Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.
{"title":"A robust covariate-invariant gait recognition based on pose features","authors":"Anubha Parashar, Apoorva Parashar, Rajveer Singh Shekhawat","doi":"10.1049/bme2.12103","DOIUrl":"10.1049/bme2.12103","url":null,"abstract":"<p>Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"601-613"},"PeriodicalIF":2.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77215002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.
The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as Presentation Attack Detection for Face and Iris, Biometric Template Protection Schemes and Deep Learning techniques for Biometrics.
Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.
Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo
本期IET生物识别特刊“BIOSIG 2021高效、可靠和隐私友好型生物识别特刊”以2021年版生物识别特别兴趣小组(BIOSIG)会议为起点。本期特刊收集了有关生物识别的研究成果,从新的角度探讨了生物识别系统和方法的效率、可靠性和隐私性。“BIOSIG 2021高效、可靠和隐私友好型生物识别技术特刊”包含12篇论文,其中几篇是BIOSIG 2021会议上发表的论文的扩展版本,涉及生物识别技术的具体研究领域,如面部和虹膜的呈现攻击检测,生物识别模板保护方案和生物识别的深度学习技术。论文“人脸变形攻击与人脸图像质量:变形的影响和攻击的质量可检测性”由傅碧颖和Naser Damer撰写。本文讨论了与真实样本相比,变形过程对感知图像质量和图像在人脸识别(FR)中的效用的影响。这项工作提供了变形对人脸图像质量的影响的广泛分析,包括一般图像质量测量和人脸图像效用测量,分析了六种不同的变形技术和五种不同的数据源,使用10种不同的质量测量。变形攻击的质量分数与某些质量度量测量的真实样本之间具有一致的可分离性,这支持了基于质量分数进行无监督变形攻击检测(MAD)的提议。该研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。结果表明,MagFace和CNNNIQA等一组质量度量可以用于无监督的广义MAD,正确分类准确率超过70%。论文“基于像素的ID卡表示攻击检测监督”由Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra和Naser Damer撰写。本文解决了假身份证的检测问题,这些假身份证被打印出来,然后在无监督的环境中以数字方式呈现,用于生物识别认证目的。作者提出了一种基于像素监督的方法,使用DenseNet来利用各种人工制品上的微小线索,如波纹图案和打印机留下的人工制品。为了测试提议的系统,从一个操作系统中获得了一个新的数据库,该数据库由886个用户组成,其中有433次真实攻击,67次打印攻击和366次显示攻击(由于GPDR法规而未公开)。与手工特征和深度学习模型相比,该方法具有更好的性能,相等错误率(EER)为2.22%,真实表示分类错误率(BPCER)为1.83%和1.67%;攻击表示分类错误率(APCER)分别为5%和10%。论文“Deep Patch-Wise Supervision for Presentation Attack Detection”由Alperen kantarci, Hasan Dertli和Hazım Ekenel撰写。本文研究了人脸表示攻击检测(PAD)中的泛化问题。具体来说,基于卷积神经网络(CNN)的系统由于其在数据集内实验中的高性能,最近获得了显著的普及。然而,这些系统往往不能泛化到他们没有训练过的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种新的表示攻击检测(PAD)方法,该方法将逐像素二进制监督与基于补丁的CNN相结合。实验表明,基于补丁的方法使模型不需要记忆背景信息或特定于数据集的轨迹。该方法在广泛使用的PAD数据集(replay - mobile, OULU-NPU)和为真实PAD用例收集的真实数据集上进行了测试。结果表明,该方法在具有挑战性的实验设置中具有优越性。也就是说,它在OULU-NPU协议3,4和数据集间真实世界实验中取得了更高的性能。Zohra Rezgui, Amina Bassit和Raymond Veldhuis撰写的论文“性别分类对抗性攻击到人脸识别的可转移性分析:固定和可变攻击扰动”。本文主要研究对抗性攻击的可转移性问题。 这项工作的动机是,在文献中证明了这些针对特定模型的攻击在执行相同任务的模型之间是可转移的,然而,对于执行不同任务但共享相同输入空间和模型架构的模型,文献中没有考虑可转移性场景。在本文中,作者研究了基于vgg16和基于resnet50的生物识别分类器的上述挑战。研究了两种白盒攻击对性别分类器的影响,然后采用特征引导去噪方法评估了它们对防御方法的鲁棒性。一旦确定了这些攻击在欺骗性别分类器方面的有效性,我们就以黑盒方式测试了它们从性别分类任务到具有类似架构的面部识别任务的可转移性。采用了两种验证比较设置,其中作者比较了扰动大小相同和不同的图像。研究结果表明,在固定扰动条件下,快速梯度符号法(FGSM)攻击具有可转移性,在投影梯度下降法(PGD)攻击条件下具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。论文“结合二维纹理和三维几何特征进行可靠的虹膜呈现攻击检测,使用光场焦点堆栈”由罗正全,王云龙,刘年峰,王子磊撰写。在本文中,作者利用光场(LF)成像和深度学习(DL)的优点,将二维纹理和三维几何特征结合起来进行虹膜呈现攻击检测(PAD)。提出的研究探索了在渲染焦点堆栈上面向平面和面向序列的深度神经网络(dnn)的现成深度特征。该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在三维几何结构和二维空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。结果表明,所提出的框架的变体明显超过了以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至是最近在所采用的数据库上进行微调的最先进的方法。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。论文“混合生物识别模板保护:解决布隆过滤器和同态加密之间选择的痛苦”由Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis和Andreas Peter撰写。本文讨论了生物特征模板保护(BTP)方案的发展,研究了布隆过滤器(BFs)和同态加密(HE)的优缺点。本文指出,基于bf和he的BTPs的优缺点在文献中没有得到很好的研究,从理论角度来看,这两种方法似乎都很有希望。因此,本文从理论角度对现有的基于bf的BTPs和基于he的BTPs进行了比较研究,考察了它们的优缺点。将这种比较应用于虹膜识别作为研究案例,在相同的设置、数据集和实现语言上测试了BTP方法的生物特征和运行时性能。作为本研究的综合,作者提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不可链接性和较高的识别精度,同时比传统的基于HE的方法快7倍左右。对该方案的评估证实了其生物识别精度(IITD虹膜数据库的EER为0:17%)和运行效率(128、192和256位安全级别分别为104:35 ms、155:15 ms和171:70 ms)。论文“Locality Preserving Binary Face Representations Using Auto-encoders”由Mohamed Amine HMANI, Dijana petrovska - delacr<s:1> taz和
{"title":"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics","authors":"Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":"10.1049/bme2.12101","url":null,"abstract":"<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"355-358"},"PeriodicalIF":2.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87752844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"https://doi.org/10.1049/bme2.12102","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"31 1","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86037260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"10.1049/bme2.12102","url":null,"abstract":"<p>With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118745131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.
{"title":"Locality preserving binary face representations using auto-encoders","authors":"Mohamed Amine Hmani, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi","doi":"10.1049/bme2.12096","DOIUrl":"10.1049/bme2.12096","url":null,"abstract":"<p>Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"445-458"},"PeriodicalIF":2.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76420898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen
Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.
{"title":"Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication","authors":"Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen","doi":"10.1049/bme2.12099","DOIUrl":"10.1049/bme2.12099","url":null,"abstract":"<p>Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"485-497"},"PeriodicalIF":2.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75585054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma
To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.
{"title":"Robust medical zero-watermarking algorithm based on Residual-DenseNet","authors":"Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma","doi":"10.1049/bme2.12100","DOIUrl":"10.1049/bme2.12100","url":null,"abstract":"<p>To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"547-556"},"PeriodicalIF":2.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74311418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves
Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.
{"title":"Towards understanding the character of quality sampling in deep learning face recognition","authors":"Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves","doi":"10.1049/bme2.12095","DOIUrl":"10.1049/bme2.12095","url":null,"abstract":"<p>Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"498-511"},"PeriodicalIF":2.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.
IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072
Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch。基于深度人脸表征的doppelgängers可靠检测。IET生物识别2022年5月;11(3): 215 - 224。https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072
{"title":"The following article for this Special Issue was published in a different Issue","authors":"","doi":"10.1049/bme2.12098","DOIUrl":"10.1049/bme2.12098","url":null,"abstract":"<p>Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch. Reliable detection of doppelgängers based on deep face representations.</p><p>IET Biometrics 2022 May; 11(3):215–224. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/bme2.12072</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"529"},"PeriodicalIF":2.0,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77611670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.
{"title":"Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality","authors":"Biying Fu, Naser Damer","doi":"10.1049/bme2.12094","DOIUrl":"https://doi.org/10.1049/bme2.12094","url":null,"abstract":"<p>Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. Previous studies touched on the issue of the quality of morphing attack images, however, with the main goal of quantitatively proofing the realistic appearance of the produced morphing attacks. The authors theorise that the morphing processes might have an effect on both, the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. Towards investigating this theory, this work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures. This analysis is not limited to a single morphing technique but rather looks at six different morphing techniques and five different data sources using ten different quality measures. This analysis reveals consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures. The authors’ study goes further to build on this effect and investigate the possibility of performing unsupervised morphing attack detection (MAD) based on quality scores. The authors’ study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The authors’ final results point out that a set of quality measures, such as MagFace and CNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"359-382"},"PeriodicalIF":2.0,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134878988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}