{"title":"Combining multiple iris texture features for unconstrained recognition in visible wavelengths","authors":"Esbern Andersen-Hoppe, C. Rathgeb, C. Busch","doi":"10.1109/IWBF.2017.7935090","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935090","url":null,"abstract":"Recognizing individuals in unconstrained environments without their cooperation, e.g. based on surveillance imagery, represents an active field of research. Non-cooperative iris recognition based on images captured at visible wavelength (VW) represents an extremely challenging task. To enhance the reliability of recognition systems using VW iris images, and to enable their use in forensic applications, state-of-the-art approaches additionally employ periocular information surrounding the eye. Hence, a fusion of information obtained from multiple biometric characteristics is vital in scenarios where the quality of biometric samples is severely affected by numerous factors. In this paper, we investigate the potential of a multi-algorithm fusion employing iris texture information extracted from VW iris images. Features extracted by four types of algorithms, i.e. conventional methods, keypoint-based methods, generic texture descriptors, and colour-based methods, are combined to improve the recognition accuracy. By performing a weighted score-level fusion of comparison scores obtained by four different types of feature extractors, improvements in biometric performance of 15% and 27% are achieved on subsets of the publicly available UBIRISv2 and MobBIO iris database, respectively.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amrit Pal Singh Bhogal, Dominik Söllinger, P. Trung, A. Uhl
{"title":"Non-reference image quality assessment for biometric presentation attack detection","authors":"Amrit Pal Singh Bhogal, Dominik Söllinger, P. Trung, A. Uhl","doi":"10.1109/IWBF.2017.7935080","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935080","url":null,"abstract":"Non-reference image quality measures are used to distinguish real biometric data from data as used in presentation / sensor spoofing attacks. An experimental study shows that based on a set of 6 such measures, classification of real vs. fake iris, fingerprint, and face data is feasible with an accuracy of 90% on average. However, we have found that the best quality measure (combination) and classification setting highly depends on the target dataset. Thus, we are unable to provide any other recommendation than to optimise the choice of quality measure and classification setting for each specific application setting.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Gomez-Barrero, C. Rathgeb, U. Scherhag, C. Busch
{"title":"Is your biometric system robust to morphing attaeks?","authors":"M. Gomez-Barrero, C. Rathgeb, U. Scherhag, C. Busch","doi":"10.1109/IWBF.2017.7935079","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935079","url":null,"abstract":"The wide deployment of biometric recognition systems has raised several concerns regarding their security. Among other threats, morphing attacks consist of the infiltration of artificial images created using biometric information of two or more subjects. These morphed images are hence positively matched to several subjects. Recent studies have shown that such images pose a concrete threat to civil security: wanted criminal offenders can use an authentic passport to enter a country with a false identity. However, there is still no quantitative manner to analyse this threat. We address this shortcoming by proposing a new framework for the evaluation of the vulnerability of biometric systems to morphing attacks. The experimental analysis on real systems based on face, iris and fingerprint shows that even systems providing high verification accuracy are vulnerable to this kind of attacks, depending on the verification threshold and the shape of the mated and non-mated score distributions.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Wasnik, K. Raja, Ramachandra Raghavendra, C. Busch
{"title":"Assessing face image quality for smartphone based face recognition system","authors":"P. Wasnik, K. Raja, Ramachandra Raghavendra, C. Busch","doi":"10.1109/IWBF.2017.7935089","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935089","url":null,"abstract":"In recent years, the popularity of smartphones has increased massively as a personal and authentication device. Face based biometrics is being used to secure the device and control access to several different services via smartphones such as payment gateways etc. Thus, to maintain the reliability and to obtain better verification performance, there is a need to adopt the standards recommended for face sample quality. In this paper, we present an evaluation of face image quality assessment using well-established ISO standards on the images collected using smartphones. In this work, we constructed a new database of 101 individuals with 22 frontal face images with different facial pose angles, illumination and at five different distances between the subject and the mobile device. We evaluate the existing quality metrics and further propose a new quality metric based on vertical edge density that can robustly estimate the pose variations and improves the quality estimation of a face image. The proposed method is evaluated for reliable estimation of the quality for smartphone face biometrics.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The LV dataset: A realistic surveillance video dataset for abnormal event detection","authors":"Roberto Leyva, Victor Sanchez, Chang-Tsun Li","doi":"10.1109/IWBF.2017.7935096","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935096","url":null,"abstract":"In recent years, designing and testing video anomaly detection methods have focused on synthetic or unrealistic sequences. This has mainly four drawbacks: 1) events are controlled and predictable because they are usually performed by actors; 2) environmental conditions, e.g. camera motion and illumination, are usually ideal thus realistic conditions are not well reflected; 3) events are usually short and repetitive; and 4) the material is captured from scenarios that do not necessarily match the testing scenarios. This leads us to propose a new rich collection of realistic videos captured by surveillance cameras in challenging environmental conditions, the Live Videos (LV) dataset. We explore the performance of a number of state-of-the-art video anomaly detection methods on the LV dataset. Our results confirm the need to design methods that are capable of handling realistic videos captured by surveillance cameras with acceptable processing times. The proposed LV dataset, thus, will facilitate the design and testing of such new methods.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alireza Sepas-Moghaddam, V. Chiesa, P. Correia, F. Pereira, J. Dugelay
{"title":"The IST-EURECOM Light Field Face Database","authors":"Alireza Sepas-Moghaddam, V. Chiesa, P. Correia, F. Pereira, J. Dugelay","doi":"10.1109/IWBF.2017.7935086","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935086","url":null,"abstract":"Light field cameras are emerging as powerful devices to capture rich scene representations that provide unique advantages for analysis and representation purposes. Some recent works have shown the power and usefulness of the richer information carried out by light field imaging, notably for face recognition. However, it is still difficult to fully assess how face recognition technology can benefit from these novel imaging sensors, notably due to the lack of appropriate test material. To support face recognition research exploiting light field images, the IST-EURECOM Light Field Face Database (IST-EURECOM LFFD) is presented in this paper. The purpose is to report the public availability of a light field face database which should be instrumental for designing, testing and validating light field imaging based recognition systems. The proposed face database includes data from 100 subjects, captured by a Lytro ILLUM camera in two 1–6 months separated sessions, with 20 samples per each person per session. To simulate multiple scenarios, the images are captured with several facial variations, covering a range of emotions, actions, poses, illuminations, and occlusions. The database includes the raw light field images, 2D rendered images and associated depth maps, along with a rich set of metadata. The IST-EURECOM LFFD is expected to become a valuable addition to existing face database repositories.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Juarez-Sandoval, Eduardo Fragoso-Navarro, M. Cedillo-Hernández, M. Nakano-Miyatake, H. Meana, Antonio Cedillo-Hernández
{"title":"Improved unseen-visible watermarking for copyrigth protection of digital image","authors":"O. Juarez-Sandoval, Eduardo Fragoso-Navarro, M. Cedillo-Hernández, M. Nakano-Miyatake, H. Meana, Antonio Cedillo-Hernández","doi":"10.1109/IWBF.2017.7935084","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935084","url":null,"abstract":"Nowadays consumers of worldwide can capture digital image and video scene using several multimedia devices such as smartphones, tablets and cameras. Thus, the data captured may be easily copied or transmitted without any control and as consequence the intellectual property of the owner can be infringed, causing economic or moral damages. This fact suggests the necessity to develop security tools such as watermarking, to confront problems associated with the copyright protection. In this paper we propose an improved unseen-visible watermarking algorithm for copyright protection of digital color images. Unseen-visible watermarking is a recent approach that takes advantages of the visible and invisible watermarking, such as the readability and imperceptibility respectively, preserving the robustness of both. The design of the proposed method is based on Just Noticeable Difference (JND), Total Variation-based image decomposition and an image enhancement criterion. The watermark can be readable with a naked eye through the manipulation of image enhancement of the display device. Experimental results show that the scheme is effective for digital color images, preserving a high imperceptibility and its computational complexity is low.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Juarez-Sandoval, M. Cedillo-Hernández, G. Sánchez-Pérez, K. Toscano-Medina, H. Meana, M. Nakano-Miyatake
{"title":"Compact image steganalysis for LSB-matching steganography","authors":"O. Juarez-Sandoval, M. Cedillo-Hernández, G. Sánchez-Pérez, K. Toscano-Medina, H. Meana, M. Nakano-Miyatake","doi":"10.1109/IWBF.2017.7935103","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935103","url":null,"abstract":"In this paper, we propose a compact image steganalysis method for the LSB-matching steganography, in which a feature vector composed by only 12 elements is extracted from the image. We analyze the statistical artifact occurred in images when a secret data is embedded in it by the LSB-matching steganography. We selected 12 most relevant features based on the probability density function (PDF) of difference of adjacent pixels and the co-occurrence matrix of the image, which can distinguish stegoimages from the natural images. The Support Vector Machine (SVM) is employed as classifier using the training vectors with 12 elements. The experimental results show that the proposed scheme provides a better discriminate performance than previously proposed methods that require a larger amount of feature elements, such as 27, 35 and 225 feature elements, respectively, for their discriminations.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117166977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramachandra Raghavendra, S. Venkatesh, K. Raja, C. Busch
{"title":"Transferable deep convolutional neural network features for fingervein presentation attack detection","authors":"Ramachandra Raghavendra, S. Venkatesh, K. Raja, C. Busch","doi":"10.1109/IWBF.2017.7935108","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935108","url":null,"abstract":"Presentation attacks (or spoofing) on finger-vein biometric capture devices are gaining increased attention because of their wider deployment in multiple secure applications. In this work. we propose a novel method for fingervein Presentation Attack Detection (PAD) by exploring the transfer learning ability of Deep Convolutional Neural Network (CNN). To this extent, we have considered the pre-trained Alex-Net architecture and augmented the existing architecture with additional seven layers to improve the reliability and reduce over-fitting problem. We then fine-tune the modified CNN architecture with the fingervein presentation attack samples to make it adaptable to fingervein Presentation Attack Detection (PAD). Extensive experiments are carried out using two different fingervein presentation attack databases with two different fingervein artefact species generated using two different kinds of printers. Obtained results show consistently high performance of the proposed scheme on both databases that further indicate the robustness and efficiency.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122688646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reversible data hiding scheme for image interpolation based on reference matrix","authors":"Chinchen Chang, T. Nguyen, Yanjun Liu","doi":"10.1109/IWBF.2017.7935098","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935098","url":null,"abstract":"Data hiding is a security technique used to conceal secret information into digital media. Reversible data hiding can guarantee that the secret message can be extracted correctly and that the cover image can be reconstructed exactly. In this paper, we presented our design of a new reversible data hiding scheme, which is based on Sudoku reference matrix and can enhance the performance of some reversible data hiding schemes for image interpolation. This allows embedding more secret bits into a pair of pixels while maintaining the small distortion of the stego-image. Our experimental results indicate that the proposed scheme had a higher embedding capacity than some other previous schemes. In addition, the proposed scheme maintains a better visual quality of the stego-image than some existing schemes.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}