Tomasz Moron, K. Bernacki, J. Fiolka, Jia Peng, A. Popowicz
{"title":"Recognition of the finger vascular system using multi-wavelength imaging","authors":"Tomasz Moron, K. Bernacki, J. Fiolka, Jia Peng, A. Popowicz","doi":"10.1049/bme2.12068","DOIUrl":"https://doi.org/10.1049/bme2.12068","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"71 1","pages":"249-259"},"PeriodicalIF":2.0,"publicationDate":"2022-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90390516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When only one sample per person (OSPP) is registered in the gallery, it is difficult for ear recognition methods to sufficiently and effectively reduce the search range of the matching features, thus resulting in low computational efficiency and mismatch problems. A 3D ear biometric system using OSPP is proposed to solve this problem. By categorising ear images by shape and establishing the corresponding relationship between keypoints from ear images and regions (regional cluster) on the directional proposals that can be arranged to roughly face the ear image, the corresponding keypoints are obtained. Then, ear recognition is performed by combining corresponding keypoints and a multi-keypoint descriptor sparse representation classification method. The experimental results conducted on the University of Notre Dame Collection J2 dataset yielded a rank-1 recognition rate of 98.84%; furthermore, the time for one identification operation shared by each gallery subject was 0.047 ms.
当图库中每个人只有一个样本(OSPP)注册时,耳识别方法难以充分有效地缩小匹配特征的搜索范围,从而导致计算效率低和不匹配问题。为了解决这一问题,提出了一种基于OSPP的三维耳生物识别系统。通过对耳图像进行形状分类,在大致面向耳图像的可排列方向建议上,建立耳图像关键点与区域(区域聚类)的对应关系,得到相应的关键点。然后,将相应的关键点与多关键点描述符稀疏表示分类方法相结合进行人耳识别。在University of Notre Dame Collection J2数据集上进行的实验结果显示,rank-1识别率为98.84%;此外,每个画廊受试者共享一次识别操作的时间为0.047 ms。
{"title":"Corresponding keypoint constrained sparse representation three-dimensional ear recognition via one sample per person","authors":"Qinping Zhu, Zhichun Mu, Li Yuan","doi":"10.1049/bme2.12067","DOIUrl":"https://doi.org/10.1049/bme2.12067","url":null,"abstract":"<p>When only one sample per person (OSPP) is registered in the gallery, it is difficult for ear recognition methods to sufficiently and effectively reduce the search range of the matching features, thus resulting in low computational efficiency and mismatch problems. A 3D ear biometric system using OSPP is proposed to solve this problem. By categorising ear images by shape and establishing the corresponding relationship between keypoints from ear images and regions (regional cluster) on the directional proposals that can be arranged to roughly face the ear image, the corresponding keypoints are obtained. Then, ear recognition is performed by combining corresponding keypoints and a multi-keypoint descriptor sparse representation classification method. The experimental results conducted on the University of Notre Dame Collection J2 dataset yielded a rank-1 recognition rate of 98.84%; furthermore, the time for one identification operation shared by each gallery subject was 0.047 ms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 3","pages":"225-248"},"PeriodicalIF":2.0,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91794343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reza Shakerian, Meisam Yadollahzadeh-Tabari, Seyed Yaser Bozorgi Rad
Human Activity Recognition (HAR) is the process of identifying and analysing activities performed by a person (or persons). This paper proposes an efficient HAR system based on wearable sensors that uses deep learning techniques. The proposed HAR takes the advantage of staking Convolutional Neural Network and Long Short-Term (LSTM), for extracting the high-level features of the sensors data and for learning the time-series behaviour of the abstracted data, respectively. This paper proposed a Fuzzy Soft-max classifier for the dense layer which classifies the output of LSTM Blocks to the associated activity classes. The authors’ decision for proposing this classifier was because sensor data related to the resembling human activities, such as walking and running or opening door and closing door, are often very similar to each other. For this reason, the authors expect that adding fuzzy inference power to the standard Soft-max classifier will increase its accuracy for distinguishing between similar activities. The authors were also interested in considering a post-processing module that considers activity classification over a longer period. Using the proposed Fuzzy Soft-max classifier and by the post-processing technique, the authors were able to reach the 97.03 and 85.1 rates of accuracy for the PAMAP2 and Opportunity dataset, respectively.
{"title":"Proposing a Fuzzy Soft-max-based classifier in a hybrid deep learning architecture for human activity recognition","authors":"Reza Shakerian, Meisam Yadollahzadeh-Tabari, Seyed Yaser Bozorgi Rad","doi":"10.1049/bme2.12066","DOIUrl":"10.1049/bme2.12066","url":null,"abstract":"<p>Human Activity Recognition (HAR) is the process of identifying and analysing activities performed by a person (or persons). This paper proposes an efficient HAR system based on wearable sensors that uses deep learning techniques. The proposed HAR takes the advantage of staking Convolutional Neural Network and Long Short-Term (LSTM), for extracting the high-level features of the sensors data and for learning the time-series behaviour of the abstracted data, respectively. This paper proposed a Fuzzy Soft-max classifier for the dense layer which classifies the output of LSTM Blocks to the associated activity classes. The authors’ decision for proposing this classifier was because sensor data related to the resembling human activities, such as walking and running or opening door and closing door, are often very similar to each other. For this reason, the authors expect that adding fuzzy inference power to the standard Soft-max classifier will increase its accuracy for distinguishing between similar activities. The authors were also interested in considering a post-processing module that considers activity classification over a longer period. Using the proposed Fuzzy Soft-max classifier and by the post-processing technique, the authors were able to reach the 97.03 and 85.1 rates of accuracy for the PAMAP2 and Opportunity dataset, respectively.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"171-186"},"PeriodicalIF":2.0,"publicationDate":"2022-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84241402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch
—Doppelg¨angers (or lookalikes) usually yield an in- creased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non- mated comparison trials. In this work, we assess the impact of doppelg¨angers on the HDA Doppelg¨anger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system. It is found that doppelg¨anger image pairs yield very high similarity scores resulting in a significant increase of false match rates. Further, we propose a doppelg ¨ anger detection method which distinguishes doppelg¨angers from mated comparison trials by analysing differences in deep representations obtained from face image pairs. The proposed detection system employs a machine learning-based classifier, which is trained with generated doppelg¨anger image pairs utilising face morphing techniques. Experimental evaluations conducted on the HDA Doppelg¨anger and Look-Alike Face databases reveal a detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelg¨angers.
{"title":"Reliable Detection of Doppelgängers based on Deep Face Representations","authors":"C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch","doi":"10.1049/bme2.12072","DOIUrl":"https://doi.org/10.1049/bme2.12072","url":null,"abstract":"—Doppelg¨angers (or lookalikes) usually yield an in- creased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non- mated comparison trials. In this work, we assess the impact of doppelg¨angers on the HDA Doppelg¨anger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system. It is found that doppelg¨anger image pairs yield very high similarity scores resulting in a significant increase of false match rates. Further, we propose a doppelg ¨ anger detection method which distinguishes doppelg¨angers from mated comparison trials by analysing differences in deep representations obtained from face image pairs. The proposed detection system employs a machine learning-based classifier, which is trained with generated doppelg¨anger image pairs utilising face morphing techniques. Experimental evaluations conducted on the HDA Doppelg¨anger and Look-Alike Face databases reveal a detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelg¨angers.","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"73 1","pages":"215-224"},"PeriodicalIF":2.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81434886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the need for increased security measures for monitoring and safeguarding the activities, video anomaly detection is considered as one of the significant research aspects in the domain of computer vision. Assigning human personnel to continuously check the surveillance videos for finding suspicious activities such as violence, robbery, wrong U-turns, to mention a few, is a laborious and error-prone task. It gives rise to the need for devising automated video surveillance systems ensuring security. Motivated by the same, this paper addresses the problem of detection and localization of anomalies from surveillance videos using pipelined deep autoencoders and one-class learning. Specifically, we used a convolutional autoencoder and a sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. The authors followed the principle of one-class classification for training the model on normal data and testing it on anomalous testing data. The authors achieved a reasonably significant performance in terms of an equal error rate and the time required for anomaly detection and localization comparable to standard benchmarked approaches, thus, qualifies to work in a near-real-time manner for anomaly detection and localization.
{"title":"Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos","authors":"Karishma Pawar, Vahida Attar","doi":"10.1049/bme2.12064","DOIUrl":"10.1049/bme2.12064","url":null,"abstract":"<p>Due to the need for increased security measures for monitoring and safeguarding the activities, video anomaly detection is considered as one of the significant research aspects in the domain of computer vision. Assigning human personnel to continuously check the surveillance videos for finding suspicious activities such as violence, robbery, wrong U-turns, to mention a few, is a laborious and error-prone task. It gives rise to the need for devising automated video surveillance systems ensuring security. Motivated by the same, this paper addresses the problem of detection and localization of anomalies from surveillance videos using pipelined deep autoencoders and one-class learning. Specifically, we used a convolutional autoencoder and a sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. The authors followed the principle of one-class classification for training the model on normal data and testing it on anomalous testing data. The authors achieved a reasonably significant performance in terms of an equal error rate and the time required for anomaly detection and localization comparable to standard benchmarked approaches, thus, qualifies to work in a near-real-time manner for anomaly detection and localization.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"289-303"},"PeriodicalIF":2.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73763275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch
The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries. This work presents a method of indexing biometric databases, which relies on signal-level fusion of facial images (morphing) to create a multi-stage data structure and retrieval protocol. By successively pre-filtering the list of potential candidate identities, the proposed method makes it possible to reduce the necessary number of biometric template comparisons to complete a biometric identification transaction. The proposed method is extensively evaluated on publicly available databases using open-source and commercial off-the-shelf recognition systems. The results show that using the proposed method, the computational workload can be reduced down to around 30% while the biometric performance of a baseline exhaustive search-based retrieval is fully maintained, both in closed-set and open-set identification scenarios.
{"title":"Signal-level fusion for indexing and retrieval of facial biometric data","authors":"Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch","doi":"10.1049/bme2.12063","DOIUrl":"10.1049/bme2.12063","url":null,"abstract":"<p>The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries. This work presents a method of indexing biometric databases, which relies on signal-level fusion of facial images (morphing) to create a multi-stage data structure and retrieval protocol. By successively pre-filtering the list of potential candidate identities, the proposed method makes it possible to reduce the necessary number of biometric template comparisons to complete a biometric identification transaction. The proposed method is extensively evaluated on publicly available databases using open-source and commercial off-the-shelf recognition systems. The results show that using the proposed method, the computational workload can be reduced down to around 30% while the biometric performance of a baseline exhaustive search-based retrieval is fully maintained, both in closed-set and open-set identification scenarios.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"141-156"},"PeriodicalIF":2.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83820934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile devices. Thus, security or privacy breaches are a major challenge. To protect mobile systems and the private information on these systems from being accessed by adversaries, a framework for mobile user identification through the use of a multimodal behavioural biometrics scheme with a keystroke trajectory feature is presented herein. Conventionally, mobile devices have been protected by mechanisms such as PINs or passwords. However, these approaches have numerous disadvantages. Therefore, approaches that employ keystroke biometrics for secure and reliable mobile device identification have been proposed. Because unimodal behavioural biometrics identification mechanisms have limited accuracy and effectiveness, a multimodal scheme that includes different behavioural biometric traits, such as keystroke and swipe biometric traits, is examined. However, the information provided by the spatial and temporal features of keystroke biometrics is not comprehensive. Therefore, a trajectory model is derived to describe the behavioural biometric uniqueness of a user. In the user identification phase, a multistream recurrent neural network (RNN) is adopted. The results reveal that the proposed trajectory model performs well, and the multimodal scheme using an RNN with a late fusion method provides accurate identification results. The proposed system achieved an accuracy of 95.29%, F1 score of 94.64%, and equal error rate of 1.78%. Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.
{"title":"Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform","authors":"Ka-Wing Tse, Kevin Hung","doi":"10.1049/bme2.12065","DOIUrl":"10.1049/bme2.12065","url":null,"abstract":"<p>Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile devices. Thus, security or privacy breaches are a major challenge. To protect mobile systems and the private information on these systems from being accessed by adversaries, a framework for mobile user identification through the use of a multimodal behavioural biometrics scheme with a keystroke trajectory feature is presented herein. Conventionally, mobile devices have been protected by mechanisms such as PINs or passwords. However, these approaches have numerous disadvantages. Therefore, approaches that employ keystroke biometrics for secure and reliable mobile device identification have been proposed. Because unimodal behavioural biometrics identification mechanisms have limited accuracy and effectiveness, a multimodal scheme that includes different behavioural biometric traits, such as keystroke and swipe biometric traits, is examined. However, the information provided by the spatial and temporal features of keystroke biometrics is not comprehensive. Therefore, a trajectory model is derived to describe the behavioural biometric uniqueness of a user. In the user identification phase, a multistream recurrent neural network (RNN) is adopted. The results reveal that the proposed trajectory model performs well, and the multimodal scheme using an RNN with a late fusion method provides accurate identification results. The proposed system achieved an accuracy of 95.29%, F1 score of 94.64%, and equal error rate of 1.78%. Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"157-170"},"PeriodicalIF":2.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel, S. O. Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"https://doi.org/10.1049/bme2.12060","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"1 1","pages":"87-96"},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76257411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel, Sunday Olusanya Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"10.1049/bme2.12060","url":null,"abstract":"<p>With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"87-96"},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118570025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}