state-of-the-art accuracy with high computing cost and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.

随着计算机技术的飞速发展,可视化数据的实时处理在监控领域变得越来越重要。此外,视觉监控系统的自动决策一直在为这类系统的能力带来巨大飞跃,当然,它们在社会安全方面也具有相关性。本期特刊旨在讨论基于云的监控框架架构即服务。这样的系统,特别是在部署为实时工作时,需要快速、高效和可持续地处理不同负载的可视化数据。四篇论文入选本期特刊。Wyzykowski等人提出了一种合成逼真、多分辨率和多传感器指纹的方法。基于Anguli,一个手工制作的指纹生成器,他们能够获得带有汗孔和划痕的动态脊图。然后,训练CycleGAN网络将这些地图转换成真实的指纹。与其他基于cnn的作品不同,该框架能够为同一身份生成不同分辨率和风格的图像。最后,作者进行了一项人类感知分析,让60名志愿者几乎无法区分真实指纹和高分辨率合成指纹。Pawar和Attar使用流水线深度自动编码器和单类学习解决了监控视频中异常的检测和定位问题。具体来说,他们分别以流水线方式使用卷积自编码器和序列到序列长短期记忆自编码器进行视频的空间和时间学习。在这种情况下,采用一类分类的原则,在正常数据上对模型进行训练,在异常测试数据上对模型进行测试。Tawfik Mohammed等人描述了一个框架,在RAD(快速应用开发)范例中实现,用于执行虹膜识别测试,基于著名的道格曼处理链。他们首先使用积分微分算子对虹膜环进行分割,并使用基于边缘的霍夫变换来分离眼睑和睫毛。在对数据进行归一化(伪极域)后,使用1D log Gabor核对特征进行编码。最后,利用汉明距离进行匹配。Barra等人描述了一种自动头部姿态估计方法,该方法源于先前基于分割迭代函数系统(PIFS)的方法,该方法提供了最先进的精度,但计算成本高,并通过两种回归模型(即梯度增强回归器和极端梯度增强回归器)对其进行了改进,从而实现了更快的响应和更低的横摆轴和横摇轴上的平均绝对误差。在BIWI和AFLW2000数据集上进行的实验表明。
{"title":"25th ICPR—Real-time Visual Surveillance as-a-Service (VSaaS) for smart security solutions","authors":"Michele Nappi,&nbsp;Hugo Proença,&nbsp;Guodong Guo,&nbsp;Sambit Bakshi","doi":"10.1049/bme2.12089","DOIUrl":"10.1049/bme2.12089","url":null,"abstract":"<p>With the advent of ever-fast computing, real-time processing of visual data has been gaining importance in the field of surveillance. Also, automated decision-making by visual surveillance systems has been contributing to a huge leap in the capability of such systems, and of course their relevance in social security.</p><p>This special issue aimed to discuss cloud-based architectures of surveillance frameworks as a service. Such systems, especially when deployed to work in real-time, are required to be fast, efficient, and sustainable with a varying load of visual data.</p><p>Four papers were selected for inclusion in this special issue.</p><p>Wyzykowski et al. present an approach to synthesize realistic, multiresolution and multisensor fingerprints. Based in Anguli, a handcrafted fingerprint generator, they were able to obtain dynamic ridge maps with sweat pores and scratches. Then, a CycleGAN network was trained to transform these maps into realistic fingerprints. Unlike other CNN-based works, this framework is able to generate images with different resolutions and styles for the same identity. Finally, authors conducted a human perception analysis where 60 volunteers could hardly differentiate between real and high-resolution synthesized fingerprints.</p><p>Pawar and Attar address the problem of detection and localization of anomalies in surveillance videos, using pipelined deep autoencoders and one-class learning. Specifically, they used a convolutional autoencoder and sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. In this setting, the principle of one-class classification for training the model on normal data and testing it on anomalous testing data was followed.</p><p>Tawfik Mohammed et al. describe a framework, implemented in a RAD (Rapid Application Development) paradigm, for performing iris recognition tests, based in the well-known Daugman's processing chain. They start by segmenting the iris ring using the Integro-differential operator, along with an edge-based Hough transform to isolate eyelids and eyelashes. After the normalization of the data (pseudo-polar domain), the features are encoded using 1D log Gabor kernel. Finally, the matching step is carried out using the Hamming distance.</p><p>Barra et al. describe an approach for automated head pose estimation that stems from a previous Partitioned Iterated Function Systems (PIFS)-based approach providing state-of-the-art accuracy with high computing cost and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"277-278"},"PeriodicalIF":2.0,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89783408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pixel-wise supervision for presentation attack detection on identity document cards 基于像素的身份证件卡表示攻击检测监督
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-06-27 DOI: 10.1049/bme2.12088
Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, Naser Damer

Identity documents (or IDs) play an important role in verifying the identity of a person with wide applications in banks, travel, video-identification services and border controls. Replay or photocopied ID cards can be misused to pass ID control in unsupervised scenarios if the liveness of a person is not checked. To detect such presentation attacks on ID card verification process when presented virtually is a critical step for the biometric systems to assure authenticity. In this paper, a pixel-wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. The authors motivate the approach to use pixel-wise supervision to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. The baseline benchmark is presented using different handcrafted and deep learning models on a newly constructed in-house database obtained from an operational system consisting of 886 users with 433 bona fide, 67 print and 366 display attacks. It is demonstrated that the proposed approach achieves better performance compared to handcrafted features and Deep Models with an Equal Error Rate of 2.22% and Bona fide Presentation Classification Error Rate (BPCER) of 1.83% and 1.67% at Attack Presentation Classification Error Rate of 5% and 10%.

身份证件(或id)在验证个人身份方面发挥着重要作用,在银行、旅行、视频识别服务和边境管制中有着广泛的应用。在无人监督的情况下,如果不检查一个人的活动性,可能会滥用重放或影印的身份证来通过身份控制。在身份证虚拟呈现的验证过程中检测这种呈现攻击是生物识别系统保证身份证真实性的关键步骤。本文提出了一种基于像素的DenseNet监控方法,用于检测打印攻击和数字重播攻击的表示攻击。作者鼓励使用像素级监督的方法来利用各种人工制品上的微小线索,如莫尔纹图案和打印机留下的人工制品。基线基准使用不同的手工和深度学习模型在一个新构建的内部数据库上呈现,该数据库来自一个由886个用户组成的操作系统,其中包含433次真实攻击,67次打印攻击和366次显示攻击。结果表明,在攻击表现分类错误率为5%和10%时,该方法的误差率为2.22%,真实表现分类错误率(BPCER)为1.83%和1.67%,优于手工特征和深度模型。
{"title":"Pixel-wise supervision for presentation attack detection on identity document cards","authors":"Raghavendra Mudgalgundurao,&nbsp;Patrick Schuch,&nbsp;Kiran Raja,&nbsp;Raghavendra Ramachandra,&nbsp;Naser Damer","doi":"10.1049/bme2.12088","DOIUrl":"10.1049/bme2.12088","url":null,"abstract":"<p>Identity documents (or IDs) play an important role in verifying the identity of a person with wide applications in banks, travel, video-identification services and border controls. Replay or photocopied ID cards can be misused to pass ID control in unsupervised scenarios if the liveness of a person is not checked. To detect such presentation attacks on ID card verification process when presented virtually is a critical step for the biometric systems to assure authenticity. In this paper, a pixel-wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. The authors motivate the approach to use pixel-wise supervision to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. The baseline benchmark is presented using different handcrafted and deep learning models on a newly constructed in-house database obtained from an operational system consisting of 886 users with 433 bona fide, 67 print and 366 display attacks. It is demonstrated that the proposed approach achieves better performance compared to handcrafted features and Deep Models with an Equal Error Rate of 2.22% and Bona fide Presentation Classification Error Rate (BPCER) of 1.83% and 1.67% at Attack Presentation Classification Error Rate of 5% and 10%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"383-395"},"PeriodicalIF":2.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72496186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation 性别分类对抗性攻击对人脸识别的可转移性分析:固定和可变攻击扰动
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-06-27 DOI: 10.1049/bme2.12082
Zohra Rezgui, Amina Bassit, Raymond Veldhuis

Most deep learning-based image classification models are vulnerable to adversarial attacks that introduce imperceptible changes to the input images for the purpose of model misclassification. It has been demonstrated that these attacks, targeting a specific model, are transferable among models performing the same task. However, models performing different tasks but sharing the same input space and model architecture were never considered in the transferability scenarios presented in the literature. In this paper, this phenomenon was analysed in the context of VGG16-based and ResNet50-based biometric classifiers. The authors investigate the impact of two white-box attacks on a gender classifier and contrast a defence method as a countermeasure. Then, using adversarial images generated by the attacks, a pre-trained face recognition classifier is attacked in a black-box fashion. Two verification comparison settings are employed, in which images perturbed with the same and different magnitude of the perturbation are compared. The authors’ results indicate transferability in the fixed perturbation setting for a Fast Gradient Sign Method attack and non-transferability in a pixel-guided denoiser attack setting. The interpretation of this non-transferability can support the use of fast and train-free adversarial attacks targeting soft biometric classifiers as means to achieve soft biometric privacy protection while maintaining facial identity as utility.

大多数基于深度学习的图像分类模型容易受到对抗性攻击,这种攻击会给输入图像引入难以察觉的变化,从而导致模型错误分类。已经证明,这些针对特定模型的攻击在执行相同任务的模型之间是可转移的。然而,执行不同任务但共享相同输入空间和模型架构的模型在文献中提出的可转移性场景中从未被考虑过。本文在基于vgg16和基于resnet50的生物特征分类器的背景下对这一现象进行了分析。作者调查了两个白盒攻击对性别分类器的影响,并对比了一种防御方法作为对策。然后,使用攻击生成的对抗图像,以黑盒方式攻击预训练的人脸识别分类器。采用两种验证比较设置,对扰动大小相同和不同的图像进行比较。作者的结果表明,在固定扰动设置下,快速梯度符号方法攻击具有可转移性,而在像素引导去噪攻击设置下则具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。
{"title":"Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation","authors":"Zohra Rezgui,&nbsp;Amina Bassit,&nbsp;Raymond Veldhuis","doi":"10.1049/bme2.12082","DOIUrl":"10.1049/bme2.12082","url":null,"abstract":"<p>Most deep learning-based image classification models are vulnerable to adversarial attacks that introduce imperceptible changes to the input images for the purpose of model misclassification. It has been demonstrated that these attacks, targeting a specific model, are transferable among models performing the same task. However, models performing different tasks but sharing the same input space and model architecture were never considered in the transferability scenarios presented in the literature. In this paper, this phenomenon was analysed in the context of VGG16-based and ResNet50-based biometric classifiers. The authors investigate the impact of two white-box attacks on a gender classifier and contrast a defence method as a countermeasure. Then, using adversarial images generated by the attacks, a pre-trained face recognition classifier is attacked in a black-box fashion. Two verification comparison settings are employed, in which images perturbed with the same and different magnitude of the perturbation are compared. The authors’ results indicate transferability in the fixed perturbation setting for a Fast Gradient Sign Method attack and non-transferability in a pixel-guided denoiser attack setting. The interpretation of this non-transferability can support the use of fast and train-free adversarial attacks targeting soft biometric classifiers as means to achieve soft biometric privacy protection while maintaining facial identity as utility.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"407-419"},"PeriodicalIF":2.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88686270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical analysis of keystroke dynamics in passwords: A longitudinal study 密码击键动力学的实证分析:一项纵向研究
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-06-27 DOI: 10.1049/bme2.12087
Simon Parkinson, Saad Khan, Alexandru-Mihai Badea, Andrew Crampton, Na Liu, Qing Xu

The use of keystroke timings as a behavioural biometric in fixed-text authentication mechanisms has been extensively studied. Previous research has investigated in isolation the effect of password length, character substitution, and participant repetition. These studies have used publicly available datasets, containing a small number of passwords with timings acquired from different experiments. Multiple experiments have also used the participant's first and last name as the password; however, this is not realistic of a password system. Not only is the user's name considered a weak password, but their familiarity with typing the phrase minimises variation in acquired samples as they become more familiar with the new password. Furthermore, no study has considered the combined impact of length, substitution, and repetition using the same participant pool. This is explored in this work, where the authors collected timings for 65 participants, when typing 40 passwords with varying characteristics, 4 times per week for 8 weeks. A total of 81,920 timing samples were processed using an instance-based distance and threshold matching approach. Results of this study provide empirical insight into how a password policy should be created to maximise the accuracy of the biometric system when considering substitution type and longitudinal effects.

在固定文本认证机制中,击键定时作为一种行为生物特征的使用已经得到了广泛的研究。先前的研究已经单独调查了密码长度、字符替换和参与者重复的影响。这些研究使用了公开的数据集,其中包含从不同实验中获得的少量密码和时间。多个实验还使用参与者的名字和姓氏作为密码;然而,这对于密码系统来说是不现实的。用户的名字不仅被认为是一个弱密码,而且随着他们对新密码的熟悉,他们对键入短语的熟悉程度将获得的样本中的变化降至最低。此外,没有任何研究考虑使用同一参与者库的长度、替代和重复的综合影响。这项工作对这一点进行了探索,作者收集了65名参与者在输入40个不同特征的密码时的时间安排,每周4次,持续8周。使用基于实例的距离和阈值匹配方法总共处理了81920个时序样本。这项研究的结果为在考虑替代类型和纵向影响时如何创建密码策略以最大限度地提高生物识别系统的准确性提供了经验见解。
{"title":"An empirical analysis of keystroke dynamics in passwords: A longitudinal study","authors":"Simon Parkinson,&nbsp;Saad Khan,&nbsp;Alexandru-Mihai Badea,&nbsp;Andrew Crampton,&nbsp;Na Liu,&nbsp;Qing Xu","doi":"10.1049/bme2.12087","DOIUrl":"https://doi.org/10.1049/bme2.12087","url":null,"abstract":"<p>The use of keystroke timings as a behavioural biometric in fixed-text authentication mechanisms has been extensively studied. Previous research has investigated in isolation the effect of password length, character substitution, and participant repetition. These studies have used publicly available datasets, containing a small number of passwords with timings acquired from different experiments. Multiple experiments have also used the participant's first and last name as the password; however, this is not realistic of a password system. Not only is the user's name considered a weak password, but their familiarity with typing the phrase minimises variation in acquired samples as they become more familiar with the new password. Furthermore, no study has considered the combined impact of length, substitution, and repetition using the same participant pool. This is explored in this work, where the authors collected timings for 65 participants, when typing 40 passwords with varying characteristics, 4 times per week for 8 weeks. A total of 81,920 timing samples were processed using an instance-based distance and threshold matching approach. Results of this study provide empirical insight into how a password policy should be created to maximise the accuracy of the biometric system when considering substitution type and longitudinal effects.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 1","pages":"25-37"},"PeriodicalIF":2.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption 混合生物识别模板保护:解决在布隆过滤器和同态加密之间选择的痛苦
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2022-06-16 DOI: 10.1049/bme2.12075
Amina Bassit, Florian Hahn, Raymond Veldhuis, Andreas Peter

Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison. However, the pros and cons of BF- and HE-based BTPs are not well studied in literature. We investigate the strengths and weaknesses of these two approaches since both seem promising from a theoretical viewpoint. Our key insight is to extend our theoretical investigation to cover the practical case of iris recognition on the ground that iris (1) benefits from the alignment-free property of BFs and (2) induces huge computational burdens when implemented in the HE-encrypted domain. BF-based BTPs can be implemented to be either fast with high recognition accuracy while missing the important privacy property of ‘unlinkability’, or to be fast with unlinkability-property while missing the high accuracy. HE-based BTPs, on the other hand, are highly secure, achieve good accuracy, and meet the unlinkability-property, but they are much slower than BF-based approaches. As a synthesis, we propose a hybrid BTP scheme that combines the good properties of BFs and HE, ensuring unlinkability and high recognition accuracy, while being about seven times faster than the traditional HE-based approach.

布隆过滤器(BFs)和同态加密(HE)是设计生物特征模板保护(BTP)方案的重要技术,其目的是在生物特征存储和比较过程中保护敏感的生物特征信息。然而,基于BF和he的BTPs的优缺点在文献中并没有得到很好的研究。我们研究了这两种方法的优缺点,因为从理论的角度来看,这两种方法都很有希望。我们的关键见解是将我们的理论研究扩展到涵盖虹膜识别的实际情况,因为虹膜(1)受益于BFs的无对齐特性,(2)在he加密域实现时会产生巨大的计算负担。基于bf的btp可以实现既快速又具有高识别精度,但缺少“不可链接性”这一重要的隐私属性,也可以实现具有不可链接性而缺少高准确性的快速。另一方面,基于he的btp安全性高,精度高,满足不可链接性,但速度比基于bf的方法慢得多。作为一种综合,我们提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不链接性和高识别精度,同时比传统的基于HE的方法快7倍左右。
{"title":"Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption","authors":"Amina Bassit,&nbsp;Florian Hahn,&nbsp;Raymond Veldhuis,&nbsp;Andreas Peter","doi":"10.1049/bme2.12075","DOIUrl":"10.1049/bme2.12075","url":null,"abstract":"<p>Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison. However, the pros and cons of BF- and HE-based BTPs are not well studied in literature. We investigate the strengths and weaknesses of these two approaches since both seem promising from a theoretical viewpoint. Our key insight is to extend our theoretical investigation to cover the practical case of iris recognition on the ground that iris (1) benefits from the alignment-free property of BFs and (2) induces huge computational burdens when implemented in the HE-encrypted domain. BF-based BTPs can be implemented to be either fast with high recognition accuracy while missing the important privacy property of ‘unlinkability’, or to be fast with unlinkability-property while missing the high accuracy. HE-based BTPs, on the other hand, are highly secure, achieve good accuracy, and meet the unlinkability-property, but they are much slower than BF-based approaches. As a synthesis, we propose a hybrid BTP scheme that combines the good properties of BFs and HE, ensuring unlinkability and high recognition accuracy, while being about seven times faster than the traditional HE-based approach.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"430-444"},"PeriodicalIF":2.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90056623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1