首页 > 最新文献

IET Biometrics最新文献

英文 中文
Proposing a Fuzzy Soft-max-based classifier in a hybrid deep learning architecture for human activity recognition 在混合深度学习架构中提出一种基于模糊soft -max的分类器,用于人类活动识别
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-02-06 DOI: 10.1049/bme2.12066
Reza Shakerian, Meisam Yadollahzadeh-Tabari, Seyed Yaser Bozorgi Rad

Human Activity Recognition (HAR) is the process of identifying and analysing activities performed by a person (or persons). This paper proposes an efficient HAR system based on wearable sensors that uses deep learning techniques. The proposed HAR takes the advantage of staking Convolutional Neural Network and Long Short-Term (LSTM), for extracting the high-level features of the sensors data and for learning the time-series behaviour of the abstracted data, respectively. This paper proposed a Fuzzy Soft-max classifier for the dense layer which classifies the output of LSTM Blocks to the associated activity classes. The authors’ decision for proposing this classifier was because sensor data related to the resembling human activities, such as walking and running or opening door and closing door, are often very similar to each other. For this reason, the authors expect that adding fuzzy inference power to the standard Soft-max classifier will increase its accuracy for distinguishing between similar activities. The authors were also interested in considering a post-processing module that considers activity classification over a longer period. Using the proposed Fuzzy Soft-max classifier and by the post-processing technique, the authors were able to reach the 97.03 and 85.1 rates of accuracy for the PAMAP2 and Opportunity dataset, respectively.

人类活动识别(HAR)是识别和分析由一个人(或多人)执行的活动的过程。本文提出了一种基于可穿戴传感器的高效HAR系统,该系统采用深度学习技术。所提出的HAR利用了卷积神经网络和长短期(LSTM)的优势,分别用于提取传感器数据的高级特征和学习抽象数据的时间序列行为。本文针对密集层提出了一种模糊Soft-max分类器,将LSTM块的输出分类到相关的活动类。作者决定提出这个分类器是因为与类似人类活动相关的传感器数据,如走路和跑步或开门和关门,通常彼此非常相似。出于这个原因,作者期望在标准Soft-max分类器中添加模糊推理能力将提高其区分类似活动的准确性。作者还对考虑一个后期处理模块感兴趣,该模块可以考虑更长时间内的活动分类。使用所提出的Fuzzy Soft-max分类器和后处理技术,作者能够在PAMAP2和Opportunity数据集上分别达到97.03和85.1的准确率。
{"title":"Proposing a Fuzzy Soft-max-based classifier in a hybrid deep learning architecture for human activity recognition","authors":"Reza Shakerian,&nbsp;Meisam Yadollahzadeh-Tabari,&nbsp;Seyed Yaser Bozorgi Rad","doi":"10.1049/bme2.12066","DOIUrl":"10.1049/bme2.12066","url":null,"abstract":"<p>Human Activity Recognition (HAR) is the process of identifying and analysing activities performed by a person (or persons). This paper proposes an efficient HAR system based on wearable sensors that uses deep learning techniques. The proposed HAR takes the advantage of staking Convolutional Neural Network and Long Short-Term (LSTM), for extracting the high-level features of the sensors data and for learning the time-series behaviour of the abstracted data, respectively. This paper proposed a Fuzzy Soft-max classifier for the dense layer which classifies the output of LSTM Blocks to the associated activity classes. The authors’ decision for proposing this classifier was because sensor data related to the resembling human activities, such as walking and running or opening door and closing door, are often very similar to each other. For this reason, the authors expect that adding fuzzy inference power to the standard Soft-max classifier will increase its accuracy for distinguishing between similar activities. The authors were also interested in considering a post-processing module that considers activity classification over a longer period. Using the proposed Fuzzy Soft-max classifier and by the post-processing technique, the authors were able to reach the 97.03 and 85.1 rates of accuracy for the PAMAP2 and Opportunity dataset, respectively.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84241402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable Detection of Doppelgängers based on Deep Face Representations 基于深度人脸表征的Doppelgängers可靠检测
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-21 DOI: 10.1049/bme2.12072
C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch
—Doppelg¨angers (or lookalikes) usually yield an in- creased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non- mated comparison trials. In this work, we assess the impact of doppelg¨angers on the HDA Doppelg¨anger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system. It is found that doppelg¨anger image pairs yield very high similarity scores resulting in a significant increase of false match rates. Further, we propose a doppelg ¨ anger detection method which distinguishes doppelg¨angers from mated comparison trials by analysing differences in deep representations obtained from face image pairs. The proposed detection system employs a machine learning-based classifier, which is trained with generated doppelg¨anger image pairs utilising face morphing techniques. Experimental evaluations conducted on the HDA Doppelg¨anger and Look-Alike Face databases reveal a detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelg¨angers.
在面部识别系统中,与非配对比较试验中选择的随机面部图像对相反,二重身(或长相相似者)通常会产生更高的错误匹配概率。在这项工作中,我们使用最先进的人脸识别系统评估了二重身对野外数据库中HDA二重身和伪装面部的影响。研究发现,二重身图像对产生非常高的相似性分数,导致错误匹配率显着增加。此外,我们提出了一种二重身检测方法,该方法通过分析从人脸图像对中获得的深度表征的差异来区分二重身和配对比较试验。所提出的检测系统采用基于机器学习的分类器,该分类器使用人脸变形技术生成的二重身图像对进行训练。在HDA二重脸和相似脸数据库上进行的实验评估显示,从二重脸中分离配对身份验证尝试的检测错误率约为2.7%。
{"title":"Reliable Detection of Doppelgängers based on Deep Face Representations","authors":"C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch","doi":"10.1049/bme2.12072","DOIUrl":"https://doi.org/10.1049/bme2.12072","url":null,"abstract":"—Doppelg¨angers (or lookalikes) usually yield an in- creased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non- mated comparison trials. In this work, we assess the impact of doppelg¨angers on the HDA Doppelg¨anger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system. It is found that doppelg¨anger image pairs yield very high similarity scores resulting in a significant increase of false match rates. Further, we propose a doppelg ¨ anger detection method which distinguishes doppelg¨angers from mated comparison trials by analysing differences in deep representations obtained from face image pairs. The proposed detection system employs a machine learning-based classifier, which is trained with generated doppelg¨anger image pairs utilising face morphing techniques. Experimental evaluations conducted on the HDA Doppelg¨anger and Look-Alike Face databases reveal a detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelg¨angers.","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81434886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos 基于级联自编码器和单类学习的深度学习模型用于监控视频异常的检测和定位
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-18 DOI: 10.1049/bme2.12064
Karishma Pawar, Vahida Attar

Due to the need for increased security measures for monitoring and safeguarding the activities, video anomaly detection is considered as one of the significant research aspects in the domain of computer vision. Assigning human personnel to continuously check the surveillance videos for finding suspicious activities such as violence, robbery, wrong U-turns, to mention a few, is a laborious and error-prone task. It gives rise to the need for devising automated video surveillance systems ensuring security. Motivated by the same, this paper addresses the problem of detection and localization of anomalies from surveillance videos using pipelined deep autoencoders and one-class learning. Specifically, we used a convolutional autoencoder and a sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. The authors followed the principle of one-class classification for training the model on normal data and testing it on anomalous testing data. The authors achieved a reasonably significant performance in terms of an equal error rate and the time required for anomaly detection and localization comparable to standard benchmarked approaches, thus, qualifies to work in a near-real-time manner for anomaly detection and localization.

视频异常检测是计算机视觉领域的重要研究方向之一,由于人们对监控和保护活动的安全措施的要求越来越高。指派人员持续检查监控视频,以发现暴力、抢劫、错误掉头等可疑活动,这是一项费力且容易出错的任务。这就产生了设计确保安全的自动视频监控系统的需求。基于此,本文利用流水线深度自编码器和单类学习解决了监控视频异常的检测和定位问题。具体来说,我们分别以流水线方式使用卷积自编码器和序列到序列长短期记忆自编码器进行视频的空间和时间学习。采用一类分类的原则,在正常数据上对模型进行训练,在异常测试数据上对模型进行测试。与标准基准方法相比,作者在错误率和异常检测和定位所需的时间方面取得了相当显著的性能,因此,有资格以近乎实时的方式进行异常检测和定位。
{"title":"Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos","authors":"Karishma Pawar,&nbsp;Vahida Attar","doi":"10.1049/bme2.12064","DOIUrl":"10.1049/bme2.12064","url":null,"abstract":"<p>Due to the need for increased security measures for monitoring and safeguarding the activities, video anomaly detection is considered as one of the significant research aspects in the domain of computer vision. Assigning human personnel to continuously check the surveillance videos for finding suspicious activities such as violence, robbery, wrong U-turns, to mention a few, is a laborious and error-prone task. It gives rise to the need for devising automated video surveillance systems ensuring security. Motivated by the same, this paper addresses the problem of detection and localization of anomalies from surveillance videos using pipelined deep autoencoders and one-class learning. Specifically, we used a convolutional autoencoder and a sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. The authors followed the principle of one-class classification for training the model on normal data and testing it on anomalous testing data. The authors achieved a reasonably significant performance in terms of an equal error rate and the time required for anomaly detection and localization comparable to standard benchmarked approaches, thus, qualifies to work in a near-real-time manner for anomaly detection and localization.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73763275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signal-level fusion for indexing and retrieval of facial biometric data 基于信号级融合的面部生物特征数据索引与检索
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-13 DOI: 10.1049/bme2.12063
Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch

The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries. This work presents a method of indexing biometric databases, which relies on signal-level fusion of facial images (morphing) to create a multi-stage data structure and retrieval protocol. By successively pre-filtering the list of potential candidate identities, the proposed method makes it possible to reduce the necessary number of biometric template comparisons to complete a biometric identification transaction. The proposed method is extensively evaluated on publicly available databases using open-source and commercial off-the-shelf recognition systems. The results show that using the proposed method, the computational workload can be reduced down to around 30% while the biometric performance of a baseline exhaustive search-based retrieval is fully maintained, both in closed-set and open-set identification scenarios.

生物识别技术在世界范围内的应用范围、规模和数量的不断增长,强调了对促进高效、可靠的生物识别查询技术的研究需求。这项工作提出了一种索引生物特征数据库的方法,该方法依赖于面部图像的信号级融合(变形)来创建多阶段数据结构和检索协议。通过对潜在的候选身份进行连续的预过滤,该方法可以减少完成生物特征识别事务所需的生物特征模板比较次数。所提出的方法在使用开源和商业现成识别系统的公开可用数据库上进行了广泛的评估。结果表明,采用该方法,在保持基于基线穷举搜索的生物特征识别性能的同时,可将计算量减少30%左右,无论是在封闭集还是开放集识别场景下。
{"title":"Signal-level fusion for indexing and retrieval of facial biometric data","authors":"Pawel Drozdowski,&nbsp;Fabian Stockhardt,&nbsp;Christian Rathgeb,&nbsp;Christoph Busch","doi":"10.1049/bme2.12063","DOIUrl":"10.1049/bme2.12063","url":null,"abstract":"<p>The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries. This work presents a method of indexing biometric databases, which relies on signal-level fusion of facial images (morphing) to create a multi-stage data structure and retrieval protocol. By successively pre-filtering the list of potential candidate identities, the proposed method makes it possible to reduce the necessary number of biometric template comparisons to complete a biometric identification transaction. The proposed method is extensively evaluated on publicly available databases using open-source and commercial off-the-shelf recognition systems. The results show that using the proposed method, the computational workload can be reduced down to around 30% while the biometric performance of a baseline exhaustive search-based retrieval is fully maintained, both in closed-set and open-set identification scenarios.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83820934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform 在移动平台上使用具有击键轨迹特征和递归神经网络的多模态方案的用户行为生物识别框架
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-11 DOI: 10.1049/bme2.12065
Ka-Wing Tse, Kevin Hung

Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile devices. Thus, security or privacy breaches are a major challenge. To protect mobile systems and the private information on these systems from being accessed by adversaries, a framework for mobile user identification through the use of a multimodal behavioural biometrics scheme with a keystroke trajectory feature is presented herein. Conventionally, mobile devices have been protected by mechanisms such as PINs or passwords. However, these approaches have numerous disadvantages. Therefore, approaches that employ keystroke biometrics for secure and reliable mobile device identification have been proposed. Because unimodal behavioural biometrics identification mechanisms have limited accuracy and effectiveness, a multimodal scheme that includes different behavioural biometric traits, such as keystroke and swipe biometric traits, is examined. However, the information provided by the spatial and temporal features of keystroke biometrics is not comprehensive. Therefore, a trajectory model is derived to describe the behavioural biometric uniqueness of a user. In the user identification phase, a multistream recurrent neural network (RNN) is adopted. The results reveal that the proposed trajectory model performs well, and the multimodal scheme using an RNN with a late fusion method provides accurate identification results. The proposed system achieved an accuracy of 95.29%, F1 score of 94.64%, and equal error rate of 1.78%. Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.

移动设备上使用的应用程序多种多样。由于对信息系统的依赖日益增加,大量的个人和敏感数据存储在移动设备上。因此,安全或隐私泄露是一个重大挑战。为了保护移动系统和这些系统上的私人信息不被对手访问,本文提出了一种通过使用具有击键轨迹特征的多模态行为生物识别方案来识别移动用户的框架。传统上,移动设备是由pin或密码等机制保护的。然而,这些方法有许多缺点。因此,已经提出了采用击键生物识别技术进行安全可靠的移动设备识别的方法。由于单模态行为生物特征识别机制的准确性和有效性有限,因此研究了包括不同行为生物特征(如击键和滑动生物特征)的多模态方案。然而,击键生物识别技术所提供的时空特征信息并不全面。因此,推导了一个轨迹模型来描述用户的行为生物特征唯一性。在用户识别阶段,采用多流递归神经网络(RNN)。结果表明,所提出的轨迹模型具有良好的性能,采用RNN和后期融合方法的多模态方案提供了准确的识别结果。该系统的准确率为95.29%,F1分数为94.64%,平均错误率为1.78%。因此,所提出的移动识别系统能够抵御标准机制可能容易受到的攻击,并对网络安全做出了宝贵贡献。
{"title":"Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform","authors":"Ka-Wing Tse,&nbsp;Kevin Hung","doi":"10.1049/bme2.12065","DOIUrl":"10.1049/bme2.12065","url":null,"abstract":"<p>Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile devices. Thus, security or privacy breaches are a major challenge. To protect mobile systems and the private information on these systems from being accessed by adversaries, a framework for mobile user identification through the use of a multimodal behavioural biometrics scheme with a keystroke trajectory feature is presented herein. Conventionally, mobile devices have been protected by mechanisms such as PINs or passwords. However, these approaches have numerous disadvantages. Therefore, approaches that employ keystroke biometrics for secure and reliable mobile device identification have been proposed. Because unimodal behavioural biometrics identification mechanisms have limited accuracy and effectiveness, a multimodal scheme that includes different behavioural biometric traits, such as keystroke and swipe biometric traits, is examined. However, the information provided by the spatial and temporal features of keystroke biometrics is not comprehensive. Therefore, a trajectory model is derived to describe the behavioural biometric uniqueness of a user. In the user identification phase, a multistream recurrent neural network (RNN) is adopted. The results reveal that the proposed trajectory model performs well, and the multimodal scheme using an RNN with a late fusion method provides accurate identification results. The proposed system achieved an accuracy of 95.29%, F1 score of 94.64%, and equal error rate of 1.78%. Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Spoofing detection on adaptive authentication System-A survey 自适应认证系统a调查中的欺骗检测
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-30 DOI: 10.1049/bme2.12060
Hind Baaqeel, S. O. Olatunji
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel, S. O. Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"https://doi.org/10.1049/bme2.12060","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76257411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spoofing detection on adaptive authentication System-A survey 自适应认证系统a调查中的欺骗检测
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-30 DOI: 10.1049/bme2.12060
Hind Baaqeel, Sunday Olusanya Olatunji

With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.

随着计算机和移动设备的普及,使用生物识别技术进行身份验证受到越来越多的关注。尽管生物识别系统通常提供有效的解决方案,但由于条件的变化和生物识别数据的老化,识别性能往往会随着时间的推移而受到影响,从而导致类内变异性。这个问题是导致生物识别认证系统错误拒绝率高的主要原因之一。幸运的是,这个问题已经通过使用自适应生物识别解决方案得到解决,其中系统逐渐适应用户生物识别的新变化。然而,攻击者可能会利用它们对更改的适应性来破坏存储的模板,要么冒充特定的客户端,要么拒绝对他/她的访问。在这项工作中,作者将通过对自适应认证系统中最先进的欺骗检测解决方案进行比较研究,进行系统的文献综述。本文将确定自适应身份验证系统中需要解决的主要问题。因此,作者的目的是鼓励研究人员开发更强大的适应性解决方案,以克服本研究中已确定的差距。
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel,&nbsp;Sunday Olusanya Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"10.1049/bme2.12060","url":null,"abstract":"<p>With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118570025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometrics and the metaphysics of personal identity 生物计量学与个人身份的形而上学
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-07 DOI: 10.1049/bme2.12062
Amy Kind

The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After discussing the philosophical problem of personal identity, the ways in which the notion of biometric identity connects with, or fails to connect with, the philosophical notion of personal identity is explored. Though there may be some good reasons to use biometric identity to track personal identity, it is contended that biometric identity is not the same thing as personal identity and thus that biometrics researchers should stop talking as if it were.

过去几十年来,生物识别技术的巨大进步带来了一系列紧迫的问题。哲学审查已经致力于许多相关的伦理和政治问题,特别是数据收集中的隐私、偏见和安全问题。但令人惊讶的是,哲学家们很少关注相关的形而上学问题,尤其是与个人身份有关的问题。本文旨在采取一些初步措施来纠正这种疏忽。在讨论了个人身份的哲学问题后,探讨了生物特征身份概念与个人身份哲学概念的联系或不联系。尽管使用生物识别身份来追踪个人身份可能有一些很好的理由,但有人认为,生物识别身份与个人身份不是一回事,因此生物识别研究人员应该停止谈论。
{"title":"Biometrics and the metaphysics of personal identity","authors":"Amy Kind","doi":"10.1049/bme2.12062","DOIUrl":"https://doi.org/10.1049/bme2.12062","url":null,"abstract":"<p>The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After discussing the philosophical problem of personal identity, the ways in which the notion of biometric identity connects with, or fails to connect with, the philosophical notion of personal identity is explored. Though there may be some good reasons to use biometric identity to track personal identity, it is contended that biometric identity is not the same thing as personal identity and thus that biometrics researchers should stop talking as if it were.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50123578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation 基于分段迭代函数系统的快速头部姿态估计的梯度增强回归
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-02 DOI: 10.1049/bme2.12061
Paola Barra, Riccardo Distasi, Chiara Pero, Stefano Ricciardi, Maurizio Tucci

Head pose estimation (HPE) notoriously represents a crucial task for many computer vision applications in robotics, biometry and video surveillance. While, in general, HPE can be performed on both still images and frames extracted from live video or captured footage, its functional approach and the related processing pipeline may have a significant impact on suitability to different application contexts. This implies that, for any real-time application in which HPE is required, this information, namely the angular value of yaw, pitch and roll axes, should be provided in real-time as well. Since, so far, the primary aim in HPE research has been on improving estimation accuracy, there are only a few works reporting the computing time of the proposed HPE method and even less explicitly addressing it. The present work stems from a previous Partitioned Iterated Function Systems-based approach providing state-of-the-art accuracy with high computing cost, and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.

众所周知,头部姿态估计(HPE)是机器人、生物识别和视频监控等许多计算机视觉应用的关键任务。虽然一般来说,HPE可以在静态图像和从实时视频或捕获的镜头中提取的帧上执行,但其功能方法和相关处理管道可能会对不同应用环境的适用性产生重大影响。这意味着,对于任何需要HPE的实时应用,也应该实时提供这些信息,即偏航轴、俯仰轴和滚轴的角度值。由于到目前为止,HPE研究的主要目标是提高估计精度,因此只有少数工作报告了所提出的HPE方法的计算时间,甚至更少明确地解决它。目前的工作源于先前基于分区迭代函数系统的方法,该方法提供了最先进的精度,但计算成本高,并通过梯度增强回归和极端梯度增强回归两种回归模型对其进行了改进,实现了更快的响应速度和更低的横摆和横摇轴平均绝对误差,如在BIWI和AFLW2000数据集上进行的实验所示。
{"title":"Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation","authors":"Paola Barra,&nbsp;Riccardo Distasi,&nbsp;Chiara Pero,&nbsp;Stefano Ricciardi,&nbsp;Maurizio Tucci","doi":"10.1049/bme2.12061","DOIUrl":"10.1049/bme2.12061","url":null,"abstract":"<p>Head pose estimation (HPE) notoriously represents a crucial task for many computer vision applications in robotics, biometry and video surveillance. While, in general, HPE can be performed on both still images and frames extracted from live video or captured footage, its functional approach and the related processing pipeline may have a significant impact on suitability to different application contexts. This implies that, for any real-time application in which HPE is required, this information, namely the angular value of yaw, pitch and roll axes, should be provided in real-time as well. Since, so far, the primary aim in HPE research has been on improving estimation accuracy, there are only a few works reporting the computing time of the proposed HPE method and even less explicitly addressing it. The present work stems from a previous Partitioned Iterated Function Systems-based approach providing state-of-the-art accuracy with high computing cost, and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81149191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition HandSegNet:使用卷积神经网络进行非接触式掌纹识别的手部分割
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2021-11-20 DOI: 10.1049/bme2.12058
Koichi Ito, Yusei Suzuki, Hiroya Kawai, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi

Extracting a palm region with fixed location from an input hand image is a crucial task for palmprint recognition to realise reliable person authentication under contactless and unconstrained conditions. A palm region can be extracted from the fixed location using the gaps between fingers. An accurate and robust hand segmentation method is indispensable to extract a palm region from an image with complex background taken under various environments. In this study, HandSegNet, which is a hand segmentation method using Convolutional Neural Network (CNN) for contactless palmprint recognition, is proposed. HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. The effectiveness of HandSegNet in contactless palmprint recognition through experiments using a set of synthesised images of hand images is also demonstrated. Comparing the performance of palmprint recognition using three conventional methods and HandSegNet for palm region extraction, the proposed method has the lowest equal error rate of 4.995%, demonstrating its effectiveness in palm region extraction for contactless palmprint recognition.

从输入的手图像中提取固定位置的掌纹区域是实现无接触、无约束条件下可靠的人身份认证的关键。可以利用手指之间的间隙从固定位置提取手掌区域。要从各种环境下拍摄的复杂背景图像中提取手掌区域,一种准确、鲁棒的手部分割方法是必不可少的。本文提出了一种基于卷积神经网络(CNN)的手部分割方法HandSegNet,用于非接触式掌纹识别。HandSegNet采用了一种新的CNN架构,该架构由一个带有金字塔池模块的编码器-解码器模型组成。通过对一组合成手图像的性能评价,HandSegNet的分割准确率为98.90%,相交优于联合的分割准确率为93.20%。通过一组合成手图像的实验,验证了HandSegNet在非接触式掌纹识别中的有效性。对比三种传统掌纹识别方法和HandSegNet掌纹区域提取方法的性能,该方法的等错误率最低,为4.995%,证明了该方法在非接触式掌纹识别掌纹区域提取中的有效性。
{"title":"HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition","authors":"Koichi Ito,&nbsp;Yusei Suzuki,&nbsp;Hiroya Kawai,&nbsp;Takafumi Aoki,&nbsp;Masakazu Fujio,&nbsp;Yosuke Kaga,&nbsp;Kenta Takahashi","doi":"10.1049/bme2.12058","DOIUrl":"10.1049/bme2.12058","url":null,"abstract":"<p>Extracting a palm region with fixed location from an input hand image is a crucial task for palmprint recognition to realise reliable person authentication under contactless and unconstrained conditions. A palm region can be extracted from the fixed location using the gaps between fingers. An accurate and robust hand segmentation method is indispensable to extract a palm region from an image with complex background taken under various environments. In this study, HandSegNet, which is a hand segmentation method using Convolutional Neural Network (CNN) for contactless palmprint recognition, is proposed. HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. The effectiveness of HandSegNet in contactless palmprint recognition through experiments using a set of synthesised images of hand images is also demonstrated. Comparing the performance of palmprint recognition using three conventional methods and HandSegNet for palm region extraction, the proposed method has the lowest equal error rate of 4.995%, demonstrating its effectiveness in palm region extraction for contactless palmprint recognition.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91114489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
IET Biometrics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1