{"title":"Fingerprint verification competition at IJCB2011","authors":"R. Cappelli, M. Ferrara, D. Maltoni, F. Turroni","doi":"10.1109/IJCB.2011.6117488","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117488","url":null,"abstract":"This paper summarizes the results of the fingerprint verification competition organized in conjunction with IJCB 2011. The competition focused on benchmarks covering both proprietary encoding and ISO template format. Considering the benchmarks difficulty, some of the algorithms submitted achieved very good accuracy: a 0.7% EER and a 1.1% EER were obtained on two challenging benchmarks, using proprietary and ISO template formats, respectively. Based on the participant self-description of the best performing algorithms we tried to figure out the most promising building-block technologies.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge
{"title":"Facial recognition of identical twins","authors":"Matthew Pruitt, Jason M. Grant, Jeffrey R. Paone, P. Flynn, R. Bruegge","doi":"10.1109/IJCB.2011.6117476","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117476","url":null,"abstract":"Biometric identification systems must be able to distinguish between individuals even in situations where the bio metric signature may be similar, such as in the case of identical twins. This paper presents experiments done in facial recognition using data from a set of images of twins. This work establishes the current state of facial recognition in regards to twins and the accuracy of current state-of-the art programs in distinguishing between identical twins using three commercial face matchers, Cognitec 8.3.2.0, VeriLook 4.0, and PittPatt 4.2.1 and a baseline matcher employing Local Region PCA. Overall, it was observed that Cognitec had the best performance. All matchers, how ever, saw degradation in performance compared to an experiment where the ability to distinguish unrelated persons was assessed. In particular, lighting and expression seemed to have affected performance the most.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-line signature verification using wavelet packet","authors":"Kaiyue Wang, Yunhong Wang, Zhaoxiang Zhang","doi":"10.1109/IJCB.2011.6117587","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117587","url":null,"abstract":"In this paper, we propose a novel approach for on-line signature verification using wavelet packet. Signatures are first normalized and resampled, thus they have the same number of sample points. Then, several types of local features are extracted, so that wavelet transform can be applied on them. After that, we conduct experiments to select the best local features, wavelet bases and wavelet packet settings. Also, experiments are carried out to verify the reliability and efficiency of our approach, which performs better than discrete wavelet transform and competes with the state-of-arts.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusion of region-based representations for gender identification","authors":"S. D. Hu, Brendan Jou, Aaron Jaech, M. Savvides","doi":"10.1109/IJCB.2011.6117602","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117602","url":null,"abstract":"Much of the current work on gender identification relies on legacy datasets of heavily controlled images with minimal facial appearance variations. As studies explore the effects of adding elements of variation into the data, they have met challenges in achieving granular statistical significance due to the limited size of their datasets. In this study, we aim to create a classification framework that is robust to non-studio, uncontrolled, real-world images. We show that the fusion of separate linear classifiers trained on smart-selected local patches achieves 90% accuracy, which is a 5% improvement over a baseline linear classifier on a straightforward pixel representation. These results are reported on our own uncontrolled database of ∼26; 700 images collected from the Web.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi
{"title":"Phase registration in a gallery improving gait authentication","authors":"T. N. Thanh, Yasushi Makihara, H. Nagahara, R. Sagawa, Y. Mukaigawa, Y. Yagi","doi":"10.1109/IJCB.2011.6117527","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117527","url":null,"abstract":"In this paper, we propose a method of inertial sensor-based gait authentication by inter-period phase registration of an owner's gallery. In spite of the importance for gait authentication of constructing a gallery of phase-registered gait patterns, previous implementations just relied on simple methods of period detection based on heuristic knowledge such as local peaks/valleys or local auto-correlation of the gait signals. Consequently, we propose to improve a gait gallery by incorporating a phase registration technique which globally optimizes inter-period phase consistency in an energy minimization framework. However, the previous phase registration technique suffers from a phase distortion problem due to ambiguities in the combination of a periodic signal function and a phase evolution function. We present a linear phase evolution prior to constructing an undistorted gait signal for better matching performance. Experiments using real gait signals from 32 subjects show that the proposed methods outperform the latest methods in the field.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint template protection with Minutia Vicinity Decomposition","authors":"Zhe Jin, A. Teoh","doi":"10.1109/IJCB.2011.6117597","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117597","url":null,"abstract":"Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity leakage mitigation on asymmetric secure sketch","authors":"Chengfang Fang, Qiming Li, E. Chang","doi":"10.1109/IJCB.2011.6117542","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117542","url":null,"abstract":"We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliary information extracted from the set of samples, such as variances or weights of the features, in clear. Since the auxiliary information is revealed, an adversary can potentially use it to determine the relationship among multiple sketches, and gather information on the identity of the sketches. In this paper, we give a formal formulation of secure sketch under the asymmetric setting, and propose two schemes that mix the identity-dependent auxiliary information within the sketch. Our analysis shows that while our schemes maintain similar bounds of information loss compared to schemes that reveal the auxiliary information, they offer better privacy protection by limiting the linkages among sketches.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of quality-based fusion of face and iris biometrics","authors":"Peter A. Johnson, Fang Hua, S. Schuckers","doi":"10.1109/IJCB.2011.6117481","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117481","url":null,"abstract":"Multimodal systems have been used for the increased robustness of biometric recognition tasks. A unique strength of multimodal systems can be found when presented with biometric samples of degraded quality in a subset of the modalities. This study looks at the effect of quality degradation on system performance using the Q-FIRE database. The Q-FIRE database is a multimodal database composed of face and iris biometrics captured at defined quality levels, controlled at acquisition. This database allows for assessment of biometric system performance pertaining to image quality factors. Methods for measuring image quality based on illumination conditions are explored as well as strategies for incorporating these quality metrics into a multimodal fusion algorithm. This paper provides further evidence in a unique dataset that utilizing sample quality metrics into the fusion scheme of a multimodal system improves system performance in non-ideal acquisition environments.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak
{"title":"Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics","authors":"Arik Messerman, Tarik Mustafic, S. Çamtepe, S. Albayrak","doi":"10.1109/IJCB.2011.6117552","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117552","url":null,"abstract":"Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu
{"title":"BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries","authors":"N. Houmani, S. Garcia-Salicetti, B. Dorizzi, J. Filho, J. Canuto, M. Andrade, Yu Qiao, Xingxing Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz-Leszczynska, Michal Kudelski, M. Faúndez-Zanuy, J. M. Pascual-Gaspar, Valentín Cardeñoso-Payo, C. Vivaracho-Pascual, Enrique Argones-Rúa, J. Alba-Castro, A. Kholmatov, B. Yanikoglu","doi":"10.1109/IJCB.2011.6117487","DOIUrl":"https://doi.org/10.1109/IJCB.2011.6117487","url":null,"abstract":"In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA'2011). The objective of ESRA'2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems' performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems' resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of “bad” quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}