2017 5th International Workshop on Biometrics and Forensics (IWBF)最新文献

筛选
英文 中文
Combining multiple iris texture features for unconstrained recognition in visible wavelengths 结合多个虹膜纹理特征,实现可见光无约束识别
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935090
Esbern Andersen-Hoppe, C. Rathgeb, C. Busch
{"title":"Combining multiple iris texture features for unconstrained recognition in visible wavelengths","authors":"Esbern Andersen-Hoppe, C. Rathgeb, C. Busch","doi":"10.1109/IWBF.2017.7935090","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935090","url":null,"abstract":"Recognizing individuals in unconstrained environments without their cooperation, e.g. based on surveillance imagery, represents an active field of research. Non-cooperative iris recognition based on images captured at visible wavelength (VW) represents an extremely challenging task. To enhance the reliability of recognition systems using VW iris images, and to enable their use in forensic applications, state-of-the-art approaches additionally employ periocular information surrounding the eye. Hence, a fusion of information obtained from multiple biometric characteristics is vital in scenarios where the quality of biometric samples is severely affected by numerous factors. In this paper, we investigate the potential of a multi-algorithm fusion employing iris texture information extracted from VW iris images. Features extracted by four types of algorithms, i.e. conventional methods, keypoint-based methods, generic texture descriptors, and colour-based methods, are combined to improve the recognition accuracy. By performing a weighted score-level fusion of comparison scores obtained by four different types of feature extractors, improvements in biometric performance of 15% and 27% are achieved on subsets of the publicly available UBIRISv2 and MobBIO iris database, respectively.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-reference image quality assessment for biometric presentation attack detection 生物特征表示攻击检测的非参考图像质量评估
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935080
Amrit Pal Singh Bhogal, Dominik Söllinger, P. Trung, A. Uhl
{"title":"Non-reference image quality assessment for biometric presentation attack detection","authors":"Amrit Pal Singh Bhogal, Dominik Söllinger, P. Trung, A. Uhl","doi":"10.1109/IWBF.2017.7935080","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935080","url":null,"abstract":"Non-reference image quality measures are used to distinguish real biometric data from data as used in presentation / sensor spoofing attacks. An experimental study shows that based on a set of 6 such measures, classification of real vs. fake iris, fingerprint, and face data is feasible with an accuracy of 90% on average. However, we have found that the best quality measure (combination) and classification setting highly depends on the target dataset. Thus, we are unable to provide any other recommendation than to optimise the choice of quality measure and classification setting for each specific application setting.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Is your biometric system robust to morphing attaeks? 你的生物识别系统能抵御变形攻击吗?
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935079
M. Gomez-Barrero, C. Rathgeb, U. Scherhag, C. Busch
{"title":"Is your biometric system robust to morphing attaeks?","authors":"M. Gomez-Barrero, C. Rathgeb, U. Scherhag, C. Busch","doi":"10.1109/IWBF.2017.7935079","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935079","url":null,"abstract":"The wide deployment of biometric recognition systems has raised several concerns regarding their security. Among other threats, morphing attacks consist of the infiltration of artificial images created using biometric information of two or more subjects. These morphed images are hence positively matched to several subjects. Recent studies have shown that such images pose a concrete threat to civil security: wanted criminal offenders can use an authentic passport to enter a country with a false identity. However, there is still no quantitative manner to analyse this threat. We address this shortcoming by proposing a new framework for the evaluation of the vulnerability of biometric systems to morphing attacks. The experimental analysis on real systems based on face, iris and fingerprint shows that even systems providing high verification accuracy are vulnerable to this kind of attacks, depending on the verification threshold and the shape of the mated and non-mated score distributions.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Assessing face image quality for smartphone based face recognition system 基于智能手机的人脸识别系统的人脸图像质量评估
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935089
P. Wasnik, K. Raja, Ramachandra Raghavendra, C. Busch
{"title":"Assessing face image quality for smartphone based face recognition system","authors":"P. Wasnik, K. Raja, Ramachandra Raghavendra, C. Busch","doi":"10.1109/IWBF.2017.7935089","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935089","url":null,"abstract":"In recent years, the popularity of smartphones has increased massively as a personal and authentication device. Face based biometrics is being used to secure the device and control access to several different services via smartphones such as payment gateways etc. Thus, to maintain the reliability and to obtain better verification performance, there is a need to adopt the standards recommended for face sample quality. In this paper, we present an evaluation of face image quality assessment using well-established ISO standards on the images collected using smartphones. In this work, we constructed a new database of 101 individuals with 22 frontal face images with different facial pose angles, illumination and at five different distances between the subject and the mobile device. We evaluate the existing quality metrics and further propose a new quality metric based on vertical edge density that can robustly estimate the pose variations and improves the quality estimation of a face image. The proposed method is evaluated for reliable estimation of the quality for smartphone face biometrics.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The LV dataset: A realistic surveillance video dataset for abnormal event detection LV数据集:用于异常事件检测的现实监控视频数据集
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935096
Roberto Leyva, Victor Sanchez, Chang-Tsun Li
{"title":"The LV dataset: A realistic surveillance video dataset for abnormal event detection","authors":"Roberto Leyva, Victor Sanchez, Chang-Tsun Li","doi":"10.1109/IWBF.2017.7935096","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935096","url":null,"abstract":"In recent years, designing and testing video anomaly detection methods have focused on synthetic or unrealistic sequences. This has mainly four drawbacks: 1) events are controlled and predictable because they are usually performed by actors; 2) environmental conditions, e.g. camera motion and illumination, are usually ideal thus realistic conditions are not well reflected; 3) events are usually short and repetitive; and 4) the material is captured from scenarios that do not necessarily match the testing scenarios. This leads us to propose a new rich collection of realistic videos captured by surveillance cameras in challenging environmental conditions, the Live Videos (LV) dataset. We explore the performance of a number of state-of-the-art video anomaly detection methods on the LV dataset. Our results confirm the need to design methods that are capable of handling realistic videos captured by surveillance cameras with acceptable processing times. The proposed LV dataset, thus, will facilitate the design and testing of such new methods.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
The IST-EURECOM Light Field Face Database IST-EURECOM光场人脸数据库
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935086
Alireza Sepas-Moghaddam, V. Chiesa, P. Correia, F. Pereira, J. Dugelay
{"title":"The IST-EURECOM Light Field Face Database","authors":"Alireza Sepas-Moghaddam, V. Chiesa, P. Correia, F. Pereira, J. Dugelay","doi":"10.1109/IWBF.2017.7935086","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935086","url":null,"abstract":"Light field cameras are emerging as powerful devices to capture rich scene representations that provide unique advantages for analysis and representation purposes. Some recent works have shown the power and usefulness of the richer information carried out by light field imaging, notably for face recognition. However, it is still difficult to fully assess how face recognition technology can benefit from these novel imaging sensors, notably due to the lack of appropriate test material. To support face recognition research exploiting light field images, the IST-EURECOM Light Field Face Database (IST-EURECOM LFFD) is presented in this paper. The purpose is to report the public availability of a light field face database which should be instrumental for designing, testing and validating light field imaging based recognition systems. The proposed face database includes data from 100 subjects, captured by a Lytro ILLUM camera in two 1–6 months separated sessions, with 20 samples per each person per session. To simulate multiple scenarios, the images are captured with several facial variations, covering a range of emotions, actions, poses, illuminations, and occlusions. The database includes the raw light field images, 2D rendered images and associated depth maps, along with a rich set of metadata. The IST-EURECOM LFFD is expected to become a valuable addition to existing face database repositories.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Improved unseen-visible watermarking for copyrigth protection of digital image 改进的数字图像版权保护的不可见水印
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935084
O. Juarez-Sandoval, Eduardo Fragoso-Navarro, M. Cedillo-Hernández, M. Nakano-Miyatake, H. Meana, Antonio Cedillo-Hernández
{"title":"Improved unseen-visible watermarking for copyrigth protection of digital image","authors":"O. Juarez-Sandoval, Eduardo Fragoso-Navarro, M. Cedillo-Hernández, M. Nakano-Miyatake, H. Meana, Antonio Cedillo-Hernández","doi":"10.1109/IWBF.2017.7935084","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935084","url":null,"abstract":"Nowadays consumers of worldwide can capture digital image and video scene using several multimedia devices such as smartphones, tablets and cameras. Thus, the data captured may be easily copied or transmitted without any control and as consequence the intellectual property of the owner can be infringed, causing economic or moral damages. This fact suggests the necessity to develop security tools such as watermarking, to confront problems associated with the copyright protection. In this paper we propose an improved unseen-visible watermarking algorithm for copyright protection of digital color images. Unseen-visible watermarking is a recent approach that takes advantages of the visible and invisible watermarking, such as the readability and imperceptibility respectively, preserving the robustness of both. The design of the proposed method is based on Just Noticeable Difference (JND), Total Variation-based image decomposition and an image enhancement criterion. The watermark can be readable with a naked eye through the manipulation of image enhancement of the display device. Experimental results show that the scheme is effective for digital color images, preserving a high imperceptibility and its computational complexity is low.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Compact image steganalysis for LSB-matching steganography lsb匹配隐写术的压缩图像隐写分析
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935103
O. Juarez-Sandoval, M. Cedillo-Hernández, G. Sánchez-Pérez, K. Toscano-Medina, H. Meana, M. Nakano-Miyatake
{"title":"Compact image steganalysis for LSB-matching steganography","authors":"O. Juarez-Sandoval, M. Cedillo-Hernández, G. Sánchez-Pérez, K. Toscano-Medina, H. Meana, M. Nakano-Miyatake","doi":"10.1109/IWBF.2017.7935103","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935103","url":null,"abstract":"In this paper, we propose a compact image steganalysis method for the LSB-matching steganography, in which a feature vector composed by only 12 elements is extracted from the image. We analyze the statistical artifact occurred in images when a secret data is embedded in it by the LSB-matching steganography. We selected 12 most relevant features based on the probability density function (PDF) of difference of adjacent pixels and the co-occurrence matrix of the image, which can distinguish stegoimages from the natural images. The Support Vector Machine (SVM) is employed as classifier using the training vectors with 12 elements. The experimental results show that the proposed scheme provides a better discriminate performance than previously proposed methods that require a larger amount of feature elements, such as 27, 35 and 225 feature elements, respectively, for their discriminations.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117166977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Transferable deep convolutional neural network features for fingervein presentation attack detection 用于手指静脉呈现攻击检测的可转移深度卷积神经网络特征
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935108
Ramachandra Raghavendra, S. Venkatesh, K. Raja, C. Busch
{"title":"Transferable deep convolutional neural network features for fingervein presentation attack detection","authors":"Ramachandra Raghavendra, S. Venkatesh, K. Raja, C. Busch","doi":"10.1109/IWBF.2017.7935108","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935108","url":null,"abstract":"Presentation attacks (or spoofing) on finger-vein biometric capture devices are gaining increased attention because of their wider deployment in multiple secure applications. In this work. we propose a novel method for fingervein Presentation Attack Detection (PAD) by exploring the transfer learning ability of Deep Convolutional Neural Network (CNN). To this extent, we have considered the pre-trained Alex-Net architecture and augmented the existing architecture with additional seven layers to improve the reliability and reduce over-fitting problem. We then fine-tune the modified CNN architecture with the fingervein presentation attack samples to make it adaptable to fingervein Presentation Attack Detection (PAD). Extensive experiments are carried out using two different fingervein presentation attack databases with two different fingervein artefact species generated using two different kinds of printers. Obtained results show consistently high performance of the proposed scheme on both databases that further indicate the robustness and efficiency.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122688646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A reversible data hiding scheme for image interpolation based on reference matrix 一种基于参考矩阵的图像插值可逆数据隐藏方案
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935098
Chinchen Chang, T. Nguyen, Yanjun Liu
{"title":"A reversible data hiding scheme for image interpolation based on reference matrix","authors":"Chinchen Chang, T. Nguyen, Yanjun Liu","doi":"10.1109/IWBF.2017.7935098","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935098","url":null,"abstract":"Data hiding is a security technique used to conceal secret information into digital media. Reversible data hiding can guarantee that the secret message can be extracted correctly and that the cover image can be reconstructed exactly. In this paper, we presented our design of a new reversible data hiding scheme, which is based on Sudoku reference matrix and can enhance the performance of some reversible data hiding schemes for image interpolation. This allows embedding more secret bits into a pair of pixels while maintaining the small distortion of the stego-image. Our experimental results indicate that the proposed scheme had a higher embedding capacity than some other previous schemes. In addition, the proposed scheme maintains a better visual quality of the stego-image than some existing schemes.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信