鲁棒生物识别系统的表示学习研究进展

IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE IET Biometrics Pub Date : 2022-10-31 DOI:10.1049/bme2.12104
Imad Rida, Gian Luca Marcialis, Lunke Fei, Dan Istrate, Julian Fierrez
{"title":"鲁棒生物识别系统的表示学习研究进展","authors":"Imad Rida,&nbsp;Gian Luca Marcialis,&nbsp;Lunke Fei,&nbsp;Dan Istrate,&nbsp;Julian Fierrez","doi":"10.1049/bme2.12104","DOIUrl":null,"url":null,"abstract":"<p>Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.</p><p>The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.</p><p>Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.</p><p>The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.</p><p>The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.</p><p>Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.</p><p>Gong et al. proposed a novel deep learning-based robust zero-watermarking algorithm. Indeed, they designed a Residual-DenseNet, which took the low-frequency features. The proposed algorithm neither modified the original image in the watermark generation stage nor required the original image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm showed robust performance under both conventional and geometric attacks.</p><p>Parashar and Shekhawat proposed a reversible gait anonymisation pipeline that modifies gait geometry by morphing the images. The modified data prevents hackers from making use of the dataset for adversarial attacks. The obtained findings open new research directions regarding the adversarial attacks and privacy protection related to gait recognition data sets.</p><p>Li et al. proposed a palmprint recognition method based on the line feature local tri-directional patterns. First, the line features of palmprint images, including orientation and magnitude, are extracted. Then, the directional features are encoded as tri-directional patterns. The tri-directional patterns reflect the direction changes in the local area. Finally, the features are constructed by the tri-directional patterns, orientation and magnitude features. Experiments on PolyU, PolyU Multi-spectral, Tongji, CASIA and IITD palmprint databases showed that the proposed technique achieved promising results.</p><p>Wu et al. established a pen-holding hand pose (PHHP) image dataset representing the largest vision-based PHHP dataset ever collected. A coarse-to-fine PHHP recognition network consisting of a coarse multi-feature learning network and a fine pen-grasping-specific feature learning network was also introduced. Experimental results showed that the proposed method can achieve a very competitive PHHP recognition performance when compared with the baseline recognition models.</p><p>Aguiar de Lima et al. investigated the effects of languages on speaker identification systems and the phonetic impact on their performance. The experiments were performed using three widely spoken languages: Portuguese, English, and Chinese.</p><p>Sun et al. proposed a novel classification algorithm based on Convolutional Neural Network to improve the diagnostic performance for breast cancer on mammography. The experimental results showed that the proposed algorithm greatly improves the classification performance and diagnostic speed of mammographic breast mass, which is of great significance for breast cancer diagnosis.</p><p>Parashar et al. proposed an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. The experiments showed very promising results.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"531-533"},"PeriodicalIF":1.8000,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12104","citationCount":"0","resultStr":"{\"title\":\"Guest editorial: Recent advances in representation learning for robust biometric recognition systems\",\"authors\":\"Imad Rida,&nbsp;Gian Luca Marcialis,&nbsp;Lunke Fei,&nbsp;Dan Istrate,&nbsp;Julian Fierrez\",\"doi\":\"10.1049/bme2.12104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.</p><p>The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.</p><p>Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.</p><p>The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.</p><p>The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.</p><p>Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.</p><p>Gong et al. proposed a novel deep learning-based robust zero-watermarking algorithm. Indeed, they designed a Residual-DenseNet, which took the low-frequency features. The proposed algorithm neither modified the original image in the watermark generation stage nor required the original image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm showed robust performance under both conventional and geometric attacks.</p><p>Parashar and Shekhawat proposed a reversible gait anonymisation pipeline that modifies gait geometry by morphing the images. The modified data prevents hackers from making use of the dataset for adversarial attacks. The obtained findings open new research directions regarding the adversarial attacks and privacy protection related to gait recognition data sets.</p><p>Li et al. proposed a palmprint recognition method based on the line feature local tri-directional patterns. First, the line features of palmprint images, including orientation and magnitude, are extracted. Then, the directional features are encoded as tri-directional patterns. The tri-directional patterns reflect the direction changes in the local area. Finally, the features are constructed by the tri-directional patterns, orientation and magnitude features. Experiments on PolyU, PolyU Multi-spectral, Tongji, CASIA and IITD palmprint databases showed that the proposed technique achieved promising results.</p><p>Wu et al. established a pen-holding hand pose (PHHP) image dataset representing the largest vision-based PHHP dataset ever collected. A coarse-to-fine PHHP recognition network consisting of a coarse multi-feature learning network and a fine pen-grasping-specific feature learning network was also introduced. Experimental results showed that the proposed method can achieve a very competitive PHHP recognition performance when compared with the baseline recognition models.</p><p>Aguiar de Lima et al. investigated the effects of languages on speaker identification systems and the phonetic impact on their performance. The experiments were performed using three widely spoken languages: Portuguese, English, and Chinese.</p><p>Sun et al. proposed a novel classification algorithm based on Convolutional Neural Network to improve the diagnostic performance for breast cancer on mammography. The experimental results showed that the proposed algorithm greatly improves the classification performance and diagnostic speed of mammographic breast mass, which is of great significance for breast cancer diagnosis.</p><p>Parashar et al. proposed an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. The experiments showed very promising results.</p>\",\"PeriodicalId\":48821,\"journal\":{\"name\":\"IET Biometrics\",\"volume\":\"11 6\",\"pages\":\"531-533\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2022-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12104\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Biometrics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12104\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Biometrics","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12104","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

在过去的几十年里,生物识别安全越来越成为增强安全的重要工具,并带来了更大的便利。如今,生物识别系统被政府机构和私营企业广泛使用。尽管为了开发能够在各种条件下运行的强大的生物识别系统已经投入了越来越多的努力,但许多问题仍然有待解决,包括处理不同照明源的技术设计,不受控制的采集条件导致的遮挡和低质量图像。任何生物特征识别系统的性能在很大程度上依赖于找到一个好的和合适的特征表示空间,满足平滑性、聚类、流形、稀疏性和时空相干性,其中来自不同类别的观察得到很好的分离。不幸的是,找到这种适当的表示是一个具有挑战性的问题,这在机器学习和计算机视觉社区引起了极大的兴趣。表征学习方法可以分为两大类:“类内”和“类间”。在第一组中,这些技术试图从原始数据本身中提取有用的信息。它们的范围很广,从基于人类对目标应用(SIFT,局部二值模式,HoG等)的知识的传统手工特征设计,到降维技术(PCA,线性判别分析,因子分析,等距映射,局部线性嵌入等)和特征选择(包装,滤波,嵌入),直到最近在许多应用中取得最先进性能的深度表示。“类间”技术试图找到不同数据观测之间的结构和关系。在这一组中,我们可以找到度量/核学习,研究不同示例之间的空间或时间关系,而子空间/流形学习技术寻求发现潜在的固有结构属性。本期特刊的目的是为世界各地的研究人员提供一个舞台,发表他们在鲁棒生物识别系统的表示学习方面的最新和原创成果。经过认真的同行评议和修改,本特刊共有八篇文章被接受发表。Li等人提出了一种基于加速kaze离散余弦变换(AKAZE-DCT)的水印算法,以解决图像水印算法对几何攻击鲁棒性差的问题。首先将AKAZE-DCT提取的特征与感知哈希相结合,然后对水印图像进行逻辑混沌位错加密,最后采用零水印技术对水印进行嵌入和提取。实验结果表明,该算法在常规攻击和几何攻击下均能有效提取水印,具有较好的鲁棒性和不可见性。Gong等人提出了一种新的基于深度学习的鲁棒零水印算法。事实上,他们设计了一个残差densenet,它采用了低频特征。该算法在水印生成阶段不修改原始图像,在水印提取阶段不需要原始图像。此外,该算法还适用于多个水印。实验结果表明,该算法在常规攻击和几何攻击下都具有良好的鲁棒性。Parashar和Shekhawat提出了一种可逆的步态匿名化管道,通过对图像进行变形来修改步态几何形状。修改后的数据可以防止黑客利用数据集进行对抗性攻击。研究结果为步态识别数据集的对抗性攻击和隐私保护开辟了新的研究方向。Li等人提出了一种基于线条特征局部三方向模式的掌纹识别方法。首先,提取掌纹图像的线特征,包括方向和幅度;然后,将方向特征编码为三方向模式。三向模式反映了局部区域的方向变化。最后,利用三方向特征、方向特征和幅度特征构造特征。在PolyU, PolyU多光谱,同济,CASIA和IITD掌纹数据库上的实验表明,该技术取得了良好的效果。Wu等人建立了一个握笔姿势(PHHP)图像数据集,这是迄今为止收集到的最大的基于视觉的PHHP数据集。介绍了一种由粗多特征学习网络和精细抓笔特征学习网络组成的粗到细PHHP识别网络。实验结果表明,与基线识别模型相比,该方法具有很好的PHHP识别性能。Aguiar de Lima等人。 研究了语言对说话人识别系统的影响,以及语音对系统性能的影响。实验使用了三种广泛使用的语言:葡萄牙语、英语和汉语。Sun等人提出了一种基于卷积神经网络的新型分类算法,以提高乳房x光检查对乳腺癌的诊断性能。实验结果表明,本文提出的算法大大提高了乳腺肿块的分类性能和诊断速度,对乳腺癌诊断具有重要意义。Parashar等人提出了一种基于姿态特征的方法,尝试对穿着大衣、携带物品或其他协变量的人进行步态识别。它旨在使用卷积神经网络来估计人类的运动。实验显示出很有希望的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Guest editorial: Recent advances in representation learning for robust biometric recognition systems

Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.

The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.

Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.

The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.

The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.

Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.

Gong et al. proposed a novel deep learning-based robust zero-watermarking algorithm. Indeed, they designed a Residual-DenseNet, which took the low-frequency features. The proposed algorithm neither modified the original image in the watermark generation stage nor required the original image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm showed robust performance under both conventional and geometric attacks.

Parashar and Shekhawat proposed a reversible gait anonymisation pipeline that modifies gait geometry by morphing the images. The modified data prevents hackers from making use of the dataset for adversarial attacks. The obtained findings open new research directions regarding the adversarial attacks and privacy protection related to gait recognition data sets.

Li et al. proposed a palmprint recognition method based on the line feature local tri-directional patterns. First, the line features of palmprint images, including orientation and magnitude, are extracted. Then, the directional features are encoded as tri-directional patterns. The tri-directional patterns reflect the direction changes in the local area. Finally, the features are constructed by the tri-directional patterns, orientation and magnitude features. Experiments on PolyU, PolyU Multi-spectral, Tongji, CASIA and IITD palmprint databases showed that the proposed technique achieved promising results.

Wu et al. established a pen-holding hand pose (PHHP) image dataset representing the largest vision-based PHHP dataset ever collected. A coarse-to-fine PHHP recognition network consisting of a coarse multi-feature learning network and a fine pen-grasping-specific feature learning network was also introduced. Experimental results showed that the proposed method can achieve a very competitive PHHP recognition performance when compared with the baseline recognition models.

Aguiar de Lima et al. investigated the effects of languages on speaker identification systems and the phonetic impact on their performance. The experiments were performed using three widely spoken languages: Portuguese, English, and Chinese.

Sun et al. proposed a novel classification algorithm based on Convolutional Neural Network to improve the diagnostic performance for breast cancer on mammography. The experimental results showed that the proposed algorithm greatly improves the classification performance and diagnostic speed of mammographic breast mass, which is of great significance for breast cancer diagnosis.

Parashar et al. proposed an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. The experiments showed very promising results.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Biometrics
IET Biometrics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
5.90
自引率
0.00%
发文量
46
审稿时长
33 weeks
期刊介绍: The field of biometric recognition - automated recognition of individuals based on their behavioural and biological characteristics - has now reached a level of maturity where viable practical applications are both possible and increasingly available. The biometrics field is characterised especially by its interdisciplinarity since, while focused primarily around a strong technological base, effective system design and implementation often requires a broad range of skills encompassing, for example, human factors, data security and database technologies, psychological and physiological awareness, and so on. Also, the technology focus itself embraces diversity, since the engineering of effective biometric systems requires integration of image analysis, pattern recognition, sensor technology, database engineering, security design and many other strands of understanding. The scope of the journal is intentionally relatively wide. While focusing on core technological issues, it is recognised that these may be inherently diverse and in many cases may cross traditional disciplinary boundaries. The scope of the journal will therefore include any topics where it can be shown that a paper can increase our understanding of biometric systems, signal future developments and applications for biometrics, or promote greater practical uptake for relevant technologies: Development and enhancement of individual biometric modalities including the established and traditional modalities (e.g. face, fingerprint, iris, signature and handwriting recognition) and also newer or emerging modalities (gait, ear-shape, neurological patterns, etc.) Multibiometrics, theoretical and practical issues, implementation of practical systems, multiclassifier and multimodal approaches Soft biometrics and information fusion for identification, verification and trait prediction Human factors and the human-computer interface issues for biometric systems, exception handling strategies Template construction and template management, ageing factors and their impact on biometric systems Usability and user-oriented design, psychological and physiological principles and system integration Sensors and sensor technologies for biometric processing Database technologies to support biometric systems Implementation of biometric systems, security engineering implications, smartcard and associated technologies in implementation, implementation platforms, system design and performance evaluation Trust and privacy issues, security of biometric systems and supporting technological solutions, biometric template protection Biometric cryptosystems, security and biometrics-linked encryption Links with forensic processing and cross-disciplinary commonalities Core underpinning technologies (e.g. image analysis, pattern recognition, computer vision, signal processing, etc.), where the specific relevance to biometric processing can be demonstrated Applications and application-led considerations Position papers on technology or on the industrial context of biometric system development Adoption and promotion of standards in biometrics, improving technology acceptance, deployment and interoperability, avoiding cross-cultural and cross-sector restrictions Relevant ethical and social issues
期刊最新文献
Facial and Neck Region Analysis for Deepfake Detection Using Remote Photoplethysmography Signal Similarity A Multimodal Biometric Recognition Method Based on Federated Learning Deep and Shallow Feature Fusion in Feature Score Level for Palmprint Recognition Research on TCN Model Based on SSARF Feature Selection in the Field of Human Behavior Recognition A Finger Vein Recognition Algorithm Based on the Histogram of Variable Curvature Directional Binary Statistics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1